Hi i am SEM,
how can i help you

Semos Education Semos Education
  • Monday - Friday 9:00 AM - 10:00 PM CET
  • Call us now +44 7487633466
  • Keep in touch info@semosedu.com
EN / МК / RS
Кошничка
reserve a seat
  • Description
  • Content
  • Target Audience
  • Certificates

This is an advanced, expert-level course.

Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class.

This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.

Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

LEARNING PATH 1
SC-100: Design solutions that align with security best practices and priorities

  • Module 1: Introduction to Zero Trust and best practice frameworks
  • Module 2: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Module 3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
  • Module 4: Design a resiliency strategy for common cyberthreats like ransomware
  • Module 5: Case study: Design solutions that align with security best practices and priorities

 

LEARNING PATH 2
SC-100: Design security operations, identity, and compliance capabilities

  • Module 1: Design solutions for regulatory compliance
  • Module 2: Design solutions for identity and access management
  • Module 3: Design solutions for securing privileged access
  • Module 4: Design solutions for security operations
  • Module 5: Case study: Design security operations, identity and compliance capabilities

 

LEARNING PATH 3
SC-100: Design security solutions for applications and data

  • Module 1: Design solutions for securing Microsoft 365
  • Module 2: Design solutions for securing applications
  • Module 3: Design solutions for securing an organization’s data
  • Module 4: Case study: Design security solutions for applications and data

 

LEARNING PATH 4
SC-100: Design security solutions for infrastructure

  • Module 1: Specify requirements for securing SaaS, PaaS, and IaaS services
  • Module 2: Design solutions for security posture management in hybrid and multicloud environments
  • Module 3: Design solutions for securing server and client endpoints
  • Module 4: Design solutions for network security
  • Module 5: Case study: Design security solutions for infrastructure

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio.

Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications.

They should also have experience with hybrid and cloud implementations.

Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

Microsoft Certified: Cybersecurity Architect Expert after successful completion of the Exam SC-100: Microsoft Cybersecurity Architect

Description

This is an advanced, expert-level course.

Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class.

This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.

Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

Content

LEARNING PATH 1
SC-100: Design solutions that align with security best practices and priorities

  • Module 1: Introduction to Zero Trust and best practice frameworks
  • Module 2: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Module 3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
  • Module 4: Design a resiliency strategy for common cyberthreats like ransomware
  • Module 5: Case study: Design solutions that align with security best practices and priorities

 

LEARNING PATH 2
SC-100: Design security operations, identity, and compliance capabilities

  • Module 1: Design solutions for regulatory compliance
  • Module 2: Design solutions for identity and access management
  • Module 3: Design solutions for securing privileged access
  • Module 4: Design solutions for security operations
  • Module 5: Case study: Design security operations, identity and compliance capabilities

 

LEARNING PATH 3
SC-100: Design security solutions for applications and data

  • Module 1: Design solutions for securing Microsoft 365
  • Module 2: Design solutions for securing applications
  • Module 3: Design solutions for securing an organization’s data
  • Module 4: Case study: Design security solutions for applications and data

 

LEARNING PATH 4
SC-100: Design security solutions for infrastructure

  • Module 1: Specify requirements for securing SaaS, PaaS, and IaaS services
  • Module 2: Design solutions for security posture management in hybrid and multicloud environments
  • Module 3: Design solutions for securing server and client endpoints
  • Module 4: Design solutions for network security
  • Module 5: Case study: Design security solutions for infrastructure
Target Audience

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio.

Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications.

They should also have experience with hybrid and cloud implementations.

Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

Certificates

Microsoft Certified: Cybersecurity Architect Expert after successful completion of the Exam SC-100: Microsoft Cybersecurity Architect

Our students for us:

  • - Marko Krstevski Microsoft .NET Academy

    Seeking to expand my knowledge, I decided to enroll in Semos Education, where I am gaining the necessary knowledge and experience.

  • - Teodor Markovski Student

    The desire to become a Cloud architect led me to Semos Education. I am thrilled by the positive experiences of former students and the way in which the instructors and Career Center take care of the students.

  • - Viktorija Georgieva Summer Mentorship Program for Python Develope

    The reputation of Semos Education for quality training and the opportunity to learn from experienced instructors played an additional significant role in my decision.

  • - Borche Peltekovski Accredited Academy for Graphic Design

    After completing my studies at Semos Education, I envision myself working in a technology company, such as Samsung, Apple, or a company of similar caliber.

Meet the instructors

  • Martin Dimovski Senior DevOps/DevSecOps Engineer  @ ABN AMRO  15 + years of experience

Contact

  • Irena Ivanovska Senior Director
    +389 70 246 146 irena@semos.com.mk