Detailed Course Outline
Module 1: SC-100: Design solutions that align with security best practices and priorities
- Introduction to Zero Trust and best practice frameworks
 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
 - Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
 - Case study: Design solutions that align with security best practices and priorities
 
Module 2: SC-100: Design security operations, identity, and compliance capabilities
- Design solutions for regulatory compliance
 - Design solutions for identity and access management
 - Design solutions for securing privileged access
 - Design solutions for security operations
 - Case study: Design security operations, identity and compliance capabilities
 
Module 3: SC-100: Design security solutions for applications and data
- Design solutions for securing Microsoft 365
 - Design solutions for securing applications
 - Design solutions for securing an organization's data
 - Case study: Design security solutions for applications and data
 
Module 4: SC-100: Design security solutions for infrastructure
- Specify requirements for securing SaaS, PaaS, and IaaS services
 - Design solutions for security posture management in hybrid and multicloud environments
 - Design solutions for securing server and client endpoints
 - Design solutions for network security
 - Case study: Design security solutions for infrastructure