Close
Contact Us info@learnquest.com

??WelcomeName??
??WelcomeName??
« Important Announcement » Contact Us 877-206-0106 | USA Flag
Close
Close
Close
photo

Thank you for your interest in LearnQuest.

Your request is being processed and LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in Private Training.

We look forward to helping you develop the perfect training solution to help you meet your company's goals.

For immediate assistance, speak with one of our representatives using the chat module below. Otherwise, LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

Close
photo

Thank you for your interest in LearnQuest!

Now, you will be able to stay up-to-date on our latest course offerings, promotions, and training discounts. Watch your inbox for upcoming special offers.

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

Microsoft Cybersecurity Architect

Price
2,380 USD
4
MOC-SC-100T00
Classroom Training, Online Training
Microsoft

AWS Training Pass

Take advantage of flexible training options with the AWS Training Pass and get Authorized AWS Training for a full year.

Learn More

Prices reflect a 22.5% discount for IBM employees (wherever applicable).
Prices reflect a 24% discount for Kyndryl employees (wherever applicable).
Prices reflect the Accenture employee discount.
Prices shown are the special AWS Partner Prices.
Prices reflect the Capgemini employee discount.
Prices reflect the UPS employee discount.
Prices reflect the ??democompanyname?? employee discount.
GSA Private/Onsite Price: ??gsa-private-price??
For GSA pricing, please go to GSA Advantage.
 

Class Schedule

Delivery Formats

Sort results

Filter Classes

Guaranteed to Run

Modality

Location

Language

Date

  • Exam Voucher
    LQEX-MOC-SC-100
    Microsoft Cybersecurity Architect
    Price: 165 USD
  • Date: 3-Feb-2025 to 6-Feb-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 2,380 USD
  • Date: 17-Mar-2025 to 20-Mar-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 2,380 USD
  • Date: 28-Apr-2025 to 1-May-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 2,380 USD
  • Date: 9-Jun-2025 to 12-Jun-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 2,380 USD
  • Date: 21-Jul-2025 to 24-Jul-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 2,380 USD
View Global Schedule

Course Description

Overview

This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
 

Objectives

After completing this course, students will be able to:
  • Design a Zero Trust strategy and architecture
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
  • Design security for infrastructure
  • Design a strategy for data and applications

Audience

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.
 

Prerequisites

    Before attending this course, students must have:
    • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
    • Experience with hybrid and cloud implementations.

Topics

Introduction to Zero Trust and best practice frameworks
  • Introduction to best practices
  • Introduction to Zero Trust
  • Zero Trust initiatives
  • Zero Trust technology pillars part 1
  • Zero Trust technology pillars part 2
  • Knowledge check - Introduction to Zero Trust and best practice frameworks
  • Summary - Introduction to Zero Trust and best practice frameworks
Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Define a security strategy
  • Introduction to the Cloud Adoption Framework
  • Cloud Adoption Framework secure methodology
  • Introduction to Azure Landing Zones
  • Design security with Azure Landing Zones
  • Introduction to the Well-Architected Framework
  • The Well-Architected Framework security pillar
  • Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
  • Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
  • Design solutions with best practices for capabilities and controls
  • Design solutions with best practices for attack protection
  • Knowledge check - Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
  • Summary - Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
Design a resiliency strategy for common cyberthreats like ransomware
  • Common cyberthreats and attack patterns
  • Support business resiliency
  • Ransomware protection
  • Configurations for secure backup and restore
  • Security updates
  • Knowledge check - Design a resiliency strategy for common cyberthreats
  • Summary - Design a resiliency strategy for common cyberthreats like ransomware
Case study: Design solutions that align with security best practices and priorities
  • Introduction
  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough
  • Knowledge check
Design solutions for regulatory compliance
  • Introduction to regulatory compliance
  • Translate compliance requirements into a security solution
  • Address compliance requirements with Microsoft Purview
  • Address privacy requirements with Microsoft Priva
  • Address security and compliance requirements with Azure policy
  • Evaluate infrastructure compliance with Defender for Cloud
  • Knowledge check
  • Summary - Design solutions for regulatory requirements
Design solutions for identity and access management
  • Introduction to Identity and Access Management
  • Design cloud, hybrid and multicloud access strategies (including Microsoft Entra ID)
  • Design a solution for external identities
  • Design modern authentication and authorization strategies
  • Align conditional access and Zero Trust
  • Specify requirements to secure Active Directory Domain Services (AD DS)
  • Design a solution to manage secrets, keys, and certificates
  • Knowledge check - Design solutions for identity and access management
  • Summary - Design solutions for identity and access management
Design solutions for securing privileged access
  • Introduction to privileged access
  • The enterprise access model
  • Design identity governance solutions
  • Design a solution to secure tenant administration
  • Design a solution for cloud infrastructure entitlement management (CIEM)
  • Design a solution for privileged access workstations and bastion services
  • Knowledge check - Design solutions for securing privileged access management
  • Summary - Design solutions for securing privileged access
Design solutions for security operations
  • Introduction to Security operations (SecOps)
  • Design security operations capabilities in hybrid and multicloud environments
  • Design centralized logging and auditing
  • Design security information and event management (SIEM) solutions
  • Design solutions for detection and response
  • Design a solution for security orchestration, automation, and response (SOAR)
  • Design security workflows
  • Design threat detection coverage
  • Knowledge check - Design solutions for security operations
  • Summary - Design solutions for security operations
Case study: Design security operations, identity and compliance capabilities
  • Introduction
  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough
  • Knowledge check
Design solutions for securing Microsoft 365
  • Introduction to security for Exchange, Sharepoint, OneDrive and Teams
  • Evaluate security posture for collaboration and productivity workloads
  • Design a Microsoft Defender XDR solution
  • Design configurations and operational practices for Microsoft 365
  • Knowledge check - Design solutions for securing Microsoft 365
  • Summary - Design solutions for securing Microsoft 365
Design solutions for securing applications
  • Introduction to application security
  • Design and implement standards to secure application development
  • Evaluate security posture of existing application portfolios
  • Evaluate application threats with threat modeling
  • Design security lifecycle strategy for applications
  • Secure access for workload identities
  • Design a solution for API management and security
  • Design a solution for secure access to applications
  • Knowledge check - Design solutions for securing applications
  • Summary - Design solutions for securing applications
Design solutions for securing an organization's data
  • Introduction to data security
  • Design a solution for data discovery and classification using Microsoft Purview
  • Design a solution for data protection
  • Design data security for Azure workloads
  • Design security for Azure Storage
  • Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
  • Knowledge check - Design solutions for securing an organization's data
  • Summary - Design solutions for securing an organization's data
Case study: Design security solutions for applications and data
  • Introduction
  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough
  • Knowledge check
  • Summary
Specify requirements for securing SaaS, PaaS, and IaaS services
  • Introduction to security for SaaS, PaaS, and IaaS
  • Specify security baselines for SaaS, PaaS, and IaaS services
  • Specify security requirements for web workloads
  • Specify security requirements for containers and container orchestration
  • Knowledge check - Specify requirements for securing SaaS, PaaS and IaaS services
  • Summary - Specify requirements for securing SaaS, PaaS, and IaaS services
Design solutions for security posture management in hybrid and multicloud environments
  • Introduction to hybrid and multicloud posture management
  • Evaluate security posture by using Microsoft Cloud Security Benchmark
  • Design integrated posture management and workload protection
  • Evaluate security posture by using Microsoft Defender for Cloud
  • Posture evaluation with Microsoft Defender for Cloud secure score
  • Design cloud workload protection with Microsoft Defender for Cloud
  • Integrate hybrid and multicloud environments with Azure Arc
  • Design a solution for external attack surface management
  • Knowledge check - Design solutions for security posture management in hybrid and multicloud environments
  • Summary - Design solutions for security posture management in hybrid and multicloud environments
Design solutions for securing server and client endpoints
  • Introduction to endpoint security
  • Specify server security requirements
  • Specify requirements for mobile devices and clients
  • Specify internet of things (IoT) and embedded device security requirements
  • Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
  • Specify security baselines for server and client endpoints
  • Design a solution for secure remote access
  • Knowledge check - Design solutions for securing server and client endpoints
  • Summary - Design solutions for securing server and client endpoints
Design solutions for network security
  • Introduction
  • Design solutions for network segmentation
  • Design solutions for traffic filtering with network security groups
  • Design solutions for network posture management
  • Design solutions for network monitoring
  • Knowledge check - Design solutions for network security
  • Summary - Design solutions for network security
Case study: Design security solutions for infrastructure
  • Introduction
  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough
  • Knowledge check
Top 20 Training Industry Company - IT Training

Need Help?

Call us at 877-206-0106 or e-mail us at info@learnquest.com

Personalized Solutions

Need a personalized solution for your Training? Contact us, and one of our training advisors will help you find the best solution.

Contact Us

Need Help?

Do you have a question about the courses, instruction, or materials covered? Do you need help finding which course is best for you? We are here to help!

Talk to us

LearnPass Year-End Offer

Get Up to 25% Additional Training Funds Before the Year Ends!

Act Now

Self-Paced Training Info

Learn at your own pace with anytime, anywhere training

  • Same in-demand topics as instructor-led public and private classes.
  • Standalone learning or supplemental reinforcement.
  • e-Learning content varies by course and technology.
  • View the Self-Paced version of this outline and what is included in the SPVC course.
  • Learn more about e-Learning

Course Added To Shopping Cart

bla

bla

bla

bla

bla

bla

Self-Paced Training Terms & Conditions

??spvc-wbt-warning??

Exam Terms & Conditions

Vouchers expire 12 months from the date they are issued, unless otherwise specified in the terms and conditions. Voucher expiration dates cannot be extended. All sales are final.
Please refer to the full terms and conditions here.
??group-training-form-area??
??how-can-we-help-you-area??
??personalized-form-area??
??request-quote-area??

Sorry, there are no classes that meet your criteria.

Please contact us to schedule a class.
Close

self-paced
STOP! Before You Leave

Save 0% on this course!

Take advantage of our online-only offer & save 0% on any course !

Promo Code skip0 will be applied to your registration

Close
Nothing yet
here's the message from the cart

To view the cart, you can click "View Cart" on the right side of the heading on each page
Add to cart clicker.

Purchase Information

??elearning-coursenumber?? ??coursename??
View Cart

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

If you would like to request a quote for 5 or more students, please contact CustomerService@learnquest.com to be assigned an account representative.

Need more Information?

Speak with our training specialists to continue your learning journey.

 

Delivery Formats

Close

By submitting this form, I agree to LearnQuest's Terms and Conditions

heres the new schedule
This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Privacy Policy.
Your use of this LearnQuest site affirms your consent to our use of session and persistent cookies to track how you use our website.