Microsoft Cybersecurity Architect

Course ID: SC-100T00
Duration: 4 Days
Training Fee: HK$14000
Private in-house training

Apart from public, instructor-led classes, we also offer private in-house trainings for organizations based on their needs. Call us at +852 2116 3328 or email us at [email protected] for more details.

What are the skills covered
  • Design a Zero Trust strategy and architecture
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
  • Design security for infrastructure
  • Design a strategy for data and applications
Course Modules

Module 1: Build an overall security strategy and architecture

Learn how to build an overall security strategy and architecture with zero trust in mind.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Develop Integration points in an architecture
  • Develop security requirements based on business goals
  • Translate security requirements into technical capabilities
  • Design security for a resiliency strategy
  • Design security strategy for hybrid and multi-tenant environments
  • Design technical and governance strategies for traffic filtering and segmentation

Prerequisites

  • Conceptual knowledge of security policies, requirements, zero trust architecture, and management of hybrid environments.
  • Working experience with zero trust strategies, applying security policies, and developing security requirements based on business goals.

 

Module 2: Design a security operations strategy

Learn how to design a cybersecurity strategy for security operations (SecOps).

Learning objectives

Upon completion of this module, the learner will be able to:

  • Design a logging and auditing security strategy.
  • Develop security operations for hybrid and multi-cloud environments.
  • Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR).
  • Evaluate security workflows.
  • Review security strategies for incident management.
  • Evaluate security operations for technical threat intelligence.
  • Monitor sources for insights on threats and mitigations.

Prerequisites

  • Conceptual knowledge of security policies, requirements, zero trust architecture, and management of hybrid environments.
  • Working experience with zero trust strategies, applying security policies, and developing security requirements based on business goals.

 

Module 3: Design an identity security strategy

Learn how to design a cybersecurity strategy for identity management.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Recommend an identity store for security.
  • Recommend secure authentication and security authorization strategies.
  • Secure conditional access.
  • Design a strategy for role assignment and delegation.
  • Define Identity governance for access reviews and entitlement management.
  • Design a security strategy for privileged role access to infrastructure.
  • Design a security strategy for privileged access.

Prerequisites

  • Conceptual knowledge of security policies, requirements, zero trust architecture, and management of hybrid environments.
  • Working experience with zero trust strategies, applying security policies, and developing security requirements based on business goals.

 

Module 4: Evaluate a regulatory compliance strategy

Learn how to evaluate a cybersecurity strategy for regulatory compliance.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Interpret compliance requirements and their technical capabilities.
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud.
  • Interpret compliance scores and recommend actions to resolve issues or improve security.
  • Design and validate implementation of Azure Policy.
  • Design for data residency Requirements.
  • Translate privacy requirements into requirements for security solutions.

Prerequisites

  • Experience with compliance frameworks, processes and products.
  • Experience implementing Azure Policy.

 

Module 5: Evaluate security posture and recommend technical strategies to manage risk

Learn how to evaluate an organization’s security posture and recommend technical strategies to manage risk.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Evaluate security postures by using benchmarks.
  • Evaluate security postures by using Microsoft Defender for Cloud.
  • Evaluate security postures by using Secure Scores.
  • Evaluate security hygiene of Cloud Workloads.
  • Design security for an Azure Landing Zone.
  • Interpret technical threat intelligence and recommend risk mitigations.
  • Recommend security capabilities or controls to mitigate identified risks.

Prerequisites

  • Experience with security posture evaluation techniques.
  • Experience with Azure Landing Zone.
  • Experience with threat intelligence methodologies.

 

Module 6: Understand architecture best practices and how they are changing with the Cloud

Learn best practices for cybersecurity architecture and how they have been affected by cloud computing.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Plan and implement a security strategy across teams.
  • Establish a strategy and process for proactive and continuous evolution of a security strategy.

Prerequisites

  • Understanding roles and responsibilities in a security organization.
  • Familiarity with security continuous improvement.

 

Module 7: Design a strategy for securing server and client endpoints

Learn how to design a cybersecurity strategy to secure server and client endpoints.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Design a logging and auditing security strategy.
  • Develop security operations for hybrid and multi-cloud environments.
  • Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR).
  • Evaluate security workflows.
  • Review security strategies for incident management.
  • Evaluate security operations for technical threat intelligence.
  • Monitor sources for insights on threats and mitigations.

Prerequisites

  • Familiarity with security baselines.
  • Familiarity with requirements for server and client endpoints.

 

Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services

Learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Specify security baselines for SaaS, PaaS and IaaS services.
  • Specify security requirements for web, storage, data and IoT workloads.
  • Specify security requirements for containers and container orchestration.

Prerequisites

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.

 

Module 9: Specify security requirements for applications

Learn how to specify cybersecurity requirements for applications.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Specify priorities for mitigating threats to applications.
  • Specify a security standard for onboarding a new application.
  • Specify a security strategy for applications and APIs.

Prerequisites

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data, and securing applications.
  • Experience with hybrid and cloud implementations.

 

Module 10: Design a strategy for securing data

Learn how to design a cybersecurity strategy to secure data.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Specify priorities for mitigating threats to data.
  • Design a strategy to identify and protect sensitive data.
  • Specify an encryption standard for data at rest and in motion.

Prerequisites

  • Experience with data security methods, including encryption for data at rest and in transit
Who should attend this course

IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.

Prerequisites

Before attending this course, students must have:

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications
  • Experience with hybrid and cloud implementations.

Search for a course