> Formations > Microsoft Cybersecurity Architect (Microsoft SC-100)
Course : Microsoft Cybersecurity Architect (Microsoft SC-100)Official SC-100 course, exam preparation
Practical course - 4d
- 28h00 - Ref. SC1
|
![]() | Designing a global cybersecurity strategy for an organization |
![]() | Apply Zero Trust principles at all levels (users, data, applications, infrastructure) |
![]() | Define governance, risk management and compliance (GRC) policies |
![]() | Design security solutions for cloud (IaaS, PaaS, SaaS) and hybrid environments |
![]() | Coordinate security efforts between SecOps, identity, data and application teams |
![]() | Evaluate and improve security architecture on an ongoing basis |
Intended audience
Experienced, Microsoft-certified security engineers with expertise in identity, protection, security operations, data, applications and hybrid cloud environments.
Prerequisites
Good understanding of cybersecurity, governance, risk management and compliance concepts, with associate-level certification recommended (such as AZ-500, SC-200 or SC-300).
Practical details
Teaching methods
Training in French. Official course material in digital format and in English. Good understanding of written English.
Course schedule
1 Design solutions aligned with best practices and security priorities
- Introduction au Zero Trust et aux cadres de bonnes pratiques.
- Solutions basées sur le Cloud Adoption Framework et le Well-Architected Framework.
- Solutions conformes au MCRA et au Microsoft Cloud Security Benchmark.
- Resilience strategies against ransomware and advanced attacks.
2 XX
- Design solutions for regulatory compliance.
- Design identity and access management solutions.
- Design solutions to secure privileged access.
- Design solutions for security operations.
Case study
Modernize identity and data security, user access control and threat resilience.
3 Designing security solutions for applications and data
- Designing Microsoft 365 security.
- Designing application security.
- Design solutions to secure an organization's data.
Case study
Secure applications and data.
4 Designing security solutions for infrastructure
- Specify security requirements for SaaS, PaaS and IaaS services.
- Design security posture management in hybrid and multicloud environments.
- Design solutions to secure server and client terminals.
- Design network security solutions.
Case study
Secure terminals and infrastructure.
Options
Certification : 200 € HT
Obtaining one of these certifications is strongly recommended for the SC-100 exam: AZ-500, SC-200 or SC-300. Successful completion of the SC-100 exam leads to certification as a Microsoft Certified Cybersecurity Architect Expert.
Comment passer votre examen ?
Comment passer votre examen ?
The certification option comes in the form of a voucher and practice tests that will allow you to practise and take the exam at the end of the training course.
PARTICIPANTS
Experienced, Microsoft-certified security engineers with expertise in identity, protection, security operations, data, applications and hybrid cloud environments.
PREREQUISITES
Good understanding of cybersecurity, governance, risk management and compliance concepts, with associate-level certification recommended (such as AZ-500, SC-200 or SC-300).
TRAINER QUALIFICATIONS
The experts who lead the training courses are specialists in the subjects covered. They are approved by the publisher and certified for the course. They have also been validated by our teaching teams in terms of both professional knowledge and teaching skills for each course they teach. They have at least three to ten years of experience in their field and hold or have held positions of responsibility in companies.
TERMS AND DEADLINES
Registration must be completed 24 hours before the start of the training course.
ACCESSIBILITY FOR PEOPLE WITH DISABILITIES
Do you have specific accessibility requirements? Contact Ms FOSSE, disability advisor, at the following address: psh-accueil@orsys.fr so that we can assess your request and its feasibility.
Experienced, Microsoft-certified security engineers with expertise in identity, protection, security operations, data, applications and hybrid cloud environments.
PREREQUISITES
Good understanding of cybersecurity, governance, risk management and compliance concepts, with associate-level certification recommended (such as AZ-500, SC-200 or SC-300).
TRAINER QUALIFICATIONS
The experts who lead the training courses are specialists in the subjects covered. They are approved by the publisher and certified for the course. They have also been validated by our teaching teams in terms of both professional knowledge and teaching skills for each course they teach. They have at least three to ten years of experience in their field and hold or have held positions of responsibility in companies.
ASSESSMENT TERMS
Assessment of targeted skills prior to training.
Assessment by the participant, at the end of the training course, of the skills acquired during the training course.
Validation by the trainer of the participant's learning outcomes, specifying the tools used: multiple-choice questions, role-playing exercises, etc.
At the end of each training course, ITTCERT provides participants with a course evaluation questionnaire, which is then analysed by our teaching teams. Participants also complete an official evaluation of the publisher.
An attendance sheet for each half-day of attendance is provided at the end of the training course, along with a certificate of completion if the participant has attended the entire session.
Assessment of targeted skills prior to training.
Assessment by the participant, at the end of the training course, of the skills acquired during the training course.
Validation by the trainer of the participant's learning outcomes, specifying the tools used: multiple-choice questions, role-playing exercises, etc.
At the end of each training course, ITTCERT provides participants with a course evaluation questionnaire, which is then analysed by our teaching teams. Participants also complete an official evaluation of the publisher.
An attendance sheet for each half-day of attendance is provided at the end of the training course, along with a certificate of completion if the participant has attended the entire session.
TEACHING AIDS AND TECHNICAL RESOURCES
The teaching resources used are the publisher's official materials and practical exercises.
The teaching resources used are the publisher's official materials and practical exercises.
TERMS AND DEADLINES
Registration must be completed 24 hours before the start of the training course.
ACCESSIBILITY FOR PEOPLE WITH DISABILITIES
Do you have specific accessibility requirements? Contact Ms FOSSE, disability advisor, at the following address: psh-accueil@orsys.fr so that we can assess your request and its feasibility.
Dates and locations
Dernières places
Date garantie en présentiel ou à distance
Session garantie
Download in PDF format
Share this course by email
