Microsoft
Microsoft Logo

SC 100: Design a Zero Trust strategy and architecture 

  • Offered byMicrosoft

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Overview

Duration

4 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Advanced

Official Website

Explore Free Course External Link Icon

Credential

Certificate

SC 100: Design a Zero Trust strategy and architecture
Table of content
Accordion Icon V3
  • Overview
  • Course Details
  • Curriculum
  • Entry Requirements
Details Icon

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Course details

What are the course deliverables?
  • Build an overall security strategy and architecture
  • Design a security operations strategy
  • Design an identity security strategy
More about this course
  • Learn how to design an organizations security strategy, including security operations and identity based on the principles of Zero Trust
  • This learning path helps prepare you for Exam SC-100: Microsoft Cybersecurity Architect
  • Learn how to build an overall security strategy and architecture with zero trust in mind
  • Learn how to design a cybersecurity strategy for security operations (SecOps)

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Curriculum

Build an overall security strategy and architecture

Introduction

Zero Trust overview

Develop Integration points in an architecture

Develop security requirements based on business goals

Translate security requirements into technical capabilities

Design security for a resiliency strategy

Design a security strategy for hybrid and multi-tenant environments

Design technical and governance strategies for traffic filtering and segmentation

Exercise: Build an overall security strategy and architecture

Knowledge check

Summary

Design a security operations strategy

Introduction

Understand security operations frameworks, processes, and procedures

Design a logging and auditing security strategy

Develop security operations for hybrid and multi-cloud environments

Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR)

Evaluate security workflows

Review security strategies for incident management

Evaluate security operations for technical threat intelligence

Monitor sources for insights on threats and mitigations

Exercise: Design a security operations strategy

Knowledge check

Summary

Design an identity security strategy

Introduction

Secure access to cloud resources

Recommend an identity store for security

Recommend secure authentication and security authorization strategies

Secure conditional access

Design a strategy for role assignment and delegation

Define Identity governance for access reviews and entitlement management

Design a security strategy for privileged role access to infrastructure

Design a security strategy for privileged activities

Exercise: Design an identity security strategy

Knowledge check

Summary

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
1 hours
Beginner
Free
3 hours
Intermediate
Free
14 hours
Beginner
Free
2 hours
Intermediate
View Other 1171 CoursesRight Arrow Icon
qna

SC 100: Design a Zero Trust strategy and architecture
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...