This course focuses on designing end-to-end cybersecurity strategies using Microsoft technologies, preparing learners to operate at an architect level. It emphasizes aligning security solutions with business goals while addressing modern cloud, identity, and data protection challenges faced by enterprises.

Microsoft Cybersecurity Architect Exam Ref SC-100

Microsoft Cybersecurity Architect Exam Ref SC-100

Instructor: Packt - Course Instructors
Access provided by Inter IKEA
Recommended experience
What you'll learn
Design a zero-trust strategy and architecture
Evaluate governance, risk, and compliance (GRC) strategies
Apply encryption standards for data protection
Skills you'll gain
- API Design
- Endpoint Security
- Application Security
- Data Security
- Cyber Security Policies
- Cybersecurity
- Cyber Security Strategy
- Cyber Threat Intelligence
- Identity and Access Management
- Compliance Management
- Security Controls
- IT Security Architecture
- Zero Trust Network Access
- Infrastructure Security
- Threat Modeling
- Security Requirements Analysis
- Regulatory Compliance
- Cloud Security
- Security Information and Event Management (SIEM)
Tools you'll learn
Details to know

Add to your LinkedIn profile
10 assignments
March 2026
See how employees at top companies are mastering in-demand skills

There are 10 modules in this course
In this section, we explore security strategies for business resiliency, threat analysis in cloud environments, and BCDR planning for hybrid and multi-cloud setups.
What's included
2 videos9 readings1 assignment
In this section, we explore how to build a security strategy using MCRA and MCSB, translate business goals into security requirements, and design resiliency strategies for ransomware attacks.
What's included
1 video5 readings1 assignment
In this section, we explore designing logging and auditing strategies, implementing SIEM and SOAR solutions, and evaluating workflows for threat intelligence sharing in cloud environments.
What's included
1 video4 readings1 assignment
In this section, we will learn to identity security strategies for cloud, hybrid, and multi-cloud environments with a focus on zero trust and access control.
What's included
1 video6 readings1 assignment
In this section, we will learn designing regulatory compliance strategies using Azure Policy and Microsoft Defender for Cloud.
What's included
1 video3 readings1 assignment
In this section, we will learn to evaluate cloud security posture using benchmarks, Defender for Cloud, and EASM to identify and mitigate risks.
What's included
1 video4 readings1 assignment
In this section, we explore strategies for securing server and client endpoints, focusing on security baselines, AD DS protection, and managing secrets and access using Microsoft tools.
What's included
1 video4 readings1 assignment
In this section, we explore strategies for securing SaaS, PaaS, and IaaS, focusing on security baselines, cloud storage, containers, and IoT workloads with an emphasis on collaboration and defined roles.
What's included
1 video5 readings1 assignment
In this section, we will learn securing applications, including threat prioritization, API security, and onboarding standards.
What's included
1 video3 readings1 assignment
In this section, we will learn NIST RMF for risk assessment and encryption strategies for data at rest and in motion to enhance security and compliance.
What's included
1 video5 readings1 assignment
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






