Engaging visual content to enhance understanding and learning experience.
Insightful audio sessions featuring expert discussions and real-world cases.
Listen and learn anytime with convenient audio-based knowledge sharing.
Comprehensive digital guides offering in-depth knowledge and learning support.
Interactive assessments to reinforce learning and test conceptual clarity.
Supplementary references and list of tools to deepen knowledge and practical application.
Azure Portal
Microsoft Sentinel
Microsoft Entra ID
Microsoft Purview
Microsoft Security Copilot
Apply principles to secure identities, devices, and access.
Ensure compliance across cloud environments and services.
Protect SaaS, PaaS, and IaaS with unified strategies.
Support business needs through resilient, hybrid protection.
Module 1: Introduction to Zero Trust and Best Practice Frameworks
Module 2: Design Security Solutions That Align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Module 3: Design Solutions That Align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB)
Module 4: Design a Resiliency Strategy for Ransomware and Other Attacks Based on Microsoft Security Best Practices
Module 5: Case Study – Design Solutions That Align with Security Best Practices and Priorities
Module 1: Design Solutions for Regulatory Compliance
Module 2: Design Solutions for Identity and Access Management
Module 3: Design Solutions for Securing Privileged Access
Module 4: Design Solutions for Security Operations
Module 5: Case Study – Design Security Operations, Identity, and Compliance Capabilities
Module 1: Design Solutions for Securing Microsoft 365
Module 2: Design Solutions for Securing Applications
Module 3: Design Solutions for Securing an Organization’s Data
Module 4: Case Study – Design Security Solutions for Applications and Data
Module 1: Specify Requirements for Securing SaaS, PaaS, and IaaS Services
Module 2: Design Solutions for Security Posture Management in Hybrid and Multicloud Environments
Module 3: Design Solutions for Securing Server and Client Endpoints
Module 4: Design Solutions for Network Security
Module 5: Case Study – Design Security Solutions for Infrastructure
No, it’s intended for experienced security architects.
It supports the Cybersecurity Architect Expert certification.
Yes, Zero Trust is a core focus of the course.
It’s strongly recommended to have AZ-500, SC-200, or SC-300.
Yes, both instructor-led and self-paced formats are available.