SC-100T00: Microsoft Cybersecurity Architect

Dies ist ein Fortgeschrittenenkurs auf Expertenniveau. Lernenden wird dringend empfohlen, vor der Teilnahme an diesem Kurs eine andere Zertifizierung im Portfolio „Sicherheit, Compliance und Identität“ auf Associate-Niveau zu erwerben (z. B. AZ-500, SC-200 oder SC-300) – dies ist allerdings keine Teilnahmevoraussetzung. Dieser Kurs vermittelt den Teilnehmern das notwendige Wissen, um Cybersicherheitsstrategien in den folgenden Bereichen zu entwerfen und zu bewerten: Zero Trust, Governance Risk Compliance (GRC), Security Operations (SecOps) sowie Daten und Anwendungen. Die Kursteilnehmer lernen außerdem, wie Sie Lösungen mit Zero Trust-Prinzipien entwerfen und Sicherheitsanforderungen für Cloudinfrastruktur in verschiedenen Dienstmodellen (SaaS, PaaS, IaaS) angeben.

Physisch oder virtuell?

Nehmen Sie an einem unserer Standorte Frankfurt, München und Wien oder virtuell an unseren Klassenraumtrainings teil. Unter “Termin buchen” werden Ihnen alle Optionen angezeigt, zuerst sortiert nach Standort, dann nach Datum.

Dieser Kurs richtet sich an erfahrene Cloudsicherheitstechniker, die bereits eine Zertifizierung im Portfolio „Sicherheit, Compliance und Identität“ erworben haben. Die Lernenden sollten über umfassende Erfahrung und tiefgreifende Kenntnisse in vielen sicherheitstechnischen Bereichen verfügen, z. B. Identität und Zugriff, Plattformschutz, Sicherheitsfunktionen sowie Schutz für Daten und Anwendungen. Sie sollten auch Erfahrung mit Hybrid- und Cloudimplementierungen haben. Anfänger sollten stattdessen Kurs SC-900 zu den Grundlagen von Microsoft-Sicherheit, -Compliance und -Identität absolvieren. 
Es wird dringend empfohlen, eine der Zertifizierungen auf Associate-Ebene im Portfolio „Sicherheit, Compliance und Identität“ (z. B. AZ-500, SC-200 oder SC-300) absolviert und bestanden zu haben. Umfassende Erfahrung und tiefgreifende Kenntnisse bezüglich Identität und Zugriff, Plattformschutz, Sicherheitsvorgängen, Schützen von Daten und Sichern von Anwendungen. Erfahrung mit Hybrid- und Cloudimplementierungen. 

Wichtige Information

Dieses Training behandelt prüfungsrelevante Themen zum Examen: Microsoft Certified: Cybersecurity Architect Expert

Was werden Sie in diesem Training erlernen?

Agenda

Introduction to Zero Trust and best practice frameworks
Zero Trust technology pillars part 2
Zero Trust technology pillars part
Zero Trust initiatives
Introduction to Zero Trust
Introduction to best practices
Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
The Well-Architected Framework security pillar
Introduction to the Well-Architected Framework
Design security with Azure Landing Zones
Introduction to Azure Landing Zones
Cloud Adoption Framework secure methodology
Introduction to the Cloud Adoption Framework
Define a security strategy
Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
Design solutions with best practices for attack protection
Design solutions with best practices for capabilities and controls
Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
Design a resiliency strategy for common cyberthreats like ransomware
Security updates
Configurations for secure backup and restore
Ransomware protection
Support business resiliency
Common cyberthreats and attack patterns
Case study: Design solutions that align with security best practices and priorities
Technical walkthrough
Conceptual walkthrough
Case study answers
Case study description
Design solutions for regulatory compliance
Evaluate infrastructure compliance with Defender for Cloud
Address security and compliance requirements with Azure policy
Address privacy requirements with Microsoft Priva
Address compliance requirements with Microsoft Purview
Translate compliance requirements into a security solution
Introduction to regulatory compliance
Design solutions for identity and access management
Design a solution to manage secrets, keys, and certificates
Specify requirements to secure Active Directory Domain Services (AD DS)
Align conditional access and Zero Trust
Design modern authentication and authorization strategies
Design a solution for external identities
Design cloud, hybrid and multicloud access strategies (including Azure AD)
Introduction to Identity and Access Management
Design solutions for securing privileged access
Design a solution for privileged access workstations and bastion services
Design a solution for cloud infrastructure entitlement management (CIEM)
Design a solution to secure tenant administration
Design identity governance solutions
The enterprise access model
Design solutions for security operations
Design threat detection coverage
Design security workflows
Design a solution for security orchestration, automation, and response (SOAR)
Design solutions for detection and response
Design security information and event management (SIEM) solutions
Design centralized logging and auditing
Design security operations capabilities in hybrid and multicloud environments
Introduction to Security operations (SecOps)
Case study: Design security operations, identity and compliance capabilities
Design configurations and operational practices for Microsoft 365
Design a Microsoft 365 Defender solution
Evaluate security posture for collaboration and productivity workloads
Introduction to security for Exchange, Sharepoint, OneDrive and Teams
Design solutions for securing Microsoft 365
Technical walkthrough
Conceptual walkthrough
Case study answers
Case study description
Design solutions for securing applications
Design a solution for secure access to applications
Design a solution for API management and security
Secure access for workload identities
Design security lifecycle strategy for applications
Evaluate security posture of existing application portfolios
Design and implement standards to secure application development
Introduction to application security
Design solutions for securing an organization's data
Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
Design security for Azure Storage
Design data security for Azure workloads
Design a solution for data protection
Design a solution for data discovery and classification using Microsoft Purview
Introduction to data security
Case study: Design security solutions for applications and data
Technical walkthrough
Conceptual walkthrough
Case study answers
Case study description
Specify requirements for securing SaaS, PaaS, and IaaS services
Specify security requirements for containers and container orchestration
Specify security requirements for web workloads
Specify security baselines for SaaS, PaaS, and IaaS services
Introduction to security for SaaS, PaaS, and IaaS
Design solutions for security posture management in hybrid and multicloud environments
Knowledge check - Design solutions for security posture management in hybrid and multicloud environments
Design a solution for external attack surface management
Integrate hybrid and multicloud environments with Azure Arc
Design cloud workload protection with Microsoft Defender for Cloud
Posture evaluation with Microsoft Defender for Cloud secure score
Evaluate security posture by using Microsoft Defender for Cloud
Design integrated posture management and workload protection
Evaluate security posture by using Microsoft Cloud Security Benchmark
Introduction to hybrid and multicloud posture management
Design solutions for securing server and client endpoints
Design a solution for secure remote access
Specify security baselines for server and client endpoints
Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
Specify internet of things (IoT) and embedded device security requirements
Specify requirements for mobile devices and clients
Specify server security requirements
Introduction to endpoint security
Design solutions for network security
Knowledge check - Design solutions for network security
Design solutions for network monitoring
Design solutions for network posture management
Design solutions for traffic filtering with network security groups
Design solutions for network segmentation
Case study: Design security solutions for infrastructure
Technical walkthrough
Conceptual walkthrough
Case study answers
Case study description

Dein Training im Überblick

Dauer 4
Trainingssprache Deutsch
Trainingsart brainyCLASS (offen)

2.535,00 

Startdatum und Ort wählen

Terminübersicht