We may earn an affiliate commission when you visit our partners.
Course image
Udemy logo

SC-100

Microsoft Cybersecurity Architect

Alan Rodrigues

This course is designed for students to prepare for the SC-100: Microsoft Cybersecurity Architect exam.

The various objectives and chapters that will be covered include

  • Design a Zero Trust strategy and architecture

Read more

This course is designed for students to prepare for the SC-100: Microsoft Cybersecurity Architect exam.

The various objectives and chapters that will be covered include

  • Design a Zero Trust strategy and architecture

In this section, we will first cover some basic theory when it comes to aspects like Zero trust, the Cloud Adoption Framework, some tools that can be used from a security perspective when it comes to Azure. Next we will focus on the Microsoft Sentinel tool. This is an important tool from an exam perspective. We will revisit aspects such as using Data connectors, creating alerts and incidents, and the automation process. The next aspect we need to touch upon is Azure Active Directory. We need to revisit important aspects such as Application Objects, Enterprise Applications, Conditional Access , Privileged Identity management etc.

  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies

In this section, we need to cover important aspects when it comes to Microsoft Defender for Cloud. How we can use the tool to evaluate the security posture of our resources. And how we can use the various compliance policies available from within the tool. We also will have a touch base when it comes to working with Azure Blueprints as well.

  • Design security for infrastructure

In this section, we will learn aspects on how to secure our infrastructure. For example, how can we enhance security for services like Azure Web Apps, Azure SQL databases, Azure Storage Accounts etc.

  • Design a strategy for data and applications

In this section we have to look into aspects on how we can protect our data. How can we enable data at rest and in transit when it comes to services that store data.

Enroll now

What's inside

Learning objectives

  • Students will be prepared to take on the sc-100 exam
  • Students will learn aspects which relate to the exam objectives
  • Students will learn the important security services when it comes to the sc-100 exam
  • Students can also learn along with the demos and labs present in the course

Syllabus

Design a Zero Trust strategy and architecture
Slides and Diagrams download

This chapter looks into how we are approaching this course

About this section
Read more

This chapter looks into Zero Trust

This chapter looks into Security -Integration endpoints

This chapter looks into Cloud Adoption Framework

This chapter looks into  Security Strategy

This chapter looks into Security Strategy-Hybrid Environments

This chapter looks into Security logging-tools

Let's start using the tools

This chapter looks into Security logging-Our next steps

This chapter looks into Security logging - Building a simple infrastructure

This chapter looks into Microsoft Sentinel

This chapter looks into Lab-Microsoft Sentinel-Setup

This chapter looks into Lab-Microsoft Sentinel -Data connectors

This chapter looks into Lab-Microsoft Sentinel-Azure Activity

This chapter looks into Lab-Microsoft Sentinel-Generating Incidents

This chapter looks into Lab - Microsoft Sentinel - Generating Incidents - Resources

This chapter looks into Incidents

This chapter looks into Lab-Microsoft Sentinel-Virtual Machines -Incidents

This chapter looks into Lab - Microsoft Sentinel - Virtual Machines - Incidents - Resources

This chapter looks into Microsoft Sentinel -Workbooks

This chapter looks into Microsoft Sentinel-Automation

This chapter looks into Microsoft Sentinel - Note on threat protection

This chapter looks into NSG Flow logs

Note on Multiple Log Analytics workspaces

This chapter looks into Our next focus-Azure Active Directory

This chapter is a Review on Role-based access control

This chapter looks into Identity Governance - Entitlement Management

This chapter is a Review of Application Objects

This chapter looks into Example on using Application Objects

This chapter looks into Installing the Postman tool

This chapter looks into another example on Application Objects

This chapter looks into Installing Visual Studio 2022

This chapter looks into Enterprise Applications

This chapter looks into Example on Enterprise Applications

This chapter reviews-Azure AD Identity Protection

This chapter Reviews-Conditional Access Policies

This chapter looks into Hybrid Identities -Azure AD Connect

This chapter Reviews -Azure AD Privileged Identity Management

This chapter looks into Azure B2B

This chapter looks into Azure B2C

This chapter looks into-Which service to choose

This chapter looks into Azure AD Logs

Note on Azure AD Application Proxy
Quick Revision

This chapter is a Quick note before moving along

This is a short quiz based on the concepts discussed in this section

Evaluate Governance Risk Compliance

This chapter looks into Compliance of your resources

This chapter is a Review of Azure Policy service

This chapter is a Introduction to Microsoft Defender for Cloud

This chapter looks into Microsoft Defender for Cloud -Initial Look

This chapter looks into Azure Security Benchmark

This chapter looks into Microsoft Defender for Cloud-Servers

This chapter looks into Microsoft Defender for Cloud -Secure Management Ports

This chapter looks into Microsoft Defender for Cloud-Workload Protection features

This chapter looks into Microsoft Defender for Cloud -Workflow Automation

This chapter looks into Microsoft Defender for Cloud - Vulnerability assessment

This chapter looks into Management Ports update

This chapter looks into Microsoft Defender for Cloud - Regulatory compliance

This chapter looks into Microsoft Defender for Cloud - Remediations

This chapter looks into Microsoft Defender for Cloud-AWS resources

This chapter is a Quick note on other AWS aspects

This chapter looks into Azure Landing zones

This chapter looks into Azure Blueprints

This chapter is a Example on using Azure Blueprints

This chapter is  a Example on using Azure Blueprints - Resources

Design security for infrastructure

This chapter looks into the topics we are going to cover

This chapter looks into quick overview of the services

This chapter looks into Azure Storage Accounts

This chapter looks into Azure Storage Accounts Authorization-Access keys

This chapter looks into Azure Storage Accounts Authorization-Shared Access Signature

This chapter looks into Azure Storage Accounts- Azure AD Authorization

This chapter looks into Azure Storage Accounts -Firewalls

This chapter looks into Azure Storage Account -Service Endpoint

This chapter looks into Azure Storage Accounts -Deny use of Access keys

This chapter looks into Azure Storage Accounts -Azure policy use case

This chapter looks into creating an Azure SQL database

This chapter looks into Azure SQL Database -Auditing

This chapter looks into Azure SQL Database -Log output 

This chapter looks into Using the  Azure Bastion Service

This chapter looks into Azure Bastion-Creating the environment

This chapter looks into Azure Bastion Service

This chapter looks into Azure Web apps -Enabling Diagnostics

This chapter looks into Azure Web Apps -Diagnostics results

This chapter looks into Azure Web Apps -Virtual Network Integration

Azure Web App - Isolated App Service Plan
Azure Web Apps - More Networking Details
Azure Web App - Usage of Private Endpoints

This chapter looks Lab- Creating an Azure Cosmos DB Account

Lab - Creating an Azure Cosmos DB Account - Resources

This chapter looks into Example of an application connecting to Azure Cosmos DB

Example of an application connecting to Azure Cosmos DB - Resources

This chapter looks into Storing Azure Cosmos DB keys

Storing Azure Cosmos DB keys - Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Prepares students to pass the SC-100 Microsoft Cybersecurity Architect exam
Develops cybersecurity essential concepts like Zero Trust, Governance, Risk, Compliance (GRC), securing infrastructure, protecting data and applications
Taught by Alan Rodrigues, an experienced cybersecurity professional
Practical with hands-on demos and labs, providing experiential learning
Covers topics relevant to industry-leading security practices
Requires students to have some foundational knowledge in cybersecurity

Save this course

Save SC-100: Microsoft Cybersecurity Architect to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for SC-100: Microsoft Cybersecurity Architect. These are activities you can do either before, during, or after a course.

Career center

Learners who complete SC-100: Microsoft Cybersecurity Architect will develop knowledge and skills that may be useful to these careers:
Cybersecurity Architect
A Cybersecurity Architect designs and implements security measures to protect an organization's computer networks and systems. The SC-100: Microsoft Cybersecurity Architect course covers topics such as Zero Trust strategy, Governance Risk Compliance, security for infrastructure, and data and application security, which are all essential for success in this role.
Cloud Security Engineer
As a Cloud Security Engineer, you will be responsible for securing cloud-based applications and data. The SC-100: Microsoft Cybersecurity Architect course is an excellent resource for gaining the knowledge and skills necessary for this role, with its focus on designing secure cloud architectures, implementing security controls, and managing cloud security risks.
IT Security Manager
IT Security Managers are responsible for developing and implementing security policies and procedures for an organization. The SC-100: Microsoft Cybersecurity Architect course covers topics such as Zero Trust strategy, Governance Risk Compliance, security for infrastructure, and data and application security, which are all essential for success in this role.
Security Engineer
A Security Engineer is responsible for designing, implementing, and managing an organization's security systems. The SC-100: Microsoft Cybersecurity Architect course covers topics such as Zero Trust strategy, Governance Risk Compliance, security for infrastructure, and data and application security, which are all essential for success in this role.
Security Consultant
In the field of cybersecurity consulting, professionals provide specialized advice and guidance to organizations on how to improve their security posture. The SC-100: Microsoft Cybersecurity Architect course can help you build a solid foundation for success in this role, providing you with a comprehensive understanding of cybersecurity principles, best practices, and technologies.
Security Analyst
As a Security Analyst, you will be responsible for monitoring and analyzing security events, as well as investigating and responding to security incidents. The SC-100: Microsoft Cybersecurity Architect course will provide you with the skills you need to succeed in this role, covering topics such as Zero Trust strategy, Governance Risk Compliance, security for infrastructure, and data and application security.
Network Security Engineer
A Network Security Engineer designs, implements, and manages an organization's network security systems. The SC-100: Microsoft Cybersecurity Architect course covers topics such as Zero Trust strategy, Governance Risk Compliance, security for infrastructure, and data and application security, all of which are essential for success in this role.
Information Security Analyst
In the role of a highly sought-after Information Security Analyst, you will be responsible for planning, implementing, and maintaining an organization's cybersecurity defenses. The course SC-100: Microsoft Cybersecurity Architect will provide a solid foundation in the skills you need to succeed, with its focus on Zero Trust strategies, Governance Risk Compliance, designing security infrastructure, and data protection.
Privacy Manager
A Privacy Manager ensures that an organization's data is collected, processed, and stored in accordance with applicable privacy laws and regulations. The SC-100: Microsoft Cybersecurity Architect course may be helpful for gaining an understanding of the security aspects of privacy, with its coverage of topics such as Zero Trust strategy, Governance Risk Compliance, and data and application security.
Data Protection Officer
A Data Protection Officer is responsible for ensuring that an organization's data is collected, processed, and stored in compliance with applicable laws and regulations. The SC-100: Microsoft Cybersecurity Architect course may be helpful for gaining an understanding of the security aspects of data protection, with its coverage of topics such as Zero Trust strategy, Governance Risk Compliance, and data and application security.
Incident Responder
Incident Responders are responsible for responding to and resolving security incidents. The SC-100: Microsoft Cybersecurity Architect course may be helpful for gaining an understanding of the security aspects of incident response, with its coverage of topics such as Zero Trust strategy, Governance Risk Compliance, and data and application security.
Information Governance Manager
Information Governance Managers develop and implement policies and procedures to ensure that an organization's information assets are managed in a secure and compliant manner. The SC-100: Microsoft Cybersecurity Architect course may be helpful for gaining an understanding of the security aspects of information governance, with its coverage of topics such as Zero Trust strategy, Governance Risk Compliance, and data and application security.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure compliance with regulations and standards. The SC-100: Microsoft Cybersecurity Architect course may be helpful for gaining an understanding of the security aspects of IT systems, with its coverage of topics such as Governance Risk Compliance, security for infrastructure, and data and application security.
Compliance Manager
A Compliance Manager ensures that an organization's activities comply with applicable laws and regulations. The SC-100: Microsoft Cybersecurity Architect course may be helpful for gaining an understanding of the security aspects of compliance, with its coverage of topics such as Zero Trust strategy, Governance Risk Compliance, and data and application security.
Risk Analyst
A Risk Analyst identifies, assesses, and manages risks to an organization's assets. The SC-100: Microsoft Cybersecurity Architect course may be helpful in developing the skills needed for this role, covering topics such as Governance Risk Compliance, security for infrastructure, and data and application security.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in SC-100: Microsoft Cybersecurity Architect.
Provides a comprehensive guide to cryptography and network security. It covers topics such as cryptography algorithms, network security protocols, and public key infrastructure.
Provides a hands-on guide to malware analysis. It covers topics such as malware analysis tools, malware analysis techniques, and malware analysis reporting.
Provides a hands-on approach to computer security. It covers topics such as operating system security, network security, and application security.
Provides a comprehensive guide to cloud security. It covers topics such as cloud security architecture, identity and access management, and data protection.
Provides a guide to secure coding. It covers topics such as secure coding principles, secure coding practices, and secure coding tools.
Provides a guide to the human element of security. It covers topics such as social engineering, phishing, and malware.
Provides a guide to network security. It covers topics such as network security threats, network security tools, and network security best practices.
Provides a guide to building dependable distributed systems. It covers topics such as security threats, security mechanisms, and risk management.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to SC-100: Microsoft Cybersecurity Architect.
Design Principles for Implementing Data Security with...
Most relevant
DP-203 - Data Engineering on Microsoft Azure
Most relevant
Design a Data Protection Strategy with Microsoft Azure
Most relevant
Understanding Ethical, Legal, and Security Issues in Data...
Most relevant
Configuring Encryption for Data at Rest in Microsoft Azure
Most relevant
Introduction to Azure VMware Cloud Solution
Configuring Microsoft Azure Data Infrastructure Security
Microsoft Azure Stack Hub Development: Getting Started
Implement Security on Azure Data Lakes
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser