top of page
Blurred soft of people meeting at table.jpg

Microsoft Certified: Cybersecurity Architect Expert (SC-100)

Microsoft Certified Expert_edited_edited_edited.png

As a Microsoft cybersecurity architect, you translate a cybersecurity strategy into capabilities that protect the assets, business, and operations of an organisation.


You design, guide the implementation of, and maintain security solutions that follow Zero Trust principles and best practices, including security strategies for identity, devices, data, AI, applications, network, infrastructure, and DevOps. Plus, you design solutions for Governance and Risk Compliance (GRC), security operations, and security posture management.

4 Days

Live on Teams

£2,700.00

Exam voucher Included

Training Overview

As a Microsoft cybersecurity architect, you translate a cybersecurity strategy into capabilities that protect the assets, business, and operations of an organisation. You design, guide the implementation of, and maintain security solutions that follow Zero Trust principles and best practices, including security strategies for identity, devices, data, AI, applications, network, infrastructure, and DevOps. Plus, you design solutions for Governance and Risk Compliance (GRC), security operations, and security posture management.


As a cybersecurity architect, you continuously collaborate with leaders and practitioners in security, privacy, engineering, and other roles across an organisation to plan and implement a cybersecurity strategy that meets the business needs of the organisation.


As a candidate for this exam, you have experience implementing or administering solutions in the following areas: identity and access, platform protection, security operations, data and AI security, application security, and hybrid and multicloud infrastructures. You should have expert skills in at least one of those areas, and you should have experience designing security solutions that include Microsoft security technologies.

Course Agenda

Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices

  • Design a security strategy to support business resiliency goals, including identifying and prioritising threats to business-critical assets

  • Design solutions for business continuity and disaster recovery (BCDR), including secure backup and restore for hybrid and multicloud environments

  • Design solutions for mitigating ransomware attacks, including prioritisation of BCDR and privileged access

  • Evaluate solutions for security updates


Design solutions that align with the Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft cloud security benchmark (MCSB)

  • Design solutions that align with best practices for cybersecurity capabilities and controls

  • Design solutions that align with best practices for protecting against insider, external, and supply chain attacks

  • Design solutions that align with best practices for Zero Trust security, including the Zero Trust Rapid Modernisation Plan (RaMP)


Design solutions that align with the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework

  • Design a new or evaluate an existing strategy for security and governance based on the Microsoft Cloud Adoption Framework (CAF) for Azure and the Microsoft Azure Well-Architected Framework (WAF)

  • Recommend solutions for security and governance based on the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework

  • Design solutions for implementing and governing security by using Azure landing zones

  • Design a DevSecOps process that aligns with best practices in the Microsoft Cloud Adoption Framework (CAF)


Design solutions for security operations

  • Design a solution for detection and response that includes extended detection and response (XDR) and security information and event management (SIEM)

  • Design a solution for centralised logging and auditing, including Microsoft Purview Audit

  • Design monitoring to support hybrid and multicloud environments

  • Design a solution for security orchestration, automated response (SOAR), including Microsoft Sentinel and Microsoft Defender XDR

  • Design and evaluate security workflows, including incident response, threat hunting, and incident management

Viscontis Limited

Canada Street

SE16 6BH, London, UK

Company Registered in England and Wales 

© 2026 by Viscontis Limited. All rights Reserved

  • LinkedIn
microsoft-cloud-t.png

Legal Notice: D365 Training is a Trademark of Viscontis Limited, a Microsoft Training Services Partner; all rights reserved.

This website is neither owned nor sponsored by Microsoft©. Any reference to Microsoft, Dynamics365, Microsoft Teams, Microsoft Business Central, Azure or any other Microsoft software is purely for illustration, training and demo purposes.

 

You must perform due diligence before purchasing, implementing and setting up any technology mentioned on this website. By navigating this website, you acknowledge that we owe no responsibility if your business experiences losses, disruption or loss of data following the implementation of suggestions, guides or training material accessed from or mentioned on this website.

bottom of page