
SC-100 Microsoft Cybersecurity Architect Training
Venue
Entrance Fee
Category
Event Type
Share
Schedule
Date | Time |
---|---|
08/09/2025 | 9:30 AM - 5:30 PM |
09/09/2025 | 9:30 AM - 5:30 PM |
10/09/2025 | 9:30 AM - 5:30 PM |
11/09/2025 | 9:30 AM - 5:30 PM |

Embark on an exciting journey into the world of cybersecurity with our SC-100 Microsoft Cybersecurity Architect Exam Prep course. This comprehensive course is designed to provide the expertise and knowledge required to excel in the SC-100 Microsoft Cybersecurity Architect exam. You'll delve into key aspects of cybersecurity, including data security, cloud security, and network security within the Microsoft Azure environment.
With this course, acquire hands-on experience in architecting advanced security solutions, preparing you to tackle real-world cybersecurity challenges. Our curriculum offers a complete understanding of the design, implementation, and management of advanced security protocols and systems within the Microsoft Azure ecosystem. Don't miss this chance to elevate your cybersecurity career with a globally recognized certification.
Certification
Certificate of Completion from Tertiary Infotech - Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from Tertiary Infotech.
External Certification - The participant will be able to attempt the Microsoft Cybersecurity Architect (SC100) Training exam after attending this course. Upon passing the exam, you will receive the Microsoft Cybersecurity Architect (SC100) Training accreditation.
Microsoft Learning Partner
We are Authorised Microsoft Learning Partner (Org ID: 5238476). To get the official Microsoft certification, please register your certification exam at Pearson Vue Test Center.
Certification Exam at Pearson Vue
We are Authorised Pearson Vue Testing Center. Once you have prepared for the exam, you can register for the certification here. The course fee does not include the certification exam fee.
You can purchase the exam voucher (one of the lowest prices in Singapore) at Microsoft Role-Based Certification Exam Voucher.
Funding and Grant
HRD Corp SBL KHAS Claimable for Employers Registered with HRD Corp
Course Code: M1437
Topc 1 Design solutions that align with security best practices and priorities
1.1 Introduction to Zero Trust and best practice frameworks
Introduction to best practices5
Introduction to Zero Trust
Zero Trust initiatives
Zero Trust technology pillars part 1
Zero Trust technology pillars part 2
1.2 Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Define a security strategy
Introduction to the Cloud Adoption Framework
Cloud Adoption Framework secure methodology
Introduction to Azure Landing Zones
Design security with Azure Landing Zones
Introduction to the Well-Architected Framework
The Well-Architected Framework security pillar
1.3 Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
Design solutions with best practices for capabilities and controls
Design solutions with best practices for attack protection
1.4 Design a resiliency strategy for common cyberthreats like ransomware
Common cyberthreats and attack patterns
Support business resiliency
Ransomware protection
Configurations for secure backup and restore
• Security updates
1.5 Case study: Design solutions that align with security best practices and priorities
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Topic 2 Design security operations, identity, and compliance capabilities
2.1 Design solutions for regulatory compliance
Introduction to regulatory compliance
Translate compliance requirements into a security solution
Address compliance requirements with Microsoft Purview
Address privacy requirements with Microsoft Priva
Address security and compliance requirements with Azure policy
Evaluate infrastructure compliance with Defender for Cloud
2.2 Design security solutions for applications and data
Introduction to security for Exchange, Sharepoint, OneDrive and Teams
Evaluate security posture for collaboration and productivity workloads
Design a Microsoft 365 Defender solution
Design configurations and operational practices for Microsoft 365
2.3 Design solutions for identity and access management
Introduction to Identity and Access Management
Design cloud, hybrid and multicloud access strategies (including Azure AD)
Design a solution for external identities
Design modern authentication and authorization strategies
Align conditional access and Zero Trust
Specify requirements to secure Active Directory Domain Services (AD DS)
Design a solution to manage secrets, keys, and certificates
2.4 Design solutions for securing privileged access
Introduction to privileged access
The enterprise access model
Design identity governance solutions
Design a solution to secure tenant administration15 min
Design a solution for cloud infrastructure entitlement management (CIEM)
Design a solution for privileged access workstations and bastion services
2.5 Design solutions for security operations
Introduction to Security operations (SecOps)
Design security operations capabilities in hybrid and multicloud environments
Design centralized logging and auditing
Design security information and event management (SIEM) solutions
Design solutions for detection and response
Design a solution for security orchestration, automation, and response (SOAR)
Design security workflows
Design threat detection coverage
2.6 Case study: Design security operations, identity and compliance capabilities
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Topic 3 Design security solutions for applications and data (K4, A4)
3.1 Design solutions for securing Microsoft 365
Introduction to security for Exchange, Sharepoint, OneDrive and Teams
Evaluate security posture for collaboration and productivity workloads
Design a Microsoft 365 Defender solution
Design configurations and operational practices for Microsoft 365
3.2 Design solutions for securing applications
Introduction to application security
Design and implement standards to secure application development
Evaluate security posture of existing application portfolios
Evaluate application threats with threat modeling
Design security lifecycle strategy for applications
Secure access for workload identities
Design a solution for API management and security
Design a solution for secure access to applications
3.3 Design solutions for securing an organization's data
Introduction to data security5
Design a solution for data discovery and classification using Microsoft Purview
Design a solution for data protection
Design data security for Azure workloads
Design security for Azure Storage
Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
3.4 Case study: Design security solutions for applications and data
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Topic 4 Design security solutions for infrastructure (K5, A5, A6)
4.1 Specify requirements for securing SaaS, PaaS, and IaaS services
Introduction to security for SaaS, PaaS, and IaaS
Specify security baselines for SaaS, PaaS, and IaaS services
Specify security requirements for web workloads
Specify security requirements for containers and container orchestration
4.2 Design solutions for security posture management in hybrid and multicloud environments
Introduction to hybrid and multicloud posture management
Evaluate security posture by using Microsoft Cloud Security Benchmark
Design integrated posture management and workload protection
Evaluate security posture by using Microsoft Defender for Cloud
Posture evaluation with Microsoft Defender for Cloud secure score
Design cloud workload protection with Microsoft Defender for Cloud
Integrate hybrid and multicloud environments with Azure Arc
Design a solution for external attack surface management
4.3 Design solutions for securing server and client endpoints
Introduction to endpoint security
Specify server security requirements
Specify requirements for mobile devices and clients
Specify internet of things (IoT) and embedded device security requirements
Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
Specify security baselines for server and client endpoints
Design a solution for secure remote access
4.4 Design solutions for network security
Design solutions for network segmentation
Design solutions for traffic filtering with network security groups
Design solutions for network posture management
Design solutions for network monitoring
4.5 Case study: Design security solutions for infrastructure
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Practice Exam