Microsoft Cybersecurity Architect (SC-100) Training
About This Course
Dive into the dynamic sphere of cybersecurity with our Microsoft Cybersecurity Architect (SC-100) training course. Designed to facilitate in-depth understanding, this course encompasses various learning outcomes, ensuring participants acquire robust knowledge in designing and implementing secure infrastructure solutions. Under the guidance of industry experts, you will be equipped to navigate complex security landscapes, safeguard sensitive data, and foster a resilient digital environment, making you an invaluable asset in the professional space.
In the second stage of your learning journey, delve deeper into the nuances of enterprise security. This course empowers you to conceptualize, design, and execute comprehensive security strategies, fostering a safer cyber ecosystem. As you progress, you will develop a keen eye for identifying vulnerabilities and crafting innovative solutions, a skill highly sought after in the industry. Seize this golden opportunity to enhance your proficiency and pave the way for a flourishing career in cybersecurity, with the added benefit of up to 70% WSQ funding subsidy, setting you on a path of continuous growth and development.
What You'll Learn
- Identify security risks, threats, and assess gaps in controls impacting business processes.
- Translate security objectives into specific programmes considering security programme design techniques.
- Develop a detailed action plan for security programmes in line with information security architectures.
- Deliver advice for adoption of security architectures, monitoring their effectiveness against standards.
Course Outline:
Topic 1 Introduction to Zero Trust and best practice frameworks
Topic 2 Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Topic 3 Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
Topic 4 Design a resiliency strategy for common cyberthreats like ransomware
Topic 5 Case study: Design solutions that align with security best practices and priorities
Topic 6 Design solutions for regulatory compliance
Topic 7 Design security solutions for applications and data
Topic 8 Design solutions for identity and access management
Topic 9 Design solutions for securing privileged access
Topic 10 Design solutions for security operations
Topic 11 Case study: Design security operations, identity and compliance capabilities
Topic 12 Design solutions for securing Microsoft 365
Topic 13 Design solutions for securing applications
Topic 14 Design solutions for securing an organization's data
Topic 15 Case study: Design security solutions for applications and data
Topic 16 Specify requirements for securing SaaS, PaaS, and IaaS services
Topic 17 Design solutions for security posture management in hybrid and multicloud environments
Topic 18 Design solutions for securing server and client endpoints
Topic 19 Design solutions for network security
Topic 20 Case study: Design security solutions for infrastructure
Entry Requirements
Knowledge and Skills
• Able to operate using computer functions
• Able to operate using computer functions
• Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
• Positive Learning Attitude
• Enthusiastic Learner
Experience
• Minimum of 1 year of working experience
Target age group: 21-65 years old