Microsoft Cybersecurity Architect

by Spectrum Networks Claim Listing

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Spectrum Networks Logo

img Duration

Please Enquire

Course Details

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class.

This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

 

Audience Profile:

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications.

They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

 

At Course Completion:

  • Design a Zero Trust strategy and architecture
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
  • Design security for infrastructure
  • Design a strategy for data and applications

 

Course Details:

  • Module 1: Introduction to Zero Trust and best practice frameworks
  • Understand how to use best practices as a cybersecurity architect
  • Understand the concept of Zero Trust and how it can be used to modernize an organizations cybersecurity
  • Understand when to use different best practice frameworks like MCRA, CAF and WAF
  • Module 2: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Understand the Cloud Adoption Framework and how it can be used to accelerate and secure an organizations move to the cloud
  • Understand the Well-Architected Framework and how it can be used to design solutions in the cloud that adhere to sound design principles including security
  • Module 3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
  • Understand how to use Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) to design more secure solutions
  • Module 4: Design a resiliency strategy for common cyberthreats like ransomware
  • Understand common cyberthreats like ransomware
  • Understand how to support business resiliency
  • Design configurations for secure backup and restore
  • Design solutions for managing security updates
  • Module 5: Case study: Design solutions that align with security best practices and priorities
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Module 6: Design solutions for regulatory compliance
  • Translate compliance requirements into a security solution
  • Address compliance requirements with Microsoft Purview
  • Design a solution to address privacy requirements with Microsoft Priva
  • Design Azure Policy solutions to address security and compliance requirements
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud
  • Module 7: Design solutions for identity and access management
  • Design cloud, hybrid and multicloud access strategies
  • Design a solution for Azure Active Directory (Azure AD), part of Microsoft Entra
  • Design a solution for external identities
  • Design modern authentication and authorization strategies
  • Specify requirements to secure Active Directory Domain Services
  • Design a solution to manage secrets, keys, and certificates
  • Module 8: Design solutions for securing privileged access
  • Understand privileged access and the Enterprise Access Model
  • Design identity governance solutions
  • Design a solution for securing administration of cloud tenants
  • Design for cloud infrastructure entitlement management
  • Module 9: Design solutions for security operations
  • Design security operations capabilities in hybrid and multicloud environments
  • Design centralized logging and auditing
  • Design Security Event Management (SIEM) solutions
  • Design a solution for detection and response that includes Extended Detection and Response (XDR)
  • Design a solution for security orchestration, automation and response (SOAR)
  • Design security workflows
  • Design and evaluate threat detection with the MITRE ATT&CK framework
  • Module 10: Case study: Design security operations, identity and compliance capabilities
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Module 11: Design solutions for securing Microsoft 365
  • Evaluate security posture for collaboration and productivity workloads
  • Design a Microsoft 365 Defender solution
  • Design configurations and operational practices for Microsoft 365
  • Module 12: Design solutions for securing applications
  • Evaluate security posture of existing application portfolios
  • Evaluate threats to business-critical applications by using threat modeling
  • Design and implement a full lifecycle strategy for application security
  • Design and implement standards and practices for securing the application development process
  • Design a solution for workload identity to authenticate and access Azure cloud resources
  • Design a solution for API management and security
  • Design a solution for secure access to applications
  • Module 13: Design solutions for securing an organization's data
  • Design a solution for data discovery and classification using Microsoft Purview
  • Specify priorities for mitigating threats to data
  • Design a solution for protection of data at rest, data in motion, and data in use
  • Design a security solution for data in Azure workloads
  • Design a security solution for data in Azure Storage
  • Design a security solution that includes Microsoft Defender for SQL and Microsoft Defender for Storage
  • Module 14: Case study: Design security solutions for applications and data
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Module 15: Specify requirements for securing SaaS, PaaS, and IaaS services
  • Specify security baselines for SaaS, PaaS, and IaaS services
  • Specify security requirements for IoT workloads
  • Specify security requirements for web workloads
  • Specify security requirements for containers and container orchestration
  • And more.
  • Thane Branch

    304, Nitco Biz Park, Road No. 16U, Thane

Check out more Cybersecurity courses in India

Quagmireits IT Services Logo

Cyber Security Masterclass

Discover the essentials of cybersecurity in our course. Learn to safeguard digital assets, defend against cyber threats, and become a trusted guardian of online security. Join us to master the skills needed to protect against today’s digital risks.

by Quagmireits IT Services [Claim Listing ]
Sysinfocom Logo

Cyber Security

Cyber Security course is offered by Sysinfocom. Sysinfocom is a leading Linux, DevOps and Cloud training centre in Chandigarh with International certification. Sysinfocom is an Authorised Redhat Training and Examination center in Chandigarh and a Tech Support and Development Company.

by Sysinfocom [Claim Listing ]
Global Institute of Cyber Security and Ethical Hacking Logo

Computer Forensic

Computer forensic training certification validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. We are an authorized training partner of EC Council from last 10 years.

by Global Institute of Cyber Security and Ethical Hacking [Claim Listing ]
DSL (D Succeed Learners) Logo

Certified In The Governance of Enterprise IT (CGEIT)

The Certified in the Governance of Enterprise IT (CGEIT) certification validates professionals' skills for their knowledge and application of enterprise IT governance principles and practices. With the help of the CGEIT training program, you will elevate your knowledge.

by DSL (D Succeed Learners) [Claim Listing ]
Codevirus Security Logo

Certified Hacking Forensic Investigation Course

Cyber Forensics is a skillset of procedures used for doing numerous investigations related to encrypted, broken, or tampered IoT devices, or e-copies of distinguished data files. Most of the data is on servers in today’s world, hence, the collection of the concerning data as concrete evidence.

by Codevirus Security [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy