
Microsoft Certified: Cybersecurity Architect Expert (SC-100)

As a Microsoft cybersecurity architect, you translate a cybersecurity strategy into capabilities that protect the assets, business, and operations of an organisation.
You design, guide the implementation of, and maintain security solutions that follow Zero Trust principles and best practices, including security strategies for identity, devices, data, AI, applications, network, infrastructure, and DevOps. Plus, you design solutions for Governance and Risk Compliance (GRC), security operations, and security posture management.
Training Overview
As a Microsoft cybersecurity architect, you translate a cybersecurity strategy into capabilities that protect the assets, business, and operations of an organisation. You design, guide the implementation of, and maintain security solutions that follow Zero Trust principles and best practices, including security strategies for identity, devices, data, AI, applications, network, infrastructure, and DevOps. Plus, you design solutions for Governance and Risk Compliance (GRC), security operations, and security posture management.
As a cybersecurity architect, you continuously collaborate with leaders and practitioners in security, privacy, engineering, and other roles across an organisation to plan and implement a cybersecurity strategy that meets the business needs of the organisation.
As a candidate for this exam, you have experience implementing or administering solutions in the following areas: identity and access, platform protection, security operations, data and AI security, application security, and hybrid and multicloud infrastructures. You should have expert skills in at least one of those areas, and you should have experience designing security solutions that include Microsoft security technologies.
Course Agenda
Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
Design a security strategy to support business resiliency goals, including identifying and prioritising threats to business-critical assets
Design solutions for business continuity and disaster recovery (BCDR), including secure backup and restore for hybrid and multicloud environments
Design solutions for mitigating ransomware attacks, including prioritisation of BCDR and privileged access
Evaluate solutions for security updates
Design solutions that align with the Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft cloud security benchmark (MCSB)
Design solutions that align with best practices for cybersecurity capabilities and controls
Design solutions that align with best practices for protecting against insider, external, and supply chain attacks
Design solutions that align with best practices for Zero Trust security, including the Zero Trust Rapid Modernisation Plan (RaMP)
Design solutions that align with the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework
Design a new or evaluate an existing strategy for security and governance based on the Microsoft Cloud Adoption Framework (CAF) for Azure and the Microsoft Azure Well-Architected Framework (WAF)
Recommend solutions for security and governance based on the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework
Design solutions for implementing and governing security by using Azure landing zones
Design a DevSecOps process that aligns with best practices in the Microsoft Cloud Adoption Framework (CAF)
Design solutions for security operations
Design a solution for detection and response that includes extended detection and response (XDR) and security information and event management (SIEM)
Design a solution for centralised logging and auditing, including Microsoft Purview Audit
Design monitoring to support hybrid and multicloud environments
Design a solution for security orchestration, automated response (SOAR), including Microsoft Sentinel and Microsoft Defender XDR
Design and evaluate security workflows, including incident response, threat hunting, and incident management
