Call +65 6100 0613 Email: enquiry@tertiaryinfotech.com

Enhance Your Employability with Certified Skills and Courses in Singapore - WSQ , IBF-STS, Skills Certification

SC-100 Microsoft Cybersecurity Architect Exam Prep

Embark on an exciting journey into the world of cybersecurity with our SC-100 Microsoft Cybersecurity Architect Exam Prep course. This comprehensive course is designed to provide the expertise and knowledge required to excel in the SC-100 Microsoft Cybersecurity Architect exam. You'll delve into key aspects of cybersecurity, including data security, cloud security, and network security within the Microsoft Azure environment.

With this course, acquire hands-on experience in architecting advanced security solutions, preparing you to tackle real-world cybersecurity challenges. Our curriculum offers a complete understanding of the design, implementation, and management of advanced security protocols and systems within the Microsoft Azure ecosystem. Don't miss this chance to elevate your cybersecurity career with a globally recognized certification.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Disclaimer

We are Official Microsoft Learning Partner (Org ID:  5238476). To get the official Microsoft certification, please register your certification exam at Pearson Vue Test Center.

Certification Exam at Pearson Vue

Once you are prepared for the exam, you can register for the certification here. We are Authorised Pearson Vue Testing Center. You can take the certification exam at our test center. Note that the course fee does not include the certification exam fee.

Funding and Grant Applications

No funding is available for this course

Course Code: C1436

Course Booking

The course fee listed below is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

$1,200.00 (GST-exclusive)
$1,308.00 (GST-inclusive)

Course Date

Course Time

* Required Fields

Post-Course Support

We provide free consultation related to the subject matter after the course. Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Topc 1 Design solutions that align with security best practices and priorities

1.1 Introduction to Zero Trust and best practice frameworks

  • Introduction to best practices5
  • Introduction to Zero Trust
  • Zero Trust initiatives
  • Zero Trust technology pillars part 1
  • Zero Trust technology pillars part 2

1.2 Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

  • Define a security strategy
  • Introduction to the Cloud Adoption Framework
  • Cloud Adoption Framework secure methodology
  • Introduction to Azure Landing Zones
  • Design security with Azure Landing Zones
  • Introduction to the Well-Architected Framework
  • The Well-Architected Framework security pillar

1.3 Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

  • Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
  • Design solutions with best practices for capabilities and controls
  • Design solutions with best practices for attack protection

1.4 Design a resiliency strategy for common cyberthreats like ransomware

  • Common cyberthreats and attack patterns
  • Support business resiliency
  • Ransomware protection
  • Configurations for secure backup and restore
  • • Security updates

1.5 Case study: Design solutions that align with security best practices and priorities

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Topic 2 Design security operations, identity, and compliance capabilities 

2.1 Design solutions for regulatory compliance

  • Introduction to regulatory compliance
  • Translate compliance requirements into a security solution
  • Address compliance requirements with Microsoft Purview
  • Address privacy requirements with Microsoft Priva
  • Address security and compliance requirements with Azure policy
  • Evaluate infrastructure compliance with Defender for Cloud

2.2 Design security solutions for applications and data

  • Introduction to security for Exchange, Sharepoint, OneDrive and Teams
  • Evaluate security posture for collaboration and productivity workloads
  • Design a Microsoft 365 Defender solution
  • Design configurations and operational practices for Microsoft 365

2.3  Design solutions for identity and access management

  • Introduction to Identity and Access Management
  • Design cloud, hybrid and multicloud access strategies (including Azure AD)
  • Design a solution for external identities
  • Design modern authentication and authorization strategies
  • Align conditional access and Zero Trust
  • Specify requirements to secure Active Directory Domain Services (AD DS)
  • Design a solution to manage secrets, keys, and certificates

2.4 Design solutions for securing privileged access

  • Introduction to privileged access
  • The enterprise access model
  • Design identity governance solutions
  • Design a solution to secure tenant administration15 min
  • Design a solution for cloud infrastructure entitlement management (CIEM)
  • Design a solution for privileged access workstations and bastion services

2.5 Design solutions for security operations

  • Introduction to Security operations (SecOps)
  • Design security operations capabilities in hybrid and multicloud environments
  • Design centralized logging and auditing
  • Design security information and event management (SIEM) solutions
  • Design solutions for detection and response
  • Design a solution for security orchestration, automation, and response (SOAR)
  • Design security workflows
  • Design threat detection coverage

2.6 Case study: Design security operations, identity and compliance capabilities

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Topic 3 Design security solutions for applications and data (K4, A4)

3.1  Design solutions for securing Microsoft 365

  • Introduction to security for Exchange, Sharepoint, OneDrive and Teams
  • Evaluate security posture for collaboration and productivity workloads
  • Design a Microsoft 365 Defender solution
  • Design configurations and operational practices for Microsoft 365

3.2 Design solutions for securing applications

  • Introduction to application security
  • Design and implement standards to secure application development
  • Evaluate security posture of existing application portfolios
  • Evaluate application threats with threat modeling
  • Design security lifecycle strategy for applications
  • Secure access for workload identities
  • Design a solution for API management and security
  • Design a solution for secure access to applications

3.3 Design solutions for securing an organization's data

  • Introduction to data security5
  • Design a solution for data discovery and classification using Microsoft Purview
  • Design a solution for data protection
  • Design data security for Azure workloads
  • Design security for Azure Storage
  • Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage

3.4 Case study: Design security solutions for applications and data

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Topic 4 Design security solutions for infrastructure (K5, A5, A6)

4.1 Specify requirements for securing SaaS, PaaS, and IaaS services

  • Introduction to security for SaaS, PaaS, and IaaS
  • Specify security baselines for SaaS, PaaS, and IaaS services
  • Specify security requirements for web workloads
  • Specify security requirements for containers and container orchestration

4.2 Design solutions for security posture management in hybrid and multicloud environments

  • Introduction to hybrid and multicloud posture management
  • Evaluate security posture by using Microsoft Cloud Security Benchmark
  • Design integrated posture management and workload protection
  • Evaluate security posture by using Microsoft Defender for Cloud
  • Posture evaluation with Microsoft Defender for Cloud secure score
  • Design cloud workload protection with Microsoft Defender for Cloud
  • Integrate hybrid and multicloud environments with Azure Arc
  • Design a solution for external attack surface management

4.3 Design solutions for securing server and client endpoints

  • Introduction to endpoint security
  • Specify server security requirements
  • Specify requirements for mobile devices and clients
  • Specify internet of things (IoT) and embedded device security requirements
  • Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
  • Specify security baselines for server and client endpoints
  • Design a solution for secure remote access

4.4 Design solutions for network security

  • Design solutions for network segmentation
  • Design solutions for traffic filtering with network security groups
  • Design solutions for network posture management
  • Design solutions for network monitoring

4.5 Case study: Design security solutions for infrastructure

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Practice Exam

Course Info

Promotion Code

Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.

Minimum Entry Requirement

Knowledge and Skills

  • Able to operate using computer functions
  • Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

Attitude

  • Positive Learning Attitude
  • Enthusiastic Learner

Experience

  • Minimum of 1 year of working experience.

Target Age Group: 18-65 years old

Minimum Software/Hardware Requirement

Software:

TBD

Hardware: Window or Mac Laptops

Job Roles

  • Cybersecurity Architect
  • Information Security Analyst
  • Security Consultant
  • IT Security Manager
  • Network Security Engineer
  • Security Analyst
  • Chief Information Security Officer (CISO)
  • Security Solutions Architect
  • Cybersecurity Engineer
  • IT Manager
  • Systems Administrator
  • Risk Manager
  • Compliance Officer
  • Security Researcher
  • Incident Responder

Trainers

Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.

Write Your Own Review

You're reviewing: SC-100 Microsoft Cybersecurity Architect Exam Prep

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

You May Be Interested In These Courses

WSQ - Cyber Security Awareness Course for Personal and Businesses

WSQ - Cyber Security Awareness Course for Personal and Businesses

109 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
WSQ - SQL Fundamental for Beginners

WSQ - SQL Fundamental for Beginners

65 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
WSQ - Application Integration with Docker and Kubernetes

WSQ - Application Integration with Docker and Kubernetes

20 Review(s)
$688.00 (GST-exclusive)
$749.92 (GST-inclusive)
WSQ - Microsoft Azure AI Fundamentals (AI-900)

WSQ - Microsoft Azure AI Fundamentals (AI-900)

1 Review(s)
$800.00 (GST-exclusive)
$872.00 (GST-inclusive)
WSQ - Microsoft Azure Fundamentals (AZ-900)

WSQ - Microsoft Azure Fundamentals (AZ-900)

$800.00 (GST-exclusive)
$872.00 (GST-inclusive)