Zum Hauptinhalt springen Skip to page footer

Microsoft Modern Workplace

SC-100T00: Microsoft Cybersecurity Architect

Dies ist ein Fortgeschrittenenkurs auf Expertenniveau. Lernenden wird dringend empfohlen, vor der Teilnahme an diesem Kurs eine andere Zertifizierung im Portfolio „Sicherheit, Compliance und Identität“ auf Associate-Niveau zu erwerben (z. B. AZ-500, SC-200 oder SC-300) – dies ist allerdings keine Teilnahmevoraussetzung. Dieser Kurs vermittelt den Teilnehmern das notwendige Wissen, um Cybersicherheitsstrategien in den folgenden Bereichen zu entwerfen und zu bewerten: Zero Trust, Governance Risk Compliance (GRC), Security Operations (SecOps) sowie Daten und Anwendungen. Die Kursteilnehmer lernen außerdem, wie Sie Lösungen mit Zero Trust-Prinzipien entwerfen und Sicherheitsanforderungen für Cloudinfrastruktur in verschiedenen Dienstmodellen (SaaS, PaaS, IaaS) angeben.

Was werden Sie in diesem Seminar erlernen?

 

Agenda

  • Introduction to Zero Trust and best practice frameworks
    • Introduction to best practices
    • Introduction to Zero Trust
    • Zero Trust initiatives
    • Zero Trust technology pillars part
    • Zero Trust technology pillars part 2
  • Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
    • Define a security strategy
    • Introduction to the Cloud Adoption Framework
    • Cloud Adoption Framework secure methodology
    • Introduction to Azure Landing Zones
    • Design security with Azure Landing Zones
    • Introduction to the Well-Architected Framework
    • The Well-Architected Framework security pillar
    • Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
    • Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
    • Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
    • Design solutions with best practices for capabilities and controls
    • Design solutions with best practices for attack protection
  • Design a resiliency strategy for common cyberthreats like ransomware
    • Common cyberthreats and attack patterns
    • Support business resiliency
    • Ransomware protection
    • Configurations for secure backup and restore
    • Security updates
  • Case study: Design solutions that align with security best practices and priorities
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
  • Design solutions for regulatory compliance
    • Introduction to regulatory compliance
    • Translate compliance requirements into a security solution
    • Address compliance requirements with Microsoft Purview
    • Address privacy requirements with Microsoft Priva
    • Address security and compliance requirements with Azure policy
    • Evaluate infrastructure compliance with Defender for Cloud
  • Design solutions for identity and access management
    • Introduction to Identity and Access Management
    • Design cloud, hybrid and multicloud access strategies (including Azure AD)
    • Design a solution for external identities
    • Design modern authentication and authorization strategies
    • Align conditional access and Zero Trust
    • Specify requirements to secure Active Directory Domain Services (AD DS)
    • Design a solution to manage secrets, keys, and certificates
  • Design solutions for securing privileged access
    • The enterprise access model
    • Design identity governance solutions
    • Design a solution to secure tenant administration
    • Design a solution for cloud infrastructure entitlement management (CIEM)
    • Design a solution for privileged access workstations and bastion services
  • Design solutions for security operations
    • Introduction to Security operations (SecOps)
    • Design security operations capabilities in hybrid and multicloud environments
    • Design centralized logging and auditing
    • Design security information and event management (SIEM) solutions
    • Design solutions for detection and response
    • Design a solution for security orchestration, automation, and response (SOAR)
    • Design security workflows
    • Design threat detection coverage
  • Case study: Design security operations, identity and compliance capabilities
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
    • Design solutions for securing Microsoft 365
    • Introduction to security for Exchange, Sharepoint, OneDrive and Teams
    • Evaluate security posture for collaboration and productivity workloads
    • Design a Microsoft 365 Defender solution
    • Design configurations and operational practices for Microsoft 365
  • Design solutions for securing applications
    • Introduction to application security
    • Design and implement standards to secure application development
    • Evaluate security posture of existing application portfolios
    • Design security lifecycle strategy for applications
    • Secure access for workload identities
    • Design a solution for API management and security
    • Design a solution for secure access to applications
  • Design solutions for securing an organization's data
    • Introduction to data security
    • Design a solution for data discovery and classification using Microsoft Purview
    • Design a solution for data protection
    • Design data security for Azure workloads
    • Design security for Azure Storage
    • Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
  • Case study: Design security solutions for applications and data
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
  • Specify requirements for securing SaaS, PaaS, and IaaS services
    • Introduction to security for SaaS, PaaS, and IaaS
    • Specify security baselines for SaaS, PaaS, and IaaS services
    • Specify security requirements for web workloads
    • Specify security requirements for containers and container orchestration
  • Design solutions for security posture management in hybrid and multicloud environments
    • Introduction to hybrid and multicloud posture management
    • Evaluate security posture by using Microsoft Cloud Security Benchmark
    • Design integrated posture management and workload protection
    • Evaluate security posture by using Microsoft Defender for Cloud
    • Posture evaluation with Microsoft Defender for Cloud secure score
    • Design cloud workload protection with Microsoft Defender for Cloud
    • Integrate hybrid and multicloud environments with Azure Arc
    • Design a solution for external attack surface management
    • Knowledge check - Design solutions for security posture management in hybrid and multicloud environments
  • Design solutions for securing server and client endpoints
    • Introduction to endpoint security
    • Specify server security requirements
    • Specify requirements for mobile devices and clients
    • Specify internet of things (IoT) and embedded device security requirements
    • Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
    • Specify security baselines for server and client endpoints
    • Design a solution for secure remote access
  • Design solutions for network security
    • Design solutions for network segmentation
    • Design solutions for traffic filtering with network security groups
    • Design solutions for network posture management
    • Design solutions for network monitoring
    • Knowledge check - Design solutions for network security
  • Case study: Design security solutions for infrastructure
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough

Zielgruppe

Voraussetzungen

Partner

Infos zur Zertifizierung

Termine

18.11.2024 (4 Tage) Garantietermin
Online
2485,00 EUR zzgl. 19% MwSt.

 
20.01.2025 (4 Tage)
Online
2485,00 EUR zzgl. 19% MwSt.

 
07.04.2025 (4 Tage) Garantietermin
Online
2485,00 EUR zzgl. 19% MwSt.

 
11.08.2025 (4 Tage)
Online
2485,00 EUR zzgl. 19% MwSt.

 
09.12.2025 (4 Tage) Garantietermin
Online
2485,00 EUR zzgl. 19% MwSt.

 
Teilnehmer:in buchen für:

Pflichtfelder sind mit * markiert.

Teilnehmende Person
Rechnungsadresse (falls abweichend)
Anzahl: 1
Beschreibung:
E-Preis netto:
MwSt. 19%:
Gesamt brutto:

Bitte bestätigen Sie, dass Sie die Datenschutzhinweise gelesen haben:

Seminarname

Ihr Ansprechpartner: Andreas Stammhammer

Andreas Stammhammer

Standorte Braunschweig und Hannover

Gerne stehe ich Ihnen persönlich bei allen Fragen zur Verfügung!
Telefon: 0531 70224942
E-Mail: a.stammhammer@kaemmer-consulting.de

Ihre Angaben

Pfllichtfelder sind mit * markiert

This Site is protected by WEBOUNCER