________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Course Description
This is an advanced expert level course. Although attendance is not required, it is strongly recommended that students have passed another assistant technician level certification in the Security, Compliance, and Identity portfolio (such as AZ-500, SC-200, or SC-300) prior to attending this class. This course prepares students with the experience to design and evaluate cybersecurity strategies in the following areas: Zero Trust; governance, risk and compliance (GRC), security operations (SecOps) and data and applications. Students will also learn to design solutions following zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Audience profile
This course is for experienced cloud security engineers who have passed a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, such as identity and access, platform protection, security operations, data protection, and application protection. They should also have experience with cloud and hybrid deployments. Instead, beginning students should take course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.
Items in this collection
- Introduction to Best Practices Frameworks and Zero Trust
- Design solutions that align with the Cloud Adoption Framework (CAF) and the Well-Architected Framework (WAF)
- Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB)
- Design a resilience strategy for common cyber threats, such as ransomware
- Case Study: Design solutions that align with security best practices and priorities
- Design of solutions for regulatory compliance
- Design of solutions for identity and access management
- Design solutions to protect privileged access
- Design of solutions for security operations
- Case Study: Security, Identity, and Compliance Operations Feature Design
- Design solutions to protect Microsoft 365
- Design of solutions to protect applications
- Design of solutions to protect an organization's data
- Case Study: Designing Security Solutions for Applications and Data
- Specification of requirements to protect SaaS, PaaS and IaaS services
- Design of solutions for managing the security posture in hybrid and multicloud environments
- Design solutions to protect client and server connection points
- Design of solutions for network security
- Practical case: Design of security solutions for infrastructure
Course outline
Learning Path 01: Design solutions that align with security best practices and priorities
- Module1: Introduction to Best Practices Frameworks and Zero Trust
- Module2: Design solutions that align with the Cloud Adoption Framework (CAF) and the Well-Architected Framework (WAF)
- Module3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB)
- Module4: Designing a resistance strategy for common cyber threats, such as ransomware
- Case Study: Design solutions that align with security best practices and priorities
Learning Path 02: Security, Identity, and Compliance Operations Feature Design
- Module5: Design of solutions for regulatory compliance
- Module6: Design of solutions for identity and access management
- Module7: Designing solutions to protect privileged access
- Module8: Design of solutions for security operations
- Case Study: Security, Identity, and Compliance Operations Feature Design
Learning Path 03: Designing Security Solutions for Applications and Data
- Module9: Design solutions to protect Microsoft 365
- Module10: Design of solutions to protect applications
- Module 11: Design of solutions to protect an organization's data
- Case Study: Designing Security Solutions for Applications and Data
Learning path 04: Design of security solutions for infrastructure
- Module 12: Specification of requirements to protect SaaS, PaaS and IaaS services
- Module 13: Design of solutions for security posture management in hybrid and multicloud environments
- Module 14: Design solutions to protect client and server connection points
- Module 15: Design of solutions for network security
- Practical case: Design of security solutions for infrastructure
Previous requirements
Before attending this course, students must have:
- It is highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500 , SC-200 or SC-300 )
- Advanced experience and knowledge of identity and access, platform protection, security operations, data protection, and application protection.
- Experience in hybrid and cloud implementations.
Language
- Course: English / Spanish
- Labs: English