Exam SC-100: Microsoft Cybersecurity Architect
This exam measures your ability to accomplish the following technical tasks: design a Zero Trust strategy and architecture; evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies; design security for infrastructure; and design a strategy for data and applications.
Exam SC-100: Microsoft Cybersecurity Architect – Learn | Microsoft Docs
Learning Paths in the SC-100 Certification
- Learning Path 1: Design a Zero Trust strategy and architecture
- Module 1: Build an overall security strategy and architecture (Completed)
- Module 2: Design a security operations strategy (Completed)
- Module 3: Design an identity security strategy (Completed)
- Learning Path 2: Evaluate Risk Compliance (GRC) technical strategies and security
- Module 1: Evaluate a regulatory compliance strategy (Completed)
- Module 2: Evaluate security posture and recommend technical strategies to manage risk (Completed)
- Learning Path 3: Design security for infrastructure
- Module 1: Understand architecture best practices and how they are changing with the Cloud (Completed)
- Module 2: Design a strategy for securing server and client endpoints (Completed)
- Module 3: Design a strategy for securing PaaS, IaaS, and SaaS services (In progress)
- Learning Path 4: Design a strategy for data and applications
- Module 1: Specify security requirements for applications (Completed)
- Module 2: Design a strategy for securing data (Not Started)
Course 1: SC-100: Design a Zero Trust strategy and architecture – Module 1 of 3
- Introduction – Learn | Microsoft Docs
- Understand security operations frameworks, processes, and procedures – Learn | Microsoft Docs
- Design a logging and auditing security strategy – Learn | Microsoft Docs
- Develop security operations for hybrid and multi-cloud environments – Learn | Microsoft Docs
- Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) – Learn | Microsoft Docs
- Evaluate security workflows – Learn | Microsoft Docs
- Review security strategies for incident management – Learn | Microsoft Docs
- Evaluate security operations for technical threat intelligence – Learn | Microsoft Docs
- Monitor sources for insights on threats and mitigations – Learn | Microsoft Docs
- Exercise: Design a security operations strategy – Learn | Microsoft Docs
- Knowledge check – Learn | Microsoft Docs
- Summary – Learn | Microsoft Docs
Build an overall s
ecurity strategy and architecture
Build an overall security strategy and architecture – Learn | Microsoft Docs
SC-100: Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Introduction – Learn | Microsoft Docs
- Evaluate security postures by using benchmarks – Learn | Microsoft Docs
- Evaluate security postures by using Microsoft Defender for Cloud – Learn | Microsoft Docs
- Evaluate security hygiene of cloud workloads – Learn | Microsoft Docs
- Design security for an Azure Landing Zone – Learn | Microsoft Docs
- Video: A landing zone is an environment for hosting your workloads
- Security design configurations
- Security alerts
- Security logs
- Security controls
- Vulnerability management
- Shared responsibility
- Encryption keys
- Security in the Azure landing zone accelerator
- Interpret technical threat intelligence and recommend risk mitigations – Learn | Microsoft Docs
- Identify technical threat intelligence
- Cyber threat intelligence (CTI) can come from many sources
- CTI provides essential context for unusual activity
- The most utilized CTI in SIEM solutions like Microsoft Sentinel is threat indicator data, sometimes called Indicators of Compromise (IoCs).
- Identify technical threat intelligence
- Evaluate security postures by using secure scores – Learn | Microsoft Docs
- Recommend security capabilities or controls to mitigate identified risks – Learn | Microsoft Docs
- Security capabilities and controls to mitigate the identified risks.
- Identification
- Assessment
- Response
- Monitoring and reporting
- Security capabilities and controls to mitigate the identified risks.
- Exercise: Evaluate security posture and recommend technical strategies to manage risk – Learn | Microsoft Docs
- Knowledge check – Learn | Microsoft Docs
- Protect: proactive measures that needs to be done to enhance the security hygiene of your workloads
- Work automation: used to expedite notifications to workload owners when new security recommendations are available
- Azure ID Identity Protection: Risk detection capability
- Summary – Learn | Microsoft Docs
SC-100: Design a strategy for data and applications
Module 1: Specify security requirements for applications – Learn | Microsoft Docs
Design a strategy for securing data
Design a strategy for securing data – Learn | Microsoft Docs
Learn how to design a cybersecurity strategy to secure data.
Learning objectives
Upon completion of this module, the learner will be able to:
- Specify priorities for mitigating threats to data.
- Design a strategy to identify and protect sensitive data.
- Specify an encryption standard for data at rest and in motion.
Prerequisites
- Experience with data security methods, including encryption for data at rest and in transit
This module is part of these learning paths
- Introduction
- Prioritize mitigating threats to data
- Design a strategy to identify and protect sensitive data
- Specify an encryption standard for data at rest and in motion
- Exercise: Design a strategy for securing data
- Knowledge check
- Summary