GB
/
GBP
/
EN_GB

Shaping the future of IT skills

Maximising IT performance through learning

Microsoft Cybersecurity Architect

WGAC-MIC-SC-100T00

Microsoft
Open

Microsoft Cybersecurity Architect

22 Aug 2022 - 4 days

English

GMT UTC+00:00

£2,095

Open

Microsoft Cybersecurity Architect

05 Sep 2022 - 4 days

German

CET UTC+01:00

£2,274

Open

Microsoft Cybersecurity Architect

19 Sep 2022 - 4 days

English

CET UTC+01:00

£845

Open

Microsoft Cybersecurity Architect

10 Oct 2022 - 4 days

German

CET UTC+01:00

£2,274

Open

Microsoft Cybersecurity Architect

24 Oct 2022 - 4 days

English

GMT UTC+00:00

£2,095

Open

Microsoft Cybersecurity Architect

07 Nov 2022 - 4 days

English

CET UTC+01:00

Pricing not available

Description

Show Tabs
Introduction
Module 1: Build an overall security strategy and architecture

Learn how to build an overall security strategy and architecture.

Lessons
  • Introduction
  • Zero Trust overview
  • Develop Integration points in an architecture
  • Develop security requirements based on business goals
  • Translate security requirements into technical capabilities
  • Design security for a resiliency strategy
  • Design a security strategy for hybrid and multi-tenant environments
  • Design technical and governance strategies for traffic filtering and segmentation
  • Understand security for protocols
  • Exercise: Build an overall security strategy and architecture
  • Knowledge check
  • Summary

After completing this module, students will be able to:

  • Develop Integration points in an architecture
  • Develop security requirements based on business goals
  • Translate security requirements into technical capabilities
  • Design security for a resiliency strategy
  • Design security strategy for hybrid and multi-tenant environments
  • Design technical and governance strategies for traffic filtering and segmentation
Module 2: Design a security operations strategy

Learn how to design a security operations strategy.

Lessons
  • Introduction
  • Understand security operations frameworks, processes, and procedures
  • Design a logging and auditing security strategy
  • Develop security operations for hybrid and multi-cloud environments
  • Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,
  • Evaluate security workflows
  • Review security strategies for incident management
  • Evaluate security operations strategy for sharing technical threat intelligence
  • Monitor sources for insights on threats and mitigations
  • After completing this module, students will be able to:
  • Design a logging and auditing security strategy
  • Develop security operations for hybrid and multi-cloud environments.
  • Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A
  • Evaluate security workflows.
  • Review security strategies for incident management.
  • Evaluate security operations for technical threat intelligence.
  • Monitor sources for insights on threats and mitigations.
Module 3: Design an identity security strategy

Learn how to design an identity security strategy.

Lessons
  • Introduction
  • Secure access to cloud resources
  • Recommend an identity store for security
  • Recommend secure authentication and security authorization strategies
  • Secure conditional access
  • Design a strategy for role assignment and delegation
  • Define Identity governance for access reviews and entitlement management
  • Design a security strategy for privileged role access to infrastructure
  • Design a security strategy for privileged activities
  • Understand security for protocols

After completing this module, students will be able to:

  • Recommend an identity store for security.
  • Recommend secure authentication and security authorization strategies.
  • Secure conditional access.
  • Design a strategy for role assignment and delegation.
  • Define Identity governance for access reviews and entitlement management.
  • Design a security strategy for privileged role access to infrastructure.
  • Design a security strategy for privileged access.
Module 4: Evaluate a regulatory compliance strategy

Learn how to evaluate a regulatory compliance strategy.

Lessons
  • Introduction
  • Interpret compliance requirements and their technical capabilities
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud
  • Interpret compliance scores and recommend actions to resolve issues or improve security
  • Design and validate implementation of Azure Policy
  • Design for data residency Requirements
  • Translate privacy requirements into requirements for security solutions
  • After completing this module, students will be able to:
  • Interpret compliance requirements and their technical capabilities
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud
  • Interpret compliance scores and recommend actions to resolve issues or improve security
  • Design and validate implementation of Azure Policy
  • Design for data residency requirements
  • Translate privacy requirements into requirements for security solutions
Module 5: Evaluate security posture and recommend technical strategies to manage risk

Learn how to evaluate security posture and recommend technical strategies to manage risk.

Lessons
  • Introduction
  • Evaluate security postures by using benchmarks
  • Evaluate security postures by using Microsoft Defender for Cloud
  • Evaluate security postures by using Secure Scores
  • Evaluate security hygiene of Cloud Workloads
  • Design security for an Azure Landing Zone
  • Interpret technical threat intelligence and recommend risk mitigations
  • Recommend security capabilities or controls to mitigate identified risks

After completing this module, students will be able to:

  • Evaluate security postures by using benchmarks
  • Evaluate security postures by using Microsoft Defender for Cloud
  • Evaluate security postures by using Secure Scores
  • Evaluate security hygiene of Cloud Workloads
  • Design security for an Azure Landing Zone
  • Interpret technical threat intelligence and recommend risk mitigations
  • Recommend security capabilities or controls to mitigate identified risks
Module 6: Understand architecture best practices and how they are changing with the Cloud

Learn about architecture best practices and how they are changing with the Cloud.

Lessons
  • Introduction
  • Plan and implement a security strategy across teams
  • Establish a strategy and process for proactive and continuous evolution of a security strategy
  • Understand network protocols and best practices for network segmentation and traffic filtering

After completing this module, students will be able to:

  • Describe best practices for network segmentation and traffic filtering.
  • Plan and implement a security strategy across teams.
  • Establish a strategy and process for proactive and continuous evaluation of security strategy.
Module 7: Design a strategy for securing server and client endpoints

Learn how to design a strategy for securing server and client endpoints.

Lessons
  • Introduction
  • Specify security baselines for server and client endpoints
  • Specify security requirements for servers
  • Specify security requirements for mobile devices and clients
  • Specify requirements for securing Active Directory Domain Services
  • Design a strategy to manage secrets, keys, and certificates
  • Design a strategy for secure remote access
  • Understand security operations frameworks, processes, and procedures
  • Understand deep forensics procedures by resource type

After completing this module, students will be able to:

  • Specify security baselines for server and client endpoints
  • Specify security requirements for servers
  • Specify security requirements for mobile devices and clients
  • Specify requirements for securing Active Directory Domain Services
  • Design a strategy to manage secrets, keys, and certificates
  • Design a strategy for secure remote access
  • Understand security operations frameworks, processes, and procedures
  • Understand deep forensics procedures by resource type
Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services

Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.

Lessons
  • Introduction
  • Specify security baselines for PaaS services
  • Specify security baselines for IaaS services
  • Specify security baselines for SaaS services
  • Specify security requirements for IoT workloads
  • Specify security requirements for data workloads
  • Specify security requirements for web workloads
  • Specify security requirements for storage workloads
  • Specify security requirements for containers
  • Specify security requirements for container orchestration

After completing this module, students will be able to:

  • Specify security baselines for PaaS, SaaS and IaaS services
  • Specify security requirements for IoT, data, storage, and web workloads
  • Specify security requirements for containers and container orchestration
Module 9: Specify security requirements for applications

Learn how to specify security requirements for applications.

Lessons
  • Introduction
  • Understand application threat modeling
  • Specify priorities for mitigating threats to applications
  • Specify a security standard for onboarding a new application
  • Specify a security strategy for applications and APIs

After completing this module, students will be able to:

  • Specify priorities for mitigating threats to applications
  • Specify a security standard for onboarding a new application
  • Specify a security strategy for applications and APIs
Module 10: Design a strategy for securing data

Learn how to design a strategy for securing data.

Lessons
  • Introduction
  • Prioritize mitigating threats to data
  • Design a strategy to identify and protect sensitive data
  • Specify an encryption standard for data at rest and in motion

After completing this module, students will be able to:

  • Prioritize mitigating threats to data
  • Design a strategy to identify and protect sensitive data
  • Specify an encryption standard for data at rest and in motion
Prerequisites & Audience

Before attending this course, students must have:

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.
Course Benefits
  • Design a Zero Trust strategy and architecture
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
  • Design security for infrastructure
  • Design a strategy for data and applications
Course Topics
  • Build an overall security strategy and architecture
  • Design a security operations strategy
  • Design an identity security strategy
  • Evaluate a regulatory compliance strategy
  • Evaluate security posture and recommend technical strategies to manage risk
  • Understand architecture best practices and how they are changing with the Cloud
  • Design a strategy for securing server and client endpoints
  • Design a strategy for securing PaaS, IaaS, and SaaS services
  • Specify security requirements for applications
  • Design a strategy for securing data

Microsoft courses


Designing Microsoft Azure Infrastructure Solutions
CODE: WGAC-MIC-AZ-305T00
Azure Administration for AWS SysOps
CODE: WGAC-MIC-AZ-010T00
Designing and Implementing Microsoft DevOps Solutions
CODE: WGAC-MIC-AZ-400T00
Microsoft Azure Administrator
CODE: WGAC-MIC-AZ-104T00
Migrate SQL workloads to Azure
CODE: WGAC-MIC-DP-050T00
Microsoft Dynamics 365: Core Finance and Operations
CODE: WGAC-MIC-MB-300T00
Managing Modern Desktops
CODE: WGAC-MIC-MD-101T00
Designing and Implementing a Microsoft Azure AI Solution
CODE: WGAC-MIC-AI-102T00
Migrate Open Source Data Workloads to Azure
CODE: WGAC-MIC-DP-070T00
Microsoft 365 Fundamentals
CODE: WGAC-MIC-MS-900T01
Microsoft Dynamics 365 Commerce Functional Consultant - MB-340T00
CODE: WGAC-MIC-MB-340T00
Installation, Storage, and Compute with Windows Server 2016 - 20740
CODE: WGAC-MIC-20740
Implementing an Azure Data Solution - DP-200T01
CODE: WGAC-MIC-DP-200T01
Microsoft 365 Mobility and Security
CODE: WGAC-MIC-MS-101T00
Developing solutions for Microsoft Azure
CODE: WGAC-MIC-AZ-204T00
Microsoft Power BI Data Analyst
CODE: WGAC-MIC-PL-300T00
Microsoft Dynamics 365 Business Central Functional Consultant
CODE: WGAC-MIC-MB-800T00
Migrate NoSQL workloads to Azure Cosmos DB
CODE: WGAC-MIC-DP-060T00
Planning and Administering Microsoft Azure for SAP Workloads
CODE: WGAC-MIC-AZ-120T00
Microsoft Dynamics 365 Marketing
CODE: WGAC-MIC-MB-220T00
Designing and Implementing Microsoft Azure Networking Solutions
CODE: WGAC-MIC-AZ-700T00
Microsoft Dynamics 365 Fundamentals Customer Engagement Apps (CRM)
CODE: WGAC-MIC-MB-910T00
Designing and Implementing an Azure AI Solution - AI-100T01
CODE: WGAC-MIC-AI-100T01
Microsoft Security Operations Analyst
CODE: WGAC-MIC-SC-200T00
Dynamics 365 Fundamentals - MB-900T01
CODE: WGAC-MIC-MB-900T01
Microsoft Power Platform Fundamentals
CODE: WGAC-MIC-PL-900T00
Microsoft Dynamics 365 Sales
CODE: WGAC-MIC-MB-210T01
Microsoft Azure IoT Developer
CODE: WGAC-MIC-AZ-220T00
Microsoft Azure AI Fundamentals
CODE: WGAC-MIC-AI-900T00
Microsoft Azure Architect Design - AZ-304T00
CODE: WGAC-MIC-AZ-304T00
Designing and Implementing Cloud-Native Applications Using Microsoft Azure Cosmos DB
CODE: WGAC-MIC-DP-420T00
Microsoft Dynamics 365: Finance and Operations Apps Developer
CODE: WGAC-MIC-MB-500
Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub
CODE: WGAC-MIC-AZ-600T00
Microsoft Dynamics 365 Supply Chain Management
CODE: WGAC-MIC-MB-330T00
Administering a SQL Database Infrastructure - 20764
CODE: WGAC-MIC-20764
Microsoft Power Platform Solution Architect
CODE: WGAC-MIC-PL-600T00
Microsoft 365 Identity and Services
CODE: WGAC-MIC-MS-100T00
Building applications and solutions with Microsoft 365 core services
CODE: WGAC-MIC-MS-600T00
Microsoft 365 Security Administration
CODE: WGAC-MIC-MS-500T00
Microsoft Teams Voice Engineer
CODE: WGAC-MIC-MS-720T00
Power Platform App Maker
CODE: WGAC-MIC-PL-100T00
Microsoft Azure technologies for AWS Architects
CODE: WGAC-MIC-AZ-030T00
Azure Architect Technologies - AZ-303T00
CODE: WGAC-MIC-AZ-303T00
Windows Client
CODE: WGAC-MIC-MD-100T00
Querying Data with TransactSQL - 20761
CODE: WGAC-MIC-20761
Microsoft Information Protection Administrator
CODE: WGAC-MIC-SC-400T00
Microsoft Azure Data Fundamentals
CODE: WGAC-MIC-DP-900T00
Microsoft Dynamics 365 Fundamentals Finance and Operations Apps (ERP)
CODE: WGAC-MIC-MB-920T00
Microsoft Identity and Access Administrator
CODE: WGAC-MIC-SC-300T00
Microsoft Cybersecurity Architect
CODE: WGAC-MIC-SC-100T00
Microsoft Azure Fundamentals (1 Day)
CODE: WGAC-MIC-AZ-900T01
Microsoft Dynamics 365 Supply Chain Management, Manufacturing
CODE: WGAC-MIC-MB-320T00
Microsoft Azure Security Technologies
CODE: WGAC-MIC-AZ-500T00
Microsoft 365 Messaging
CODE: WGAC-MIC-MS-203T00
Configuring Windows Server Hybrid Advanced Services
CODE: WGAC-MIC-AZ-801T00
Microsoft Azure solutions for AWS Developers
CODE: WGAC-MIC-AZ-020T00
Microsoft Security, Compliance, and Identity Fundamentals
CODE: WGAC-MIC-SC-900T00
Microsoft Dynamics 365 Field Service
CODE: WGAC-MIC-MB-240T00
Implementing a Machine Learning Solution with Azure Databricks
CODE: WGAC-MIC-DP-090T00
Administering Relational Databases on Microsoft Azure
CODE: WGAC-MIC-DP-300T00
Managing Microsoft Teams
CODE: WGAC-MIC-MS-700T00
Designing an Azure Data Solution - DP-201T01
CODE: WGAC-MIC-DP-201T01
Microsoft Azure Fundamentals
CODE: WGAC-MIC-AZ-900T00
Designing and Implementing Microsoft DevOps Solutions - AZ-400T00
CODE: WGAC-MIT-AZ-400T00
Data Engineering on Microsoft Azure
CODE: WGAC-MIC-DP-203T00
Microsoft Power Platform Functional Consultant
CODE: WGAC-MIC-PL-200T00
Microsoft Dynamics 365 Customer Service
CODE: WGAC-MIC-MB-230T01
Transact-SQL Querying
CODE: WGAC-MIC-DP-080T00
Microsoft Dynamics 365: Finance and Operations Apps Solution Architect
CODE: WGAC-MIC-MB-700T00
Automating Administration with PowerShell
CODE: WGAC-MIC-AZ-040T00
Power Platform Developer
CODE: WGAC-MIC-PL-400T00
Azure Stack HCI
CODE: WGAC-MIC-WS-013T00
Administering Windows Server Hybrid Core Infrastructure
CODE: WGAC-MIC-AZ-800T00
Configuring and Operating Microsoft Azure Virtual Desktop
CODE: WGAC-MIC-AZ-140T00
Microsoft Dynamics 365 Finance
CODE: WGAC-MIC-MB-310T00
Designing and Implementing a Data Science Solution on Azure
CODE: WGAC-MIC-DP-100T01
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.