Modules
Module 1: Introduction to Zero Trust and best practice frameworks
You learn what best practices are and how cybersecurity architects use them as well as some key best practice frameworks for Microsoft cybersecurity capabilities. You also learn about the concept of Zero Trust, and how to get started with Zero Trust in an organization.
Learning objectives
After completing this module, you will be able to:
- Understand how to use best practices as a cybersecurity architect.
- Understand the concept of Zero Trust and how it can be used to modernize an organizations cybersecurity.
- Understand when to use different best practice frameworks like MCRA, CAF and WAF.
Module 2 : Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
You’ll learn about the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) and how you can use them to design more secure solutions.
Learning objectives
After completing this module, you will be able to:
- Understand the Cloud Adoption Framework and how it can be used to accelerate and secure an organizations move to the cloud.
- Understand the Well-Architected Framework and how it can be used to design solutions in the cloud that adhere to sound design principles including security.
Module 3 : Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
You learn about the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) and how you can use them to design more secure solutions.
Learning objectives
After completing this module, you will know how to :
- Understand how to use Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) to design more secure solutions.
Module 4 : Design a resiliency strategy for common cyberthreats like ransomware
You’ll learn about common cyberthreats like ransomware and what kinds of attack patterns an organization must be prepared for.
Learning objectives
After completing this module, you will be able to:
- Understand common cyberthreats like ransomware.
- Understand how to support business resiliency.
- Design configurations for secure backup and restore.
- Design solutions for managing security updates.
Module 5 : Case study: Design solutions that align with security best practices and priorities
Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity and compliance. You will analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
Learning objectives
After completing this module, learners will be able to:
- How to analyze business requirements
- How to match technical capabilities to meet those needs
- How to design cohesive solutions that incorporate all of the required functions
Module 6: Design solutions for regulatory compliance
You’ll learn how to interpret and translate regulatory requirements into technical solutions. You’ll also learn how to use capabilities found in Microsoft Purview, Microsoft Priva, and Defender for Cloud for compliance.
Learning objectives
In this module, you will learn how to use the Language service to :
- Translate compliance requirements into a security solution
- Address compliance requirements with Microsoft Purview
- Design a solution to address privacy requirements with Microsoft Priva
- Design Azure Policy solutions to address security and compliance requirements
- Evaluate infrastructure compliance by using Microsoft Defender for Cloud
Module 7: Design solutions for identity and access management
You learn about various strategies for managing identities and access to resources, including hybrid and multicloud scenarios, external identities, and conditional access.
Learning objectives
After completing this module, you will be able to :
- Design cloud, hybrid and multicloud access strategies
- Design a solution for Azure Active Directory (Azure AD), part of Microsoft Entra
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Specify requirements to secure Active Directory Domain Services
- Design a solution to manage secrets, keys, and certificates
Module 8 : Design solutions for securing privileged access
You learn advanced techniques for designing solutions that manage privileged access effectively.
Learning objectives
Upon completion of this module, the learner will be able to:
- Understand privileged access and the Enterprise Access Model
- Design identity governance solutions
- Design a solution for securing administration of cloud tenants
- Design for cloud infrastructure entitlement management
Module 9 : Design solutions for security operations
You learn techniques to design security operations capabilities including logging, auditing, Security Event Management (SIEM), Security Orchestration and Automated Response (SOAR), and security workflows.
Learning objectives
In this module, you will learn how to :
- Design security operations capabilities in hybrid and multicloud environments
- Design centralized logging and auditing
- Design Security Event Management (SIEM) solutions
- Design a solution for detection and response that includes Extended Detection and Response (XDR)
- Design a solution for security orchestration, automation and response (SOAR)
- Design security workflows
- Design and evaluate threat detection with the MITRE ATT&CK framework
Module 10 : Case study: Design security operations, identity and compliance capabilities
Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity and compliance. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
Learning objectives
After completing this module, you’ll be able to :
- How to analyze business requirements
- How to match technical capabilities to meet those needs
- How to design cohesive solutions that incorporate all of the required functions
Module 11 : Design solutions for securing Microsoft 365
You learn how to design security solutions for Exchange, Sharepoint, OneDrive and Teams.
Learning objectives
After completing this module, you’ll be able to :
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
Module 12 : Design solutions for securing applications
You learn how to secure applications, APIs and the development process using techniques like posture management, threat modeling, and secure access for workload identities.
Learning objectives
After completing this module, you will be able to :
- Evaluate security posture of existing application portfolios
- Evaluate threats to business-critical applications by using threat modeling
- Design and implement a full lifecycle strategy for application security
- Design and implement standards and practices for securing the application development process
- Design a solution for workload identity to authenticate and access Azure cloud resources
- Design a solution for API management and security
- Design a solution for secure access to applications
Module 13 : Design solutions for securing an organization’s data
You learn about designing solutions that secure an organization’s data using capabilities like Microsoft Purview, Defender for SQL, Defender for Storage.
Learning objectives
After completing this module, you will be able to :
- Design a solution for data discovery and classification using Microsoft Purview
- Specify priorities for mitigating threats to data
- Design a solution for protection of data at rest, data in motion, and data in use
- Design a security solution for data in Azure workloads
- Design a security solution for data in Azure Storage
- Design a security solution that includes Microsoft Defender for SQL and Microsoft Defender for Storage
Module 14 : Case study: Design security solutions for applications and data
Apply your cybersecurity architect skills on a real business scenario in the area of securing applications and data. You will analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
Learning objectives
After completing this module, you will be able to :
- How to analyze business requirements
- How to match technical capabilities to meet those needs
- How to design cohesive solutions that incorporate all of the required functions
Module 15 : Specify requirements for securing SaaS, PaaS, and IaaS services
You learn how to analyze security requirements for different cloud offerings (SaaS, PaaS, and IaaS), IoT workloads, web workloads and containers.
Learning objectives
After completing this module, you’ll be able to:
- Specify security baselines for SaaS, PaaS, and IaaS services
- Specify security requirements for IoT workloads
- Specify security requirements for web workloads
- Specify security requirements for containers and container orchestration
Module 16 : Design solutions for security posture management in hybrid and multicloud environments
You learn how to design security posture management solutions that integrate into hybrid and multicloud scenarios using capabilities in Microsoft Defender for Cloud, Azure Arc and Microsoft Cloud Security Benchmark (MCSB).
Learning objectives
After completing this module, you’ll be able to :
- Evaluate security posture by using Microsoft Cloud Security Benchmark, Microsoft Defender for Cloud, and Secure Scores
- Design integrated security posture management and workload protection solutions in hybrid and multicloud environments
- Design cloud workload protection solutions that use Microsoft Defender for Cloud
Module 17 : Design solutions for securing server and client endpoints
You learn how to analyze the security requirements for different types of endpoints including servers, clients, IoT, OT, mobile, and embedded devices. These requirements will take into account different platforms and operating systems and set standards for endpoint protection, hardening and configuration.
Learning objectives
After completing this module, you will be able to :
- Specify security requirements for servers
- Specify security requirements for mobile devices and clients
- Specify security requirements for IoT devices and embedded systems
- Design a solution for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
Module 18 : Design solutions for network security
You learn how to design secure network solutions using techniques like network segmentation, traffic filtering, network monitoring and posture management.
Learning objectives
After completing this module, you will be able to :
- Design solutions for network segmentation
- Design solutions for filtering traffic with network security groups
- Design solutions for network posture measurement
- Design solutions for network monitoring
Module 19 : Case study: Design security solutions for infrastructure
Apply your cybersecurity architect skills on a real business scenario in the area of infrastructure security. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
Learning objectives
After completing this module, you will be able to:
- How to analyze business requirements
- How to match technical capabilities to meet those needs
- How to design cohesive solutions that incorporate all of the required functions
Reviews
There are no reviews yet.