SC-100: Microsoft Cybersecurity Architect

Advance your career with SC-100 Microsoft Cybersecurity Architect Training. Learn to design and implement end-to-end Azure security solutions online.

Laptop  Icon - Academy Webflow Template
Six Month Access
Files Icon - Academy Webflow Template
Flexible Schedules
Chat Icon - Academy Webflow Template
Tech Knowledge Support
Mentor Icon - Academy Webflow Template
One-on-One Mentorship
SC-100: Microsoft Cybersecurity Architect
Sundararajan S
Microsoft Certified Trainer / Advisor / Author
₹ 40,000.00 INR
₹ 50,000.00 INR
Contact US
Beginners - Academy Webflow TemplateMedium Icon - Academy Webflow TemplateExperts Icon - Academy Webflow Template
Level: 
Clock Icon - Academy Webflow Template
Duration: 
40 Hours
Play Icon - Academy Webflow Template
Videos: 
Clock Icon - Academy Webflow Template
Batch Type:  
Online - Instuctor Led
Clock Icon - Academy Webflow Template
Post training Support  
Available
Download Icon - Academy Webflow Template
Downloadable Files: 
Check Icon - Academy Webflow Template
Lab Access : 
Six Month Lab access
Multiple Support - Academy Webflow Template
Exam Voucher: 
Included +

About the Course

Course Overview

The 5-Day Instructor-Led training on Microsoft Cybersecurity gives theIn-Depth knowledge to Plan, Design, and maintain Security Solutions that FollowZero Trust principles, best practices, including security strategies forNetwork, Storage, Devices, Application and AI Infrastructure with thatadditionally you can learn design Solutions for Governance and Risk Compliance (GRC),Security operations and Security posture.

 In this course participants will learn how to design Security Solutionswith Zero trust security principles Best Practices and Priorities, DesignSecurity operations, Identity, and Compliance capabilities, Design SecuritySolutions for applications and data, Design Security solutions for infrastructure

 The course will be delivered using the use-cases and Real-worldexamples this will help participants to learn concept and apply Strong Security,Improve Security using Security information and Events.

 The training also prepares to write exam on SC-100 Certification.

High Lights of the course:

  1. Zero-Trust and Best Practices frameworks
  2. Design Security Solutions that align with CloudAdoption Framework (CAF) and Well-Architected Framework (WAF)
  3. Design a Resiliency strategy for ransomware and otherattacks based on the Microsoft Security best practices
  4. Design Identity Security and Compliance
  5. Design Solutions for securing Microsoft 365,Infrastructure applications and Data
  6. Design Solutions for security posture management inHybrid and Multi-Cloud Environment
  7. Design Security Solutions for Securing Network,Servers and Endpoints

Choose your Best Schedule

Configurable Course Schedule

Course Content

Module 1: Zero Trust and best Practice Frameworks

  1. Common Cyberthreats and attack patterns
  2. Zero-Trust Security Principles, MCRAand MCSB to fix the Cyberthreats and Attacks
  3. Understanding Security Components,Controls and Features to protect On-premises, Cloud Infrastructure (Azure,Microsoft 365 and Multicloud)
  4. Design Resiliency strategy forcyberattacks using Microsoft security best practices

Module 2:   DesignIdentity Security and Compliance capabilities

  1. Security Controls for CredentialStealing and Credential Sharing
  2. Security Controls for IdentityRisk
  3. Privileged Access Model
  4. Cloud Infrastructure Entitlement
  5. Privileged Access Workstationsand Bastions
  6. Security for Active DirectoryDomain Services from common directory service attack
  7. Solutions manage secrets, keysand certificates
  8. Modern authentication andAuthorization strategies

Module 3: Design security for Infrastructure andApplications

  1. Security Solutions  for Network segmentations    
  2. Solutions for Network security Posture  management    
  3. Security Solutions for Servers, Virtual  Machines, App Services, Containers  
  4. Security Solution for Web applications  attack    
  5. Security Solution for Protecting Entire  network infrastructure from DDOS Attack

Module 4: Design Security Storage andOrganization’s data

  1. Security for Servers and VirtualMachines Disk  
  2. Security for Storage Services (Blob, Table, Queue andfiles)
  3. Security for Storage Services (Blob, Table, Queue andfiles)
  4. Security for data in transit

Module 5:  Design Security for Microsoft 365

  1. Security Architecture of Microsoft 365Services (Exchange, SharePoint, Teams and Other Applications)
  2. Design Microsoft XDR and PurviewSolution to Secure and Maintain Compliance of Microsoft 365 Services (Exchange,SharePoint, Teams)
  3. Implement Security for Operational Practices ofMicrosoft 365
  4. Design security Control for Microsoft365 Co-Pilot Services

Module 6: DesignSecurity for Endpoint Devices

  1. Design Security Architecture for EndPoint Devices
  2. Security baseline for End PointDevices
  3. Evaluate the compliance of EndpointDevices
  4. Security solutions for SecureRemote access
  5. Endpoint devices securityupdates

Module 7: DesignSecurity Information and Event Management

  1. Evaluate Security posture Of Cloud and On-premises Infrastructure
  2. Monitor the Incidents and alerts ofsecurity threats
  3. Automatic Investigation andResponse AIR
  4. Hunt the threats in the EntireInfrastructure
  5. Evaluate Security Score
  6. Audit the Logs and Reports

Lab :1

  • Protect password stealing and passwordsharing
  • Apply Conditional Access
  • Preventing the user and sign-in risks
  • Apply privileged Access (Just in time)for Identity
  • Securing Secrets, keys, certificatesusing vault

Lab :2

  • Design and Implement Azure FirewallAppliance
  • Design and Implement Traffic Filtering forServers, Virtual Machines and Subnets
  • Design and Implement Web ApplicationFirewall
  • Design and Implement DDOS ProtectionService
  • Design and Implement Bastion Host Services
  • Design and Implement Just in Time access

Lab:3

  • Apply Encryption for Data At rest
  • Apply Encryption for Data in transit
  • Apply Firewall, Keys, certificates for APIand Databases

Lab:4

  • Apply Threat and Security Policies forMicrosoft 365 Services
  • Apply Rights to Access the Sensitive data inMicrosoft 365 Services
  • Apply Policies to Prevent Data loss
  • Apply Policies for Secured Communicationusing Microsoft 365 Services

Lab :5

  • Apply Endpoint Firewall
  • Apply Endpoint Encryption
  • Apply Endpoint Antivirus and MalwareSolution
  • Apply Endpoint Attack Surface Reduction policy
  • Apply Account Protection Policy
  • Apply Endpoint Compliance Policy
  • Apply Endpoint Baseline Policy

Reviews

Stars Icon - Academy Webflow Template

Stars Icon - Academy Webflow Template

Stars Icon - Academy Webflow Template

Why Learning With us?

Contact Us
Community - Academy Webflow Template

"Post-training, our team offers dedicated technical assistance to address any advanced queries or challenges

our experts are available to help participants solve complex technical issues or clarify advanced topics. Contact our team to get more details

Top Notch - Academy Webflow Template

PrepQA - Prepare. Perform. Get Interview Success.

Builds the confidence to answer critical interview questions, excel in certifications, and perform effectively in professional roles, transforming learners into job-ready, industry-certified professionals.

Students Community - Academy Webflow Template

Empowering Career Growth for Our Students

We are dedicated to helping our students achieve their professional goals through skill enhancement, mentorship, and real-world learning opportunities that open doors to career advancement.

Mentorship - Academy Webflow Template

World-Class Lab infrastructure

Rlearning Solution takes pride in offering a world-class, high-speed, and highly redundant Datacenter that powers ouradvanced lab infrastructure for real-world learning.

Frequently Asked Questions

Who is Rlearning Solution Private Limited?

Will Rlearning Solution run all training programs as guaranteed runs?

Does Rlearning Solution provide 100% hands-on training?

Does Rlearning Solution provide career guidance to improve career growth??

Do Rlearning Solution courses prepare participants for certifications and interviews?

Will participants receive a certificate after completing a course?

Is EMI Available  ?