Welcome to Design Security Solutions for Applications and Data, a focused and practical course designed for cybersecurity professionals, cloud security architects, and Microsoft cloud administrators. This course is part of the SC-100: Microsoft Certified Cybersecurity Architect Expert specialization and equips you with the expertise to design, implement, and manage secure application and data protection strategies in Microsoft’s cloud ecosystem.



Design security solutions for applications and data
This course is part of Exam Prep SC-100: Microsoft Cybersecurity Architect Expert Specialization

Instructor: Whizlabs Instructor
Access provided by The Channel Company
Recommended experience
Skills you'll gain
Details to know

Add to your LinkedIn profile
4 assignments
August 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 2 modules in this course
Welcome to Week 1 of the course! In this module, you’ll explore how to design and protect modern cloud-native applications using Microsoft Defender for Cloud and Entra ID. You’ll start by examining security considerations in cloud application development, followed by secure coding practices and vulnerability management. Then, you’ll learn how identity and access management plays a central role in securing apps with Microsoft Entra ID. Through practical demos, you’ll see how Defender for Cloud enhances application-level security and how data classification and sensitivity labels help manage information access. By the end of this week, you’ll be equipped with essential skills to build secure applications, apply access controls, and classify sensitive data to reduce risk and ensure compliance.
What's included
6 videos3 readings2 assignments1 discussion prompt
This week’s focus is on building secure identity foundations using Microsoft Entra ID. You’ll begin by exploring core identity concepts such as users, roles, and access models (RBAC and ABAC), and then move into authentication strategies like MFA and Conditional Access. You’ll also dive into identity governance-including provisioning, deprovisioning, and access reviews-to ensure that user access is secure, minimal, and auditable. These lessons provide practical insights into securing access in both cloud-native and hybrid environments. By the end of the week, you’ll gain the confidence to implement robust identity and access policies using Entra ID to protect your organization’s digital assets.
What's included
7 videos1 reading2 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career








