Microsoft Cybersecurity Architect (SC-100T00)
This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, complianc...
Design solutions that align with security best practices and priorities
- Introduction to Zero Trust and best practice frameworks
- Design security solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
Desig…
Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.
This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, complianc...
Design solutions that align with security best practices and
priorities
- Introduction to Zero Trust and best practice frameworks
- Design security solutions that align with the Cloud Adoption
Framework (CAF) and Well-Architected Framework (WAF)
- Design solutions that align with the Microsoft Cybersecurity
Reference Architecture (MCRA) and Microsoft cloud security
benchmark (MCSB)
- Design a resiliency strategy for ransomware and other attacks
based on Microsoft Security Best Practices
Design security operations, identity, and compliance
capabilities
- Design solutions for regulatory compliance
- Design solutions for identity and access management
- Design solutions for securing privileged access
- Design solutions for security operations
- Interactive case study: Modernizing identity and data
security
- Interactive case study: Modernizing user access control and
threat resilience
Design security solutions for applications and data
- Evaluate solutions for securing Microsoft 365
- Design solutions for securing applications
- Design solutions for securing an organization's data
- Interactive case study: Securing apps and data
Design security solutions for infrastructure...
This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the cou...
Module 1: SC-100: Design solutions that align with security best
practices and priorities
- Introduction to Zero Trust and best practice frameworks
- Design solutions that align with the Cloud Adoption Framework
(CAF) and Well-Architected Framework (WAF)
- Design solutions that align with the Microsoft Cybersecurity
Reference Architecture (MCRA) and Microsoft cloud security
benchmark (MCSB)
- Design a resiliency strategy for ransomware and other attacks
based on Microsoft Security Best Prac...
Fast Lane werkt met Nederlandse trainers die didactische vaardigheden combineren met veel practische ervaring.
Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

