Microsoft
Microsoft Logo

SC 100: Design a Zero Trust strategy and architecture 

  • Offered byMicrosoft

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Overview

Duration

4 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Advanced

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Course details

What are the course deliverables?
  • Build an overall security strategy and architecture
  • Design a security operations strategy
  • Design an identity security strategy
More about this course
  • Learn how to design an organizations security strategy, including security operations and identity based on the principles of Zero Trust
  • This learning path helps prepare you for Exam SC-100: Microsoft Cybersecurity Architect
  • Learn how to build an overall security strategy and architecture with zero trust in mind
  • Learn how to design a cybersecurity strategy for security operations (SecOps)

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Curriculum

Build an overall security strategy and architecture

Introduction

Zero Trust overview

Develop Integration points in an architecture

Develop security requirements based on business goals

Translate security requirements into technical capabilities

Design security for a resiliency strategy

Design a security strategy for hybrid and multi-tenant environments

Design technical and governance strategies for traffic filtering and segmentation

Exercise: Build an overall security strategy and architecture

Knowledge check

Summary

Design a security operations strategy

Introduction

Understand security operations frameworks, processes, and procedures

Design a logging and auditing security strategy

Develop security operations for hybrid and multi-cloud environments

Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR)

Evaluate security workflows

Review security strategies for incident management

Evaluate security operations for technical threat intelligence

Monitor sources for insights on threats and mitigations

Exercise: Design a security operations strategy

Knowledge check

Summary

Design an identity security strategy

Introduction

Secure access to cloud resources

Recommend an identity store for security

Recommend secure authentication and security authorization strategies

Secure conditional access

Design a strategy for role assignment and delegation

Define Identity governance for access reviews and entitlement management

Design a security strategy for privileged role access to infrastructure

Design a security strategy for privileged activities

Exercise: Design an identity security strategy

Knowledge check

Summary

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Admission Process

    Important Dates

    Nov 30, 2024
    Course Commencement Date

    Other courses offered by Microsoft

    Free
    2 hours
    Intermediate
    Free
    4 hours
    Intermediate
    Free
    5 hours
    Beginner
    Free
    1 hours
    Beginner
    View Other 1171 CoursesRight Arrow Icon
    qna

    SC 100: Design a Zero Trust strategy and architecture
     at 
    Microsoft 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...