Skip to main content
Rlearning solution private limited
Rlearning solution private limited
  • SC-100: Microsoft Cybersecurity Architect     

    Course Overview :

    The 5-Day Instructor-Led training on Microsoft Cybersecurity gives the In-Depth knowledge to Plan, Design, and maintain Security Solutions that Follow Zero Trust principles, best practices, including security strategies for Network, Storage, Devices, Application and AI Infrastructure with that additionally you can learn design Solutions for Governance and Risk Compliance (GRC), Security operations and Security posture.

    In this course participants will learn how to design Security Solutions with Zero trust security principles Best Practices and Priorities, Design Security operations, Identity, and Compliance capabilities, Design Security Solutions for applications and data, Design Security solutions for infrastructure

    The course will be delivered using the use-cases and Real-world examples this will help participants to learn concept and apply Strong Security, Improve Security using Security information and Events.

     The training also prepares to write exam on SC-100

Key Features of this course

Dedicated Lab Access

All the participants will get dedicated lab access to do the hands on practice 

Practice Questions

All the participants will get access to Unique exam portal Access which will Prepare you for Certification as well the Knowledge check 

Daily Key Notes

Daily notes will be shared to everyone which is help to follow session and useful for the future reference

Microsoft Achievement code

All the paticipants will get the completion achievement code which is provided by Microsoft

This Course Deeply Covers Below 

  • Zero-Trust and Best Practices frameworks 
  • Design Security Solutions that align with Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Design a Resiliency strategy for ransomware and other attacks based on the Microsoft Security best practices 
  • Design Identity Security and Compliance
  • Design Solutions for securing Microsoft 365, Infrastructure applications and Data 
  • Design Solutions for security posture management in Hybrid and Multi-Cloud Environment 
  • Design Security Solutions for Securing Network, Servers and Endpoints

New Batch Starts @ 21-DEC-2024
​Batch Type : Weekend 
​Timing : 2:00 PM IST to 6:00 PM IST

​Offer Price : 14750/- Incl All taxes (This price applicable the candidates who rigister before 07-DEC-2024

Register Now

Course Curriculum

Talk to our Advisor

Module 1: Zero Trust and best Practice Frameworks

Lessons:

  • Common Cyberthreats and attack patterns
  • Zero-Trust Security Principles, MCRA and MCSB to fix the Cyberthreats and Attacks
  • Understanding Security Components, Controls and Features to protect On-premises, Cloud Infrastructure (Azure, Microsoft 365 and Multicloud)
  •  Design Resiliency strategy for cyberattacks using Microsoft security best practices
Module 2: Design Identity Security and Compliance capabilities

Lessons:

  • Design Security Controls for Credential Stealing and Credential Sharing
  • Design Security Controls for Identity Risk
  • Design privileged Access Model
  • Design Cloud Infrastructure Entitlement
  • Design Privileged Access Workstations and Bastions
  • Design Security for Active Directory Domain Services from common directory service attack
  • Design Solutions manage secrets, keys and certificates
  •  Design Modern authentication and Authorization strategies

 Lab :

  • Protect password stealing and password sharing
  • Apply Conditional Access
  • Preventing the user and sign-in risks
  • Apply privileged Access (Just in time) for Identity
  • Securing Secrets, keys, certificates using vault 
Module 3: Design security for Infrastructure and Applications

Lessons:

 

  • Design Security Solutions for Network segmentations
  • Design Solutions for Network security Posture management
  • Design Security Solutions for Servers, Virtual Machines, App Services, Containers
  • Design Security Solution for Web applications attack
  • Design Security Solution for Protecting Entire network infrastructure from DDOS Attack

 

Lab :

  • Design and Implement Azure Firewall Appliance
  • Design and Implement Traffic Filtering for Servers, Virtual Machines and Subnets
  • Design and Implement Web Application Firewall
  • Design and Implement DDOS Protection Service
  • Design and Implement Bastion Host Services
  • Design and Implement Just in Time access 
Module 4: Design Security Storage and Organization’s data

Lessons:

  • Design Security for Servers and Virtual Machines Disk 
  • Design Security for Storage Services (Blob, Table, Queue and files)
  • Design Security for API and Databases
  • Design Security for data in transit 

Labs:

  • Apply Encryption for Data At rest
  • Apply Encryption for Data in transit
  • Apply Firewall, Keys, certificates for API and Databases 
Module 5:Design Security for Microsoft 365

Lessons:

  • Security Architecture of Microsoft 365 Services (Exchange, SharePoint, Teams and Other Applications)
  • Design Microsoft XDR and Purview Solution to Secure and Maintain Compliance of Microsoft 365 Services (Exchange, SharePoint, Teams)
  • Implement Security for Operational Practices of Microsoft 365
  • Design security Control for Microsoft 365 Co-Pilot Services 

Lab:

  • Apply Threat and Security Policies for Microsoft 365 Services
  • Apply Rights to Access the Sensitive data in Microsoft 365 Services
  • Apply Policies to Prevent Data loss
  • Apply Policies for Secured Communication using Microsoft 365 Services 
Module 6: Design Security for Endpoint Devices

Lessons:

 

  • Design Security Architecture for End Point Devices
  • Design Security baseline for End Point Devices
  • Evaluate the compliance of Endpoint Devices
  • Design Security solutions for Secure Remote access
  • Design Endpoint devices security updates 
Lab :'
  • Apply Endpoint Firewall
  • Apply EndpointEncryption
  • Apply Endpoint Antivirus and Malware Solution
  • Apply Endpoint Attack Surface Reduction policy
  • Apply Account Protection Policy
  • Apply Endpoint Compliance Policy
  • Apply Endpoint Baseline Policy


Module 7:Design Security Information and Event Management

Lessons:

  • Design to Evaluate Security posture Of Cloud and On-premises Infrastructure
  • Design to Monitor the Incidents and alerts of security threats
  • Design to automatic Investigation and Response AIR
  • Design to Hunt the threats in the Entire Infrastructure
  • Design to Evaluate Security Score
  • Design to audit the Logs and Reports