Esquema Detallado del Curso
Module 1: SC-100: Design solutions that align with security best practices and priorities
- Introduction to Zero Trust and best practice frameworks
- Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
- Case study: Design solutions that align with security best practices and priorities
Module 2: SC-100: Design security operations, identity, and compliance capabilities
- Design solutions for regulatory compliance
- Design solutions for identity and access management
- Design solutions for securing privileged access
- Design solutions for security operations
- Case study: Design security operations, identity and compliance capabilities
Module 3: SC-100: Design security solutions for applications and data
- Design solutions for securing Microsoft 365
- Design solutions for securing applications
- Design solutions for securing an organization's data
- Case study: Design security solutions for applications and data
Module 4: SC-100: Design security solutions for infrastructure
- Specify requirements for securing SaaS, PaaS, and IaaS services
- Design solutions for security posture management in hybrid and multicloud environments
- Design solutions for securing server and client endpoints
- Design solutions for network security
- Case study: Design security solutions for infrastructure