logo

Microsoft Certified: Cybersecurity Architect Expert (AZ500-SC100)

Our eight-day certification track training is composed of two parts:

Microsoft Azure Security Technologies (AZ-500T00)

This four-day Microsoft certified course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. 

Microsoft Cybersecurity Architect (SC-100T00)

This four-day Microsoft certified course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). 

This SC-100 training is a comprehensive preparation to the AZ-500 and SC-100 exams for obtaining the Microsoft Certified: Cybersecurity Architect Expert certification.

You can purchase an individual part of this certification track - contact us for the details.

Microsoft

Applicable solutions

Public class

Virtual classroom
Planned datePlanned date
April 8 2024
$4595$
 
English
Virtual classroom
Planned datePlanned date
May 28 2024
$4595$
 
English
Virtual classroom
Planned datePlanned date
June 25 2024
$4595$
 
English
Virtual classroom
Planned datePlanned date
July 22 2024
$4595$
 
English
Virtual classroom
Planned datePlanned date
August 12 2024
$4595$
 
English
Virtual classroom
Planned datePlanned date
September 23 2024
$4595$
 
English
4595$
Duration: 
8 days / 56 hours

Private class

Virtual classroom
Minimum no. of participants: 5
8 days / 56 hours
Price on request
English or French
Training plan: 

Microsoft Azure Security Technologies (AZ-500T00)

Module 1: Manage Identity and Access

This module covers Microsoft Entra ID, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.

  • Microsoft Entra ID
  • Azure Identity Protection
  • Enterprise Governance
  • Azure AD Privileged Identity Management
  • Hybrid Identity

Module 2: Implement Platform Protection

This module covers perimeter, network, host, and container security.

  • Perimeter Security
  • Network Security
  • Host Security
  • Container Security

Module 3: Secure Data and Applications

This module covers Azure Key Vault, application security, storage security, and SQL database security.

  • Azure Key Vault
  • Application Security
  • Storage Security
  • SQL Database Security

Module 4: Manage Security Operations

This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.

  • Azure Monitor
  • Azure Security Center
  • Azure Sentinel

Microsoft Cybersecurity Architect (SC-100T00)

Module 1: Introduction to Zero Trust and best practice frameworks

  • Introduction to Zero Trust
  • Zero Trust initiatives
  • Zero Trust technology pillars part 1
  • Zero Trust technology pillars part 2
  • Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Define a security strategy
  • Introduction to the Cloud Adoption Framework
  • Cloud Adoption Framework secure methodology
  • Introduction to Azure Landing Zones
  • Design security with Azure Landing Zones
  • Introduction to the Well-Architected Framework
  • The Well-Architected Framework security pillar

Module 2: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

  • Introduction to the Cloud Adoption Framework
  • Cloud Adoption Framework secure methodology
  • Introduction to Azure Landing Zones
  • Design security with Azure Landing Zones
  • Introduction to the Well-Architected Framework
  • The Well-Architected Framework security pillar

Module 3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

  • Design a resiliency strategy for common cyberthreats like ransomware
  • Common cyberthreats and attack patterns
  • Support business resiliency
  • Ransomware protection
  • Configurations for secure backup and restore
  • Security updates
  • Case study: Design solutions that align with security best practices and priorities
  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Module 4: Design a resiliency strategy for common cyberthreats like ransomware

  • Common cyberthreats and attack patterns
  • Support business resiliency
  • Ransomware protection
  • Configurations for secure backup and restore
  • Security updates

Module 5: Case study: Design solutions that align with security best practices and priorities

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Module 6: Design solutions for regulatory compliance

  • Translate compliance requirements into a security solution
  • Address compliance requirements with Microsoft Purview
  • Address privacy requirements with Microsoft Priva
  • Address security and compliance requirements with Azure policy
  • Evaluate infrastructure compliance with Defender for Cloud

Module 7: Design solutions for identity and access management

  • Design cloud, hybrid and multicloud access strategies (including Microsoft Entra ID)
  • Design a solution for external identities
  • Design modern authentication and authorization strategies
  • Align conditional access and Zero Trust
  • Specify requirements to secure Active Directory Domain Services (AD DS)
  • Design solutions for securing privileged access
  • Design a solution to manage secrets, keys, and certificates

Module 8: Design solutions for securing privileged access

  • The enterprise access model
  • Design identity governance solutions
  • Design a solution to secure tenant administration
  • Design a solution for cloud infrastructure entitlement management (CIEM)
  • Design a solution for privileged access workstations and bastion services

Module 9: Design solutions for security operations

  • Design security operations capabilities in hybrid and multicloud environments
  • Design centralized logging and auditing
  • Design security information and event management (SIEM) solutions
  • Design solutions for detection and response
  • Design a solution for security orchestration, automation, and response (SOAR)
  • Design security workflows
  • Design threat detection coverage

Module 10: Case study: Design security operations, identity and compliance capabilities

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Module 11: Design solutions for securing Microsoft 365

  • Evaluate security posture for collaboration and productivity workloads
  • Design a Microsoft 365 Defender solution
  • Design configurations and operational practices for Microsoft 365

Module 12: Design solutions for securing applications

  • Design and implement standards to secure application development
  • Evaluate security posture of existing application portfolios
  • Evaluate application threats with threat modeling
  • Design security lifecycle strategy for applications
  • Secure access for workload identities
  • Design a solution for API management and security
  • Design a solution for secure access to applications

Module 13: Design solutions for securing an organization's data

  • Design a solution for data discovery and classification using Microsoft Purview
  • Design a solution for data protection
  • Design data security for Azure workloads
  • Design security for Azure Storage
  • Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage

Module 14: Case study: Design security solutions for applications and data

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Module 15: Specify requirements for securing SaaS, PaaS, and IaaS services

  • Specify security baselines for SaaS, PaaS, and IaaS services
  • Specify security requirements for web workloads
  • Specify security requirements for containers and container orchestration

Module 16: Design solutions for security posture management in hybrid and multicloud environments

  • Evaluate security posture by using Microsoft Cloud Security Benchmark
  • Design integrated posture management and workload protection
  • Evaluate security posture by using Microsoft Defender for Cloud
  • Posture evaluation with Microsoft Defender for Cloud secure score
  • Design cloud workload protection with Microsoft Defender for Cloud
  • Integrate hybrid and multicloud environments with Azure Arc
  • Design a solution for external attack surface management

Module 17: Design solutions for securing server and client endpoints

  • Specify server security requirements
  • Specify requirements for mobile devices and clients
  • Specify internet of things (IoT) and embedded device security requirements
  • Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
  • Specify security baselines for server and client endpoints
  • Design a solution for secure remote access

Module 18: Design solutions for network security

  • Design solutions for network segmentation
  • Design solutions for traffic filtering with network security groups
  • Design solutions for network posture management
  • Design solutions for network monitoring

Module 19: Case study: Design security solutions for infrastructure

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough
Exclusives: 
    • One FREE attendance to the Microsoft 365 Certified: Fundamentals (MS900) training - $695 value!
    • Two vouchers to take the exams - $450 value!
    • One year access to the class recording
    • 180 days access to the lab environment after class
    • Up to date courseware with Microsoft Learn
    • Microsoft course achievement badge
Prerequisites: 

Before attending this course, students must have knowledge of:

  • Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
  • Security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
  • Deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
  • Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.
  • Identity and access, platform protection, security operations, securing data and securing applications.
  • Hybrid and cloud implementations.
Credentials information: 

Exams Characteristics 

  • Exams codes: AZ-500 and SC-100 
  • Exam Titles: Microsoft Azure Security Technologies and Microsoft Cybersecurity Architect 
  • Exam Duration: 150 minutes for the AZ-500 and 120 minutes for the SC-100 
  • Number of Questions: 40 to 60 each 
  • Question Format: Multiple-choice, multiple-answer, scenario-based 
  • Passing Score: 700 out of 1000 
  • Cost: $0 (included in your training) 

Exams Topics 

AZ-500 

  • Manage identity and access  
  • Secure networking  
  • Secure compute, storage, and databases  
  • Manage security operations  
  • All details...  

SC-100 

  • Design solutions that align with security best practices and priorities  
  • Design security operations, identity, and compliance capabilities  
  • Design security solutions for infrastructure  
  • Design security solutions for applications and data  
  • All details… 

Demystifying the AZ-500 

The AZ-500 portion of the journey focuses on Azure Security, demanding mastery of Microsoft's cloud-based security solutions. Candidates must possess a comprehensive grasp of identity and access management, threat protection, security posture management, data protection, and network security within the Azure ecosystem. 

Imagine navigating a labyrinthine fortress, meticulously securing each entry point and vulnerable chink in the armor. That's essentially what AZ-500 aspirants do, learning to leverage Azure's vast security arsenal to build impenetrable defenses around organizational data, applications, and infrastructure. 

SC-100: The Mastermind's Playbook 

The SC-100 exam elevates the game to a strategic level, transforming candidates into cybersecurity masterminds. This assessment delves into the core principles of Zero Trust architecture, a security philosophy that assumes breach is inevitable and focuses on securing access and data at every step, regardless of location or device. 

Think of it as building a city where every resident is meticulously vetted, every street corner is monitored, and every building is equipped with sophisticated alarm systems. That's the essence of Zero Trust, and SC-100 equips individuals with the expertise to design and implement such robust security models. 

Beyond the Exams: The True Value of AZ500-SC100 

The knowledge and skills gleaned from the AZ500-SC100 journey extend far beyond mere exam preparation. Earning this coveted credential unlocks many benefits for individuals and organizations. 

For Individuals: 

  • Enhanced Career Prospects: The AZ500-SC100 certification is a highly sought-after credential in the cybersecurity job market, opening doors to lucrative opportunities in security architecture, consulting, and leadership roles. 
  • Commanding Respect and Recognition: Earning this badge signifies mastery of complex security concepts and positions individuals as trusted advisors within their organizations. 
  • Continuous Learning and Growth: The preparation process itself fosters a deep understanding of the ever-evolving cybersecurity landscape, equipping individuals with the knowledge and skills to adapt and thrive in the face of new threats. 

For Organizations: 

  • A More Secure Future: By employing certified professionals, organizations gain access to a breed of security architects who can design and implement cutting-edge defenses, mitigating risks and protecting critical assets. 
  • Improved Decision-Making: These cybersecurity masterminds provide invaluable strategic guidance, enabling organizations to make informed decisions about their security posture and resource allocation. 
  • A Culture of Security: The presence of certified individuals fosters a culture of security awareness and proactive threat management within organizations. 

The Road to Expertise: Resources and Preparation Tips 

Earning the Microsoft Certified: Cybersecurity Architect Expert certification is a challenging yet rewarding endeavor. To optimize your preparation journey, consider these valuable resources: 

  • Microsoft Official Learning Paths: Microsoft offers comprehensive learning paths for both AZ-500 and SC-100, complete with instructor-led training, hands-on labs, and practice exams. 
  • Official training providers: Eccentrix has training specifically preparing participants to the AZ500-SC100 exams. 
  • Community Forums and Online Resources: Engaging with online communities and leveraging online resources can provide valuable insights, tips, and support from experienced professionals. 

Conclusion 

Coonquering the Microsoft Certified: Cybersecurity Architect Expert (AZ500-SC100) is an odyssey through the intricate architecture of cyber defense. It's a journey that demands resilience, dedication, and a thirst for knowledge. But the rewards are substantial – not just a coveted credential, but the ability to stand at the forefront of safeguarding our digital world. 

In a world where data is currency and connectivity is king, the need for expert architects of security has never been greater. Individuals who embark on this path, mastering the complexities of Azure security and the strategic nuances of Zero Trust, equip themselves with more than just technical proficiency. They become architects of resilience, forging impenetrable digital fortresses that protect the very fabric of our interconnected lives. 

Frequently Asked Questions about SC-100 and AZ-500 Microsoft Courses (FAQ) 

What are the prerequisites for the SC-100 course? 

It is recommended to have established knowledge in cybersecurity concepts and experience in implementing security solutions. Aspiring candidates should be familiar with topics like identity protection, threat intelligence, security compliance, and Zero Trust principles. Relevant hands-on experience in cybersecurity roles enhances the understanding of the exam content. Moreover, if you are willing to pursue the Expert level certification, then the AZ-500 exam is a prerequisite. 

What is the difference between AZ-500 and SC-200? 

AZ-500 (Microsoft Azure Security Technologies) and SC-200 (Microsoft Security Operations Analyst) cater to different roles. AZ-500 focuses on implementing security controls in Azure, while SC-200 emphasizes security operations and threat detection. 

Is the SC-100 exam hard? 

The difficulty of the SC-100 exam varies based on individual preparation and familiarity with security concepts. With proper study and a solid understanding of the course content, it is attainable for those aspiring to establish foundational security knowledge. 

Does the Microsoft Certified: Cybersecurity Architect Expert certification expire? 

Microsoft certifications such as this one typically has a validity period of one year. This means that individuals will need to renew or recertify after one year to ensure their skills and knowledge align with the latest updates and technologies in the cybersecurity landscape. Recertification ensures that certified professionals stay current with evolving security practices, maintaining the relevance and value of their expertise in safeguarding digital environments against emerging threats and vulnerabilities. 

Is AZ-500 for beginners? 

AZ-500, Microsoft Azure Security Technologies, is designed for individuals with some experience in implementing security controls and maintaining security posture in Azure environments. While it may not be tailored for absolute beginners, individuals with foundational knowledge can pursue it. 

Contact us for more information on pricing::

Eccentrix
Office: 1-888-718-9732
E-mail: info@eccentrix.ca

130, King Street West, Suite 1800
Toronto, Ontario M5X 1E3
www.eccentrix.ca