Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

SC-100: Design security solutions for infrastructure

Microsoft via Microsoft Learn

Overview

  • Module 1: You learn how to analyze security requirements for different cloud offerings (SaaS, PaaS, and IaaS), IoT workloads, web workloads and containers.

    By the end of this module, you are able to:

    • Specify security baselines for SaaS, PaaS, and IaaS services
    • Specify security requirements for IoT workloads
    • Specify security requirements for web workloads
    • Specify security requirements for containers and container orchestration
  • Module 2: You learn how to design security posture management solutions that integrate into hybrid and multicloud scenarios using capabilities in Microsoft Defender for Cloud, Azure Arc and Microsoft Cloud Security Benchmark (MCSB).

    By the end of this module, you're able to:

    • Evaluate security posture by using Microsoft Cloud Security Benchmark, Microsoft Defender for Cloud, and Secure Scores
    • Design integrated security posture management and workload protection solutions in hybrid and multicloud environments
    • Design cloud workload protection solutions that use Microsoft Defender for Cloud
  • Module 3: You learn how to analyze the security requirements for different types of endpoints including servers, clients, IoT, OT, mobile, and embedded devices. These requirements will take into account different platforms and operating systems and set standards for endpoint protection, hardening and configuration.

    By the end of this module, you are able to:

    • Specify security requirements for servers
    • Specify security requirements for mobile devices and clients
    • Specify security requirements for IoT devices and embedded systems
    • Design a solution for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
    • Specify security baselines for server and client endpoints
    • Design a solution for secure remote access
  • Module 4: You learn how to design secure network solutions using techniques like network segmentation, traffic filtering, network monitoring and posture management.

    By the end of this module, you are able to:

    • Design solutions for network segmentation
    • Design solutions for filtering traffic with network security groups
    • Design solutions for network posture measurement
    • Design solutions for network monitoring
  • Module 5: Apply your cybersecurity architect skills on a real business scenario in the area of infrastructure security. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

    You learn:

    • How to analyze business requirements
    • How to match technical capabilities to meet those needs
    • How to design cohesive solutions that incorporate all of the required functions

Syllabus

  • Module 1: Module 1: Specify requirements for securing SaaS, PaaS, and IaaS services
    • Introduction to security for SaaS, PaaS, and IaaS
    • Specify security baselines for SaaS, PaaS, and IaaS services
    • Specify security requirements for web workloads
    • Specify security requirements for containers and container orchestration
    • Knowledge check - Specify requirements for securing SaaS, PaaS and IaaS services
    • Summary - Specify requirements for securing SaaS, PaaS, and IaaS services
  • Module 2: Module 2: Design solutions for security posture management in hybrid and multicloud environments
    • Introduction to hybrid and multicloud posture management
    • Evaluate security posture by using Microsoft Cloud Security Benchmark
    • Design integrated posture management and workload protection
    • Evaluate security posture by using Microsoft Defender for Cloud
    • Posture evaluation with Microsoft Defender for Cloud secure score
    • Design cloud workload protection with Microsoft Defender for Cloud
    • Integrate hybrid and multicloud environments with Azure Arc
    • Design a solution for external attack surface management
    • Knowledge check - Design solutions for security posture management in hybrid and multicloud environments
    • Summary - Design solutions for security posture management in hybrid and multicloud environments
  • Module 3: Module 3: Design solutions for securing server and client endpoints
    • Introduction to endpoint security
    • Specify server security requirements
    • Specify requirements for mobile devices and clients
    • Specify internet of things (IoT) and embedded device security requirements
    • Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
    • Specify security baselines for server and client endpoints
    • Design a solution for secure remote access
    • Knowledge check - Design solutions for securing server and client endpoints
    • Summary - Design solutions for securing server and client endpoints
  • Module 4: Module 4: Design solutions for network security
    • Introduction
    • Design solutions for network segmentation
    • Design solutions for traffic filtering with network security groups
    • Design solutions for network posture management
    • Design solutions for network monitoring
    • Knowledge check - Design solutions for network security
    • Summary - Design solutions for network security
  • Module 5: Module 5: Case study: Design security solutions for infrastructure
    • Introduction
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
    • Knowledge check
    • Summary

Reviews

Start your review of SC-100: Design security solutions for infrastructure

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.