SC-100T00: Microsoft Cybersecurity Architect

Become an expert in strategizing and developing cybersecurity solutions for organizations with the SC-100 advanced security course. This program equips professionals with the knowledge to implement Zero Trust principles, enhance data and application security, and ensure governance and compliance, all aimed at protecting critical infrastructure.
Course Details

Price:

$2,495.00

Days:

1

Location:

Virtual

Course Overview

Become an expert in strategizing and developing cybersecurity solutions for organizations with the SC-100 advanced security course. This program equips professionals with the knowledge to implement Zero Trust principles, enhance data and application security, and ensure governance and compliance, all aimed at protecting critical infrastructure.

– • Design a Zero Trust strategy and architecture
– • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
– • Design security for infrastructure
– • Design a strategy for data and applications

• Experience with hybrid and cloud implementations
• Advanced experience and knowledge in identity and access
• Platform protection
• Security operations
• Securing data
• Securing applications

– • Design solutions for securing applications
– • Design solutions for securing Microsoft 365
– • Case study: Design security operations, identity, and compliance capabilities
– • Design solutions for security operations
– • Design solutions for securing privileged access
– • Case study: Design security solutions for infrastructure
– • Design solutions for network security
– • Design solutions for securing server and client endpoints
– • Design solutions for securing an organization’s data
– • Case study: Design security solutions for applications and data
– • Specify requirements for securing SaaS, PaaS, and IaaS services
– • Design solutions for security posture management in hybrid and multi-cloud environments
– • Design solutions that align with security best practices and priorities
– • Design security operations, identity, and compliance capabilities
– • Design security solutions for applications and data
– • Design security solutions for infrastructure
– • Introduction to Zero Trust and best practice frameworks
– • Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
– • Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
– • Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
– • Case study: Design solutions that align with security best practices and priorities
– • Design solutions for regulatory compliance
– • Design solutions for identity and access management
– • Case study: Design security operations, identity and compliance capabilities
– • Design solutions for securing Microsoft 365
– • Design solutions for securing applications
– • Design solutions for securing an organization’s data
– • Design solutions for security posture management in hybrid and multicloud environments
– • Case study: Design security solutions for infrastructure
– • Design solutions for identity and access management
– • Design solutions for regulatory compliance
– • Design a resiliency strategy for common cyber threats like ransomware

Class Dates & Times
Filters Sort results
Reset Apply
10/6/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,495.00
10/27/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,495.00
11/3/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,495.00
11/17/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,495.00
12/8/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,495.00
12/15/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,495.00
12
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.