Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

SC-100: Design security solutions for applications and data

Microsoft via Microsoft Learn

Overview

  • Module 1: You learn how to design security solutions for Exchange, Sharepoint, OneDrive and Teams.

    By the end of this module, you are able to:

    • Evaluate security posture for collaboration and productivity workloads
    • Design a Microsoft 365 Defender solution
    • Design configurations and operational practices for Microsoft 365
  • Module 2: You learn how to secure applications, APIs and the development process using techniques like posture management, threat modeling, and secure access for workload identities.

    By the end of this module, you're able to:

    • Evaluate security posture of existing application portfolios
    • Evaluate threats to business-critical applications by using threat modeling
    • Design and implement a full lifecycle strategy for application security
    • Design and implement standards and practices for securing the application development process
    • Design a solution for workload identity to authenticate and access Azure cloud resources
    • Design a solution for API management and security
    • Design a solution for secure access to applications
  • Module 3: You learn about designing solutions that secure an organization's data using capabilities like Microsoft Purview, Defender for SQL, Defender for Storage.

    By the end of this module, you are able to:

    • Design a solution for data discovery and classification using Microsoft Purview
    • Specify priorities for mitigating threats to data
    • Design a solution for protection of data at rest, data in motion, and data in use
    • Design a security solution for data in Azure workloads
    • Design a security solution for data in Azure Storage
    • Design a security solution that includes Microsoft Defender for SQL and Microsoft Defender for Storage
  • Module 4: Apply your cybersecurity architect skills on a real business scenario in the area of securing applications and data. You will analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

    You learn:

    • How to analyze business requirements
    • How to match technical capabilities to meet those needs
    • How to design cohesive solutions that incorporate all of the required functions

Syllabus

  • Module 1: Module 1: Design solutions for securing Microsoft 365
    • Introduction to security for Exchange, Sharepoint, OneDrive and Teams
    • Evaluate security posture for collaboration and productivity workloads
    • Design a Microsoft 365 Defender solution
    • Design configurations and operational practices for Microsoft 365
    • Knowledge check - Design solutions for securing Microsoft 365
    • Summary - Design solutions for securing Microsoft 365
  • Module 2: Module 2: Design solutions for securing applications
    • Introduction to application security
    • Design and implement standards to secure application development
    • Evaluate security posture of existing application portfolios
    • Evaluate application threats with threat modeling
    • Design security lifecycle strategy for applications
    • Secure access for workload identities
    • Design a solution for API management and security
    • Design a solution for secure access to applications
    • Knowledge check - Design solutions for securing applications
    • Summary - Design solutions for securing applications
  • Module 3: Module 3: Design solutions for securing an organization's data
    • Introduction to data security
    • Design a solution for data discovery and classification using Microsoft Purview
    • Design a solution for data protection
    • Design data security for Azure workloads
    • Design security for Azure Storage
    • Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
    • Knowledge check - Design solutions for securing an organization's data
    • Summary - Design solutions for securing an organization's data
  • Module 4: Module 4: Case study: Design security solutions for applications and data
    • Introduction
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
    • Knowledge check
    • Summary

Reviews

Start your review of SC-100: Design security solutions for applications and data

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.