Welcome to Design Security Solutions for Infrastructure, a comprehensive and hands-on course designed for cybersecurity architects, cloud engineers, and Microsoft security professionals. This course is part of the SC-100: Microsoft Certified Cybersecurity Architect Expert specialization and focuses on building robust, scalable, and compliant infrastructure security strategies for hybrid and multi-cloud environments.



Design security solutions for infrastructure
This course is part of Exam Prep SC-100: Microsoft Cybersecurity Architect Expert Specialization

Instructor: Whizlabs Instructor
Access provided by The Channel Company
Recommended experience
Skills you'll gain
Details to know

Add to your LinkedIn profile
8 assignments
August 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
Welcome to Week 1 of the course! In this module, you’ll explore how to secure complex hybrid and multi-cloud environments using Microsoft Defender for Cloud. You’ll begin by understanding the key challenges of securing distributed cloud infrastructure. Next, you’ll dive into Security Posture Management (SPM) and continuous monitoring strategies. Through demos and practical insights, you’ll see how Microsoft Defender for Cloud enhances visibility, hardens configurations, and integrates with on-premises tools for unified protection. By the end of the week, you’ll be equipped to monitor and improve your cloud security posture across hybrid environments using Microsoft Defender for Cloud.
What's included
6 videos3 readings2 assignments1 discussion prompt
Welcome to Week 2! This module focuses on protecting critical servers and endpoint devices using Microsoft Defender solutions. You’ll start by understanding the security needs for virtual machines, containers, and user devices. You’ll then explore Endpoint Detection and Response (EDR), Defender for Servers, and advanced threat protection capabilities. This week also covers patching, scanning, and vulnerability management to improve endpoint resilience. By the end of this module, you’ll be ready to implement robust server and endpoint protection with proactive defense using Microsoft Defender technologies.
What's included
6 videos1 reading2 assignments
Welcome to Week 3 of the course! In this module, you’ll learn how to design secure cloud workloads across various service models including IaaS, PaaS, and SaaS. You’ll explore the shared responsibility model, evaluate key security considerations for each service type, and learn how to define security requirements in cloud service contracts. You’ll also dive into using benchmarks like Defender for Cloud to assess and strengthen your cloud posture. By the end of this week, you’ll understand how to align security strategy with different service models and ensure secure workload deployment in Microsoft Azure.
What's included
6 videos1 reading2 assignments
Welcome to Week 4! In this final module, you’ll focus on securing Microsoft 365 and multi-cloud environments using Microsoft Defender capabilities. You’ll explore identity and access controls with Microsoft Entra ID, configure conditional access policies, and apply DLP (Data Loss Prevention) strategies to protect sensitive data. You’ll also implement threat protection against malware and phishing, and use Defender for Cloud Apps for workload protection. By the end of the week, you’ll have the knowledge and tools to secure collaboration platforms and enforce strong access and data protection policies in Microsoft 365.
What's included
7 videos3 readings2 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career








