Cyber Security Category Banner Image

Microsoft SC-100T00 - Microsoft Cybersecurity Architect

  • Length 4 days
Course overview
View dates &
book now
Course locations >>

Why study this course

This four-day course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

This is an advanced, expert-level course.

Request Course Information


What you’ll learn

After completing this course, students will be able to:

  • Design solutions that align with security best practices and priorities

  • Design security operations, identity, and compliance capabilities

  • Design security solutions for infrastructure

  • Design security solutions for applications and data


Microsoft Solutions Partner - Cloud - Training Services Logo

Microsoft at Lumify Work

Lumify Work has been delivering effective training across all Microsoft products for over 30 years. We are proud to be both Australia's and New Zealand’s first Microsoft Gold Learning Solutions Partner and the winner of the Microsoft MCT Superstars Award for FY24, which formally recognises us as having the highest quality Microsoft Certified Trainers (MCTs) in ANZ. All Lumify Work Microsoft technical courses follow Microsoft Official Curriculum (MOC) and are led by MCTs.


Who is the course for?

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.


Course subjects

Design solutions that align with security best practices and priorities

  • Introduction to Zero Trust and best practice frameworks

  • Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

  • Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

  • Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices

  • Case study: Design solutions that align with security best practices and priorities

Design security operations, identity, and compliance capabilities

  • Design solutions for regulatory compliance

  • Design solutions for identity and access management

  • Design solutions for securing privileged access

  • Design solutions for security operations

  • Case study: Design security operations, identity and compliance capabilities

Design security solutions for applications and data

  • Design solutions for securing Microsoft 365

  • Design solutions for securing applications

  • Design solutions for securing an organisation's data

  • Case study: Design security solutions for applications and data

Design security solutions for infrastructure

  • Specify requirements for securing SaaS, PaaS, and IaaS services

  • Design solutions for security posture management in hybrid and multicloud environments

  • Design solutions for securing server and client endpoints

  • Design solutions for network security

  • Case study: Design security solutions for infrastructure


Prerequisites

Before attending this course, students must have:

  • Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300)

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.

  • Experience with hybrid and cloud implementations.


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Awaiting course schedule

If you would like to receive a notification when this course becomes available, enter your details below.

Personalise your schedule with Lumify USchedule

Interested in a course that we have not yet scheduled? Get in touch, and ask for your preferred date and time. We can work together to make it happen.



Loading