Course Details
Topc 1 Design solutions that align with security best practices and priorities
1.1 Introduction to Zero Trust and best practice frameworks
- Introduction to best practices5
- Introduction to Zero Trust
- Zero Trust initiatives
- Zero Trust technology pillars part 1
- Zero Trust technology pillars part 2
1.2 Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Define a security strategy
- Introduction to the Cloud Adoption Framework
- Cloud Adoption Framework secure methodology
- Introduction to Azure Landing Zones
- Design security with Azure Landing Zones
- Introduction to the Well-Architected Framework
- The Well-Architected Framework security pillar
1.3 Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
- Design solutions with best practices for capabilities and controls
- Design solutions with best practices for attack protection
1.4 Design a resiliency strategy for common cyberthreats like ransomware
- Common cyberthreats and attack patterns
- Support business resiliency
- Ransomware protection
- Configurations for secure backup and restore
- • Security updates
1.5 Case study: Design solutions that align with security best practices and priorities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 2 Design security operations, identity, and compliance capabilities
2.1 Design solutions for regulatory compliance
- Introduction to regulatory compliance
- Translate compliance requirements into a security solution
- Address compliance requirements with Microsoft Purview
- Address privacy requirements with Microsoft Priva
- Address security and compliance requirements with Azure policy
- Evaluate infrastructure compliance with Defender for Cloud
2.2 Design security solutions for applications and data
- Introduction to security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
2.3 Design solutions for identity and access management
- Introduction to Identity and Access Management
- Design cloud, hybrid and multicloud access strategies (including Azure AD)
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Align conditional access and Zero Trust
- Specify requirements to secure Active Directory Domain Services (AD DS)
- Design a solution to manage secrets, keys, and certificates
2.4 Design solutions for securing privileged access
- Introduction to privileged access
- The enterprise access model
- Design identity governance solutions
- Design a solution to secure tenant administration15 min
- Design a solution for cloud infrastructure entitlement management (CIEM)
- Design a solution for privileged access workstations and bastion services
2.5 Design solutions for security operations
- Introduction to Security operations (SecOps)
- Design security operations capabilities in hybrid and multicloud environments
- Design centralized logging and auditing
- Design security information and event management (SIEM) solutions
- Design solutions for detection and response
- Design a solution for security orchestration, automation, and response (SOAR)
- Design security workflows
- Design threat detection coverage
2.6 Case study: Design security operations, identity and compliance capabilities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 3 Design security solutions for applications and data (K4, A4)
3.1 Design solutions for securing Microsoft 365
- Introduction to security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
3.2 Design solutions for securing applications
- Introduction to application security
- Design and implement standards to secure application development
- Evaluate security posture of existing application portfolios
- Evaluate application threats with threat modeling
- Design security lifecycle strategy for applications
- Secure access for workload identities
- Design a solution for API management and security
- Design a solution for secure access to applications
3.3 Design solutions for securing an organization's data
- Introduction to data security5
- Design a solution for data discovery and classification using Microsoft Purview
- Design a solution for data protection
- Design data security for Azure workloads
- Design security for Azure Storage
- Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
3.4 Case study: Design security solutions for applications and data
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 4 Design security solutions for infrastructure (K5, A5, A6)
4.1 Specify requirements for securing SaaS, PaaS, and IaaS services
- Introduction to security for SaaS, PaaS, and IaaS
- Specify security baselines for SaaS, PaaS, and IaaS services
- Specify security requirements for web workloads
- Specify security requirements for containers and container orchestration
4.2 Design solutions for security posture management in hybrid and multicloud environments
- Introduction to hybrid and multicloud posture management
- Evaluate security posture by using Microsoft Cloud Security Benchmark
- Design integrated posture management and workload protection
- Evaluate security posture by using Microsoft Defender for Cloud
- Posture evaluation with Microsoft Defender for Cloud secure score
- Design cloud workload protection with Microsoft Defender for Cloud
- Integrate hybrid and multicloud environments with Azure Arc
- Design a solution for external attack surface management
4.3 Design solutions for securing server and client endpoints
- Introduction to endpoint security
- Specify server security requirements
- Specify requirements for mobile devices and clients
- Specify internet of things (IoT) and embedded device security requirements
- Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
4.4 Design solutions for network security
- Design solutions for network segmentation
- Design solutions for traffic filtering with network security groups
- Design solutions for network posture management
- Design solutions for network monitoring
4.5 Case study: Design security solutions for infrastructure
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Practice Exam
Course Info
Promotion Code
Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Age Group: 18-65 years old
Minimum Software/Hardware Requirement
Software:
TBD
Hardware: Window or Mac Laptops
Job Roles
- Cybersecurity Architect
- Information Security Analyst
- Security Consultant
- IT Security Manager
- Network Security Engineer
- Security Analyst
- Chief Information Security Officer (CISO)
- Security Solutions Architect
- Cybersecurity Engineer
- IT Manager
- Systems Administrator
- Risk Manager
- Compliance Officer
- Security Researcher
- Incident Responder
Trainers
Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.