Exam SC-100: Microsoft Cybersecurity Architect
Exam SC-100: Microsoft Cybersecurity Architect
Description
As a Microsoft cybersecurity architect, you translate a cybersecurity strategy into capabilities that protect the assets, business, and operations of an organization. You design, guide the implementation of, and maintain security solutions that follow Zero Trust principles and best practices, including security strategies for:
Identity
Devices
Data
Applications
Network
Infrastructure
DevOps
Plus, you design solutions for:
Governance and Risk Compliance (GRC)
Security operations
Security posture management
As a cybersecurity architect, you continuously collaborate with leaders and practitioners in IT security, privacy, and other roles across an organization to plan and implement a cybersecurity strategy that meets the business needs of an organization.
As a candidate for this exam, you have experience implementing or administering solutions in the following areas:
Identity and access
Platform protection
Security operations
Data security
Application security
Hybrid and multicloud infrastructures
You should have expert skills in at least one of those areas, and you should have experience designing security solutions that include Microsoft security technologies.
This exam measures your ability to accomplish the following technical tasks: design solutions that align with security best practices and priorities; design security operations, identity, and compliance capabilities; design security solutions for infrastructure; and design security solutions for applications and data.
Skills measured
Design solutions that align with security best practices and priorities (20–25%)
Design security operations, identity, and compliance capabilities (30–35%)
Design security solutions for infrastructure (20–25%)
Design security solutions for applications and data (20–25%)
What You Will Learn!
- Translate a cybersecurity strategy into capabilities that protect the assets
- Design, guide the implementation of, and maintain security solutions
- Collaborate with leaders and practitioners in IT security
- Implement a cybersecurity strategy that meets the business needs of an organization
Who Should Attend!
- Cybersecurity Architect