SC-100

Exam SC-100: Microsoft Cybersecurity Architect

This exam measures your ability to accomplish the following technical tasks: design a Zero Trust strategy and architecture; evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies; design security for infrastructure; and design a strategy for data and applications.

Exam SC-100: Microsoft Cybersecurity Architect – Learn | Microsoft Docs

Learning Paths in the SC-100 Certification

  1. Learning Path 1: Design a Zero Trust strategy and architecture
    1. Module 1: Build an overall security strategy and architecture (Completed)
    2. Module 2: Design a security operations strategy (Completed)
    3. Module 3: Design an identity security strategy (Completed)
  2. Learning Path 2: Evaluate Risk Compliance (GRC) technical strategies and security
    1. Module 1: Evaluate a regulatory compliance strategy (Completed)
    2. Module 2: Evaluate security posture and recommend technical strategies to manage risk (Completed)
  3. Learning Path 3: Design security for infrastructure
    1. Module 1: Understand architecture best practices and how they are changing with the Cloud (Completed)
    2. Module 2: Design a strategy for securing server and client endpoints (Completed)
    3. Module 3: Design a strategy for securing PaaS, IaaS, and SaaS services (In progress)
  4. Learning Path 4: Design a strategy for data and applications
    1. Module 1: Specify security requirements for applications (Completed)
    2. Module 2: Design a strategy for securing data (Not Started)

Course 1: SC-100: Design a Zero Trust strategy and architecture – Module 1 of 3

  1. Introduction – Learn | Microsoft Docs
  2. Understand security operations frameworks, processes, and procedures – Learn | Microsoft Docs
  3. Design a logging and auditing security strategy – Learn | Microsoft Docs
  4. Develop security operations for hybrid and multi-cloud environments – Learn | Microsoft Docs
  5. Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) – Learn | Microsoft Docs
  6. Evaluate security workflows – Learn | Microsoft Docs
  7. Review security strategies for incident management – Learn | Microsoft Docs
  8. Evaluate security operations for technical threat intelligence – Learn | Microsoft Docs
  9. Monitor sources for insights on threats and mitigations – Learn | Microsoft Docs
  10. Exercise: Design a security operations strategy – Learn | Microsoft Docs
  11. Knowledge check – Learn | Microsoft Docs
  12. Summary – Learn | Microsoft Docs

Build an overall s

ecurity strategy and architecture

Build an overall security strategy and architecture – Learn | Microsoft Docs

SC-100: Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies

SC-100: Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies – Learn | Microsoft Docs

  1. Introduction – Learn | Microsoft Docs
  2. Evaluate security postures by using benchmarks – Learn | Microsoft Docs
  3. Evaluate security postures by using Microsoft Defender for Cloud – Learn | Microsoft Docs
  4. Evaluate security hygiene of cloud workloads – Learn | Microsoft Docs
  5. Design security for an Azure Landing Zone – Learn | Microsoft Docs
  6. Interpret technical threat intelligence and recommend risk mitigations – Learn | Microsoft Docs
    • Identify technical threat intelligence
      • Cyber threat intelligence (CTI) can come from many sources
      • CTI provides essential context for unusual activity
      • The most utilized CTI in SIEM solutions like Microsoft Sentinel is threat indicator data, sometimes called Indicators of Compromise (IoCs). 
  7. Evaluate security postures by using secure scores – Learn | Microsoft Docs
  8. Recommend security capabilities or controls to mitigate identified risks – Learn | Microsoft Docs
    • Security capabilities and controls to mitigate the identified risks.
      • Identification
      • Assessment
      • Response
      • Monitoring and reporting
  9. Exercise: Evaluate security posture and recommend technical strategies to manage risk – Learn | Microsoft Docs
  10. Knowledge check – Learn | Microsoft Docs
    • Protect: proactive measures that needs to be done to enhance the security hygiene of your workloads
    • Work automation: used to expedite notifications to workload owners when new security recommendations are available
    • Azure ID Identity Protection: Risk detection capability
  11. Summary – Learn | Microsoft Docs

SC-100: Design a strategy for data and applications

Module 1: Specify security requirements for applications – Learn | Microsoft Docs

  1. xx
  2. xxx
  3. xxx
  4. xxx
  5. Specify a security strategy for applications and APIs – Learn | Microsoft Docs

Design a strategy for securing data

Design a strategy for securing data – Learn | Microsoft Docs

Learn how to design a cybersecurity strategy to secure data.

Learning objectives

Upon completion of this module, the learner will be able to:

  • Specify priorities for mitigating threats to data.
  • Design a strategy to identify and protect sensitive data.
  • Specify an encryption standard for data at rest and in motion.

Prerequisites

  • Experience with data security methods, including encryption for data at rest and in transit

This module is part of these learning paths

Additional References

  1. Azure security documentation | Microsoft Docs
  2. MITRE ATT&CK®

Videos and Demos

  1. Live response in Microsoft Defender for Endpoints
  2. Secure Score