SC-100T00A Microsoft Cybersecurity Architect
July 1 - July 3
(1-4/7/2024)
This course is designed for students who are planning to take the corresponding certification exam, or students who are performing Cybersecurity Architect tasks in their daily job.
Both the certification exam and the courseware are based on the Microsoft Cybersecurity Architect role.
The Microsoft Cybersecurity Architect has subject matter expertise in designing and evolving cybersecurity solutions that protect an organization’s mission and business processes across all aspects of the enterprise architecture. Responsibilities include designing reference models, integrating security into architectures, designing security architectures, and ensuring the resiliency of the organization.
The Cybersecurity Architect gathers the client’s business and security requirements, selects appropriate security capabilities, and translates the requirements into architectural specifications that minimize risk, meet compliance and privacy requirements, adhere to best practices, and ensure appropriate levels of confidentiality, integrity, availability, and safety for critical business assets. The Cybersecurity Architect ensures successful deployments and the ongoing technical viability of solutions and through assessments and reviews of the security posture.
The Cybersecurity Architect continuously collaborates with Security Engineers, Security Operations Analysts, Identity and Access Management Admins, Information Protection Admins, Cloud Security (Azure/M365) Administrator/Engineers, privacy officers, governance, compliance, and risk roles, and solution providers to plan and implement a cybersecurity strategy that meets the business needs of an organization.
The Cybersecurity Architect must be familiar with Microsoft security and identity technologies, hybrid cloud and workload security configurations, and cloud application development solutions. The Cybersecurity Architect must have skills and experience in applying cybersecurity concepts and practices,information security, application security, incident response and recovery techniques, and security standards, policies, and governance frameworks.