WSQ , IBF, SkillsFuture, PEI Approved Training Provider

WSQ - Microsoft Cybersecurity Architect (SC-100) Training

Dive into the dynamic sphere of cybersecurity with our Microsoft Cybersecurity Architect Certification Prep course. Designed to facilitate in-depth understanding, this course encompasses various learning outcomes, ensuring participants acquire robust knowledge in designing and implementing secure infrastructure solutions. Under the guidance of industry experts, you will be equipped to navigate complex security landscapes, safeguard sensitive data, and foster a resilient digital environment, making you an invaluable asset in the professional space.

In the second stage of your learning journey, delve deeper into the nuances of enterprise security. This course empowers you to conceptualize, design, and execute comprehensive security strategies, fostering a safer cyber ecosystem. As you progress, you will develop a keen eye for identifying vulnerabilities and crafting innovative solutions, a skill highly sought after in the industry. Seize this golden opportunity to enhance your proficiency and pave the way for a flourishing career in cybersecurity, with the added benefit of up to 70% WSQ funding subsidy, setting you on a path of continuous growth and development

Learning Outcomes

By end of the course, learners should be able to:

  • LO1: Identify security risks, threats, and assess gaps in controls impacting business processes.
  • LO2: Translate security objectives into specific programmes considering security programme design techniques.
  • LO3: Develop a detailed action plan for security programmes in line with information security architectures.
  • LO4: Deliver advice for adoption of security architectures, monitoring their effectiveness against standards.

Course Brochure

Download WSQ - Microsoft Cybersecurity Architect (SC-100) Training Brochure

Skills Framework

This course follows the guideline of Security Strategy ICT-SNA-4021-1.1 under ICT Skills Framework

Certification

  • Certificate of Completion from Tertiary Infotech - Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from Tertiary Infotech.

  • OpenCerts from SkillsFuture Singapore - After passing the assessment(s) and achieving at least 75% attendance, participants will receive a OpenCert (aka Statement of Achievement) from SkillsFuture Singapore, certifying that they have achieved the Competency Standard(s) in the above Skills Framework.

  • External Certification - The participant will be able to attempt the Microsoft Cybersecurity Architect (SC100) Training exam after attending this course. Upon passing the exam, you will receive the Microsoft Cybersecurity Architect (SC100) Training accreditation.

Microsoft Learning Partner

We are Authorised Microsoft Learning Partner (Org ID:  5238476). To get the official Microsoft certification, please register your certification exam at Pearson Vue Test Center.

Certification Exam at Pearson Vue

We are Authorised Pearson Vue Testing Center. Once you have prepared for the exam, you can register for the certification here. The course fee does not include the certification exam fee.

You can purchase the exam voucher (one of the lowest prices in Singapore) at Microsoft Role-Based Certification Exam Voucher.

WSQ Funding

WSQ funding is only applicable to Singaporeans and PR. Subject to eligibility, the funding support is subjected to funding caps.

Effective for courses starting from 1 Jan 2024
Full Fee GST Nett Fee after Funding (Incl. GST)
Baseline MCES / SME
$2000 $180.00 $1,180.00 $780.00

Baseline: Singaporean/PR age 21 and above
MCES(Mid-Career Enhanced Subsidy): S'porean age 40 & above

Upon registration, we will advise further on how to tap on the WSQ Training Subsidy.


You can pay the nett fee (after the WSQ training subsidy) by the following :

SkillsFuture Enterprise Credit (SFEC)

Eligible Singapore-registered companies can tap on $10000 SFEC to cover out-of-pocket expenses.Click here to submit SkillsFuture Enterprise Credit

SkillsFuture Credit (SFC)

Eligible Singapore Citizens can use their SFC to offset course fee payable after funding but the $4,000 Additional SFC (Mid-Career Support) cannot be used. Click here for SkillsFuture Credit submission

UTAP

Eligible NTUC members can apply for 50% of the unfunded fee from UTAP, capped up to $250/year and for members aged 40 and above, capped up to $500/year. Click here to submit UTAP

PSEA

Eligible Singapore Citizens can use their PSEA funds to offset course fee payable after funding.

To check for Post-Secondary Education Account (PSEA) eligibility for this course, Visit SkillsFuture (course code: TGS-2023039177)
  • Scroll down to “Keyword Tags” to verify for PSEA eligibility.
  • If there is “PSEA” under keyword tags, the course is eligible for PSEA.

Once you are eligible for PSEA, please download and fill up the PSEA Withdrawal Form and email to us. 

Course Code: TGS-2023039177

Fee

$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)

The course fee listed above is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

Course Date

* Required Fields

Post-Course Support

  • We provide free consultation related to the subject matter after the course.
  • Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts.

Course Cancellation/Reschedule Policy

  • You can register your interest without upfront payment. There is no penalty for withdrawal of the course before the class commerce.
  • We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% for any paid amount.
  • Note the venue of the training is subject to changes due to availability of the classroom

Course Details

Topic 1 Design solutions that align with security best practices and priorities

1.1 Introduction to Zero Trust and best practice frameworks

Introduction to best practices5

Introduction to Zero Trust

Zero Trust initiatives

Zero Trust technology pillars part 1

Zero Trust technology pillars part 2

1.2 Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

Define a security strategy

Introduction to the Cloud Adoption Framework

Cloud Adoption Framework secure methodology

Introduction to Azure Landing Zones

Design security with Azure Landing Zones

Introduction to the Well-Architected Framework

The Well-Architected Framework security pillar

1.3 Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark

Design solutions with best practices for capabilities and controls

Design solutions with best practices for attack protection

1.4 Design a resiliency strategy for common cyberthreats like ransomware

Common cyberthreats and attack patterns

Support business resiliency

Ransomware protection

Configurations for secure backup and restore

• Security updates

1.5 Case study: Design solutions that align with security best practices and priorities

Case study description

Case study answers

Conceptual walkthrough

Technical walkthrough

Topic 2 Design security operations, identity, and compliance capabilities 

2.1 Design solutions for regulatory compliance

Introduction to regulatory compliance

Translate compliance requirements into a security solution

Address compliance requirements with Microsoft Purview

Address privacy requirements with Microsoft Priva

Address security and compliance requirements with Azure policy

Evaluate infrastructure compliance with Defender for Cloud

2.2 Design security solutions for applications and data

Introduction to security for Exchange, Sharepoint, OneDrive and Teams

Evaluate security posture for collaboration and productivity workloads

Design a Microsoft 365 Defender solution

Design configurations and operational practices for Microsoft 365

2.3 Design solutions for identity and access management

Introduction to Identity and Access Management

Design cloud, hybrid and multicloud access strategies (including Azure AD)

Design a solution for external identities

Design modern authentication and authorization strategies

Align conditional access and Zero Trust

Specify requirements to secure Active Directory Domain Services (AD DS)

Design a solution to manage secrets, keys, and certificates

2.4 Design solutions for securing privileged access

Introduction to privileged access

The enterprise access model

Design identity governance solutions

Design a solution to secure tenant administration15 min

Design a solution for cloud infrastructure entitlement management (CIEM)

Design a solution for privileged access workstations and bastion services

2.5 Design solutions for security operations

Introduction to Security operations (SecOps)

Design security operations capabilities in hybrid and multicloud environments

Design centralized logging and auditing

Design security information and event management (SIEM) solutions

Design solutions for detection and response

Design a solution for security orchestration, automation, and response (SOAR)

Design security workflows

Design threat detection coverage

2.6 Case study: Design security operations, identity and compliance capabilities

Case study description

Case study answers

Conceptual walkthrough

Technical walkthrough

Topic 3 Design security solutions for applications and data

3.1 Design solutions for securing Microsoft 365

Introduction to security for Exchange, Sharepoint, OneDrive and Teams

Evaluate security posture for collaboration and productivity workloads

Design a Microsoft 365 Defender solution

Design configurations and operational practices for Microsoft 365

3.2 Design solutions for securing applications

Introduction to application security

Design and implement standards to secure application development

Evaluate security posture of existing application portfolios

Evaluate application threats with threat modeling

Design security lifecycle strategy for applications

Secure access for workload identities

Design a solution for API management and security

Design a solution for secure access to applications

3.3 Design solutions for securing an organization's data

Introduction to data security5

Design a solution for data discovery and classification using Microsoft Purview

Design a solution for data protection

Design data security for Azure workloads

Design security for Azure Storage

Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage

3.4 Case study: Design security solutions for applications and data

Case study description

Case study answers

Conceptual walkthrough

Technical walkthrough

Topic 4 Design security solutions for infrastructure 

4.1 Specify requirements for securing SaaS, PaaS, and IaaS services

Introduction to security for SaaS, PaaS, and IaaS

Specify security baselines for SaaS, PaaS, and IaaS services

Specify security requirements for web workloads

Specify security requirements for containers and container orchestration

4.2 Design solutions for security posture management in hybrid and multicloud environments

Introduction to hybrid and multicloud posture management

Evaluate security posture by using Microsoft Cloud Security Benchmark

Design integrated posture management and workload protection

Evaluate security posture by using Microsoft Defender for Cloud

Posture evaluation with Microsoft Defender for Cloud secure score

Design cloud workload protection with Microsoft Defender for Cloud

Integrate hybrid and multicloud environments with Azure Arc

Design a solution for external attack surface management

4.3 Design solutions for securing server and client endpoints

Introduction to endpoint security

Specify server security requirements

Specify requirements for mobile devices and clients

Specify internet of things (IoT) and embedded device security requirements

Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT

Specify security baselines for server and client endpoints

Design a solution for secure remote access

4.4 Design solutions for network security

Design solutions for network segmentation

Design solutions for traffic filtering with network security groups

Design solutions for network posture management

Design solutions for network monitoring

4.5 Case study: Design security solutions for infrastructure

Case study description

Case study answers

Conceptual walkthrough

Technical walkthrough

Course Info

Promotion Code

Promo or discount cannot be applied to WSQ courses

Minimum Entry Requirement

Knowledge and Skills

  • Able to operate using computer functions
  • Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

Attitude

  • Positive Learning Attitude
  • Enthusiastic Learner

Experience

  • Minimum of 1 year of working experience.

Target age group: 21-65 years old

Minimum Software/Hardware Requirement

<p

Software:

Sign up for a free Microsoft Account

Hardware: Windows and Mac Laptops

About Progressive Wage Model (PWM)

The Progressive Wage Model (PWM) helps to increase wages of workers through upgrading skills and improving productivity. 

Employers must ensure that their Singapore citizen and PR workers meet the PWM training requirements of attaining at least 1 Workforce Skills Qualification (WSQ) Statement of Attainment, out of the list of approved WSQ training modules.

For more information on PWM, please visit MOM site.

Funding Eligility Criteria

Individual Sponsored Trainee Employer Sponsored Trainee
  • Singapore Citizens or Singapore Permanent Residents
  • From 1 October 2023, attendance-taking for SkillsFuture Singapore's (SSG) funded courses must be done digitally via the Singpass App. This applies to both physical and synchronous e-learning courses.​
  • Trainee must pass all prescribed tests / assessments and attain 100% competency.
  • We reserves the right to claw back the funded amount from trainee if he/she did not meet the eligibility criteria.
  • Singapore Citizens or Singapore Permanent Residents who are DIRECT EMPLOYEE of the sponsoring company.
  • From 1 October 2023, attendance-taking for SkillsFuture Singapore's (SSG) funded courses must be done digitally via the Singpass App. This applies to both physical and synchronous e-learning courses.​
  • Trainee must pass all prescribed tests / assessments and attain 100% competency.
  • We reserves the right to claw back the funded amount from the employer if trainee did not meet the eligibility criteria.

 SkillsFuture Credit: 

  • Eligible Singapore Citizens can use their SkillsFuture Credit to offset course fee payable after funding.

 PSEA:

  • To check for Post-Secondary Education Account (PSEA) eligibility, goto mySkillsFuture portal and search for this course code.
  • Scroll down to "Keyword Tags" to verify for PSEA eligibility.
  • If there is “PSEA” under keyword tags, the course is eligible for PSEA.  
  • And if there is no “PSEA” under keyword tags, the course is ineligible for PSEA. 
  • Not all courses are eligible for PSEA funding.

 Absentee Payroll (AP) Funding: 

  • $4.50 per hour, capped at $100,000 per enterprise per calendar year.
  • AP funding will be computed based on the actual number of training hours attended by the trainee.

 SFEC:

  • If the Training Provider has submitted an enrolment for course fee grant claim in Training Partners Gateway (TPGateway), SSG would be able to derive SFEC funding based on this record. There is no need for enterprise to submit any claim request and the SFEC claim will be automatically generated and disbursed.
  • Where there is no such record, eligible employers are required to submit an SFEC claim after course completion via the SFEC microsite.
  • SkillsFuture Enterprise Credit (SFEC) Microsite 

 

Steps to Apply Skills Future Claim

  • The staff will send you an invoice with the fee breakdown.
  • Login to the MySkillsFuture portal, select the course you’re enrolling on and enter the course date and schedule.
  • Enter the course fee payable by you (including GST) and enter the amount of credit to claim.
  • Upload your invoice and click ‘Submit’

SkillsFuture Level-Up Program

The  SkillsFuture Level-Up Programme provides greater structural support for mid-career Singaporeans aged 40 years and above to pursue a substantive skills reboot and stay relevant in a changing economy. For more information, visit SkillsFuture Level-Up Programme

Get Additional Course Fee Support Up to $500 under UTAP

The Union Training Assistance Programme (UTAP) is a training benefit provided to NTUC Union Members with an objective of encouraging them to upgrade with skills training. It is provided to minimize the training cost. If you are a NTUC Union Member then you can get 50% funding (capped at $500 per year) under Union Training Assistance Programme (UTAP).

For more information visit NTUC U Portal – Union Training Assistance Program (UTAP)

Steps to Apply UTAP

  • Log in to your U Portal account to submit your UTAP application upon completion of the course.

Note

  • SSG subsidy is available for Singapore Citizens, Permanent Residents, and Corporates.
  • All Singaporeans aged 25 and above can use their SkillsFuture Credit to pay. For more details, visit www.skillsfuture.gov.sg/credit
  • An unfunded course fee can be claimed via SkillsFuture Credit or paid in cash.
  • UTAP funding for NTUC Union Members is capped at $250 for 39 years and below and at $500 for 40 years and above.
  • UTAP support amount will be paid to training provider first and claimed after end of class by learner.

Appeal Process

  1. The candidate has the right to disagree with the assessment decision made by the assessor.
  2. When giving feedback to the candidate, the assessor must check with the candidate if he agrees with the assessment outcome.
  3. If the candidate agrees with the assessment outcome, the assessor & the candidate must sign the Assessment Summary Record.
  4. If the candidate disagrees with the assessment outcome, he/she should not sign in the Assessment Summary Record.
  5. If the candidate intends to appeal the decision, he/she should first discuss the matter with the assessor/assessment manager.
  6. If the candidate is still not satisfied with the decision, the candidate must notify the assessor of the decision to appeal. The assessor will reflect the candidate’s intention in the Feedback Section of the Assessment Summary Record.
  7. The assessor will notify the assessor manager about the candidate’s intention to lodge an appeal.
  8. The candidate must lodge the appeal within 7 days, giving reasons for appeal 
  9. The assessor can help the candidate with writing and lodging the appeal.
  10. he assessment manager will collect information from the candidate & assessor and give a final decision.
  11. A record of the appeal and any subsequent actions and findings will be made.
  12. An Assessment Appeal Panel will be formed to review and give a decision.
  13. The outcome of the appeal will be made known to the candidate within 2 weeks from the date the appeal was lodged.
  14. The decision of the Assessment Appeal Panel is final and no further appeal will be entertained.
  15. Please click the link below to fill up the Candidates Appeal Form.

Job Roles

  • Cybersecurity Architect
  • Information Security Analyst
  • Security Consultant
  • IT Security Manager
  • Network Security Engineer
  • Security Analyst
  • Chief Information Security Officer (CISO)
  • Security Solutions Architect
  • Cybersecurity Engineer
  • IT Manager
  • Systems Administrator
  • Risk Manager
  • Compliance Officer
  • Security Researcher
  • Incident Responder

Customer Reviews (2)

All good Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 9/12/2025)
All good Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
All good (Posted on 9/12/2025)

Write Your Own Review

You're reviewing: WSQ - Microsoft Cybersecurity Architect (SC-100) Training

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha

You May Be Interested In These Courses

WSQ - Microsoft Azure Data Fundamentals (DP-900)

WSQ - Microsoft Azure Data Fundamentals (DP-900)

8 Review(s)
$800.00 (GST-exclusive)
$872.00 (GST-inclusive)
WSQ - Cyber Security Awareness Course for Personal and Businesses

WSQ - Cyber Security Awareness Course for Personal and Businesses

230 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
WSQ - Network Securities for Beginners

WSQ - Network Securities for Beginners

20 Review(s)
$750.00 (GST-exclusive)
$817.50 (GST-inclusive)
WSQ - Microsoft Azure AI Fundamentals (AI-900)

WSQ - Microsoft Azure AI Fundamentals (AI-900)

2 Review(s)
$800.00 (GST-exclusive)
$872.00 (GST-inclusive)
WSQ - Microsoft Azure Fundamentals (AZ-900)

WSQ - Microsoft Azure Fundamentals (AZ-900)

4 Review(s)
$800.00 (GST-exclusive)
$872.00 (GST-inclusive)
WSQ - Microsoft Azure Data Scientist Associate (DP-100)

WSQ - Microsoft Azure Data Scientist Associate (DP-100)

$800.00 (GST-exclusive)
$872.00 (GST-inclusive)
WSQ - Microsoft Certified Azure AI Engineer Associate (AI-102) Training

WSQ - Microsoft Certified Azure AI Engineer Associate (AI-102) Training

3 Review(s)
$900.00 (GST-exclusive)
$981.00 (GST-inclusive)