505.470 kr.
This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
To access your Official Curriculum (MOC) course materials you will need a Microsoft.com/Learn account. In Learn you will also be able to register your completion of the event and receive your achievement badge. You will be issued with a unique code during your event.
Before attending this course, students must have:
This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.
Learning path 1 – Design solutions that align with security best practices and priorities
You learn how to use critical Microsoft security best practices to improve an organizations security posture, apply Zero Trust principles, and minimize risk from emerging attacks. Frameworks discussed include the Cloud Adoption Framework (CAF), Well-Architected Framework (WAF), and Microsoft Cybersecurity Reference Architecture (MCRA).
Modules
Learning path 2 – Design security operations, identity, and compliance capabilities
You'll learn how to interpret and translate regulatory requirements into technical solutions. You'll also learn how to use capabilities found in Microsoft Purview, Microsoft Priva, and Defender for Cloud for compliance.
Modules
Learning path 3 – Design security solutions for applications and data
Learn how to design solutions to secure data and applications, including: Microsoft 365, application development, existing application portfolios, data discovery, and classification with Microsoft Purview and data security for Azure workloads.
Modules
Learning path 4 – Design security solutions for infrastructure
You learn how to design solutions for infrastructure security. These infrastructure solutions include specifying requirements for different cloud models, designing solutions for posture management in hybrid and multicloud environments, and securing endpoints.
Modules