<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://microsoft.fastlane.net/css/xml-course.xsl"?><course productid="29909" language="pt" source="https://microsoft.fastlane.net/microsoft-esi/pt/xml-course/microsoft-sc-100t00" lastchanged="2026-03-31T13:41:42-03:00" parent="https://microsoft.fastlane.net/microsoft-esi/pt/xml-courses"><title>Microsoft Cybersecurity Architect</title><productcode>SC-100T00</productcode><vendorcode>MS</vendorcode><vendorname>Microsoft</vendorname><fullproductcode>MS-SC-100T00</fullproductcode><version>A</version><objective>&lt;ul&gt;
&lt;li&gt;Design a Zero Trust strategy and architecture&lt;/li&gt;&lt;li&gt;Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies&lt;/li&gt;&lt;li&gt;Design security for infrastructure&lt;/li&gt;&lt;li&gt;Design a strategy for data and applications&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Before attending this course, students must have:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.&lt;/li&gt;&lt;li&gt;Experience with hybrid and cloud implementations.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Build an overall security strategy and architecture&lt;/li&gt;&lt;li&gt;Design a security operations strategy&lt;/li&gt;&lt;li&gt;Design an identity security strategy&lt;/li&gt;&lt;li&gt;Evaluate a regulatory compliance strategy&lt;/li&gt;&lt;li&gt;Evaluate security posture and recommend technical strategies to manage risk&lt;/li&gt;&lt;li&gt;Understand architecture best practices and how they are changing with the Cloud&lt;/li&gt;&lt;li&gt;Design a strategy for securing server and client endpoints&lt;/li&gt;&lt;li&gt;Design a strategy for securing PaaS, IaaS, and SaaS services&lt;/li&gt;&lt;li&gt;Specify security requirements for applications&lt;/li&gt;&lt;li&gt;Design a strategy for securing data&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Module 1: Build an overall security strategy and architecture&lt;/h5&gt;&lt;p&gt;Learn how to build an overall security strategy and architecture.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Zero Trust overview&lt;/li&gt;&lt;li&gt;Develop Integration points in an architecture&lt;/li&gt;&lt;li&gt;Develop security requirements based on business goals&lt;/li&gt;&lt;li&gt;Translate security requirements into technical capabilities&lt;/li&gt;&lt;li&gt;Design security for a resiliency strategy&lt;/li&gt;&lt;li&gt;Design a security strategy for hybrid and multi-tenant environments&lt;/li&gt;&lt;li&gt;Design technical and governance strategies for traffic filtering and segmentation&lt;/li&gt;&lt;li&gt;Understand security for protocols&lt;/li&gt;&lt;li&gt;Exercise: Build an overall security strategy and architecture&lt;/li&gt;&lt;li&gt;Knowledge check&lt;/li&gt;&lt;li&gt;Summary&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Develop Integration points in an architecture&lt;/li&gt;&lt;li&gt;Develop security requirements based on business goals&lt;/li&gt;&lt;li&gt;Translate security requirements into technical capabilities&lt;/li&gt;&lt;li&gt;Design security for a resiliency strategy&lt;/li&gt;&lt;li&gt;Design security strategy for hybrid and multi-tenant environments&lt;/li&gt;&lt;li&gt;Design technical and governance strategies for traffic filtering and segmentation&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 2: Design a security operations strategy&lt;/h5&gt;&lt;p&gt;Learn how to design a security operations strategy.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Understand security operations frameworks, processes, and procedures&lt;/li&gt;&lt;li&gt;Design a logging and auditing security strategy&lt;/li&gt;&lt;li&gt;Develop security operations for hybrid and multi-cloud environments&lt;/li&gt;&lt;li&gt;Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,&lt;/li&gt;&lt;li&gt;Evaluate security workflows&lt;/li&gt;&lt;li&gt;Review security strategies for incident management&lt;/li&gt;&lt;li&gt;Evaluate security operations strategy for sharing technical threat intelligence&lt;/li&gt;&lt;li&gt;Monitor sources for insights on threats and mitigations&lt;/li&gt;&lt;li&gt;After completing this module, students will be able to:&lt;/li&gt;&lt;li&gt;Design a logging and auditing security strategy&lt;/li&gt;&lt;li&gt;Develop security operations for hybrid and multi-cloud environments.&lt;/li&gt;&lt;li&gt;Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A&lt;/li&gt;&lt;li&gt;Evaluate security workflows.&lt;/li&gt;&lt;li&gt;Review security strategies for incident management.&lt;/li&gt;&lt;li&gt;Evaluate security operations for technical threat intelligence.&lt;/li&gt;&lt;li&gt;Monitor sources for insights on threats and mitigations.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 3: Design an identity security strategy&lt;/h5&gt;&lt;p&gt;Learn how to design an identity security strategy.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Secure access to cloud resources&lt;/li&gt;&lt;li&gt;Recommend an identity store for security&lt;/li&gt;&lt;li&gt;Recommend secure authentication and security authorization strategies&lt;/li&gt;&lt;li&gt;Secure conditional access&lt;/li&gt;&lt;li&gt;Design a strategy for role assignment and delegation&lt;/li&gt;&lt;li&gt;Define Identity governance for access reviews and entitlement management&lt;/li&gt;&lt;li&gt;Design a security strategy for privileged role access to infrastructure&lt;/li&gt;&lt;li&gt;Design a security strategy for privileged activities&lt;/li&gt;&lt;li&gt;Understand security for protocols&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Recommend an identity store for security.&lt;/li&gt;&lt;li&gt;Recommend secure authentication and security authorization strategies.&lt;/li&gt;&lt;li&gt;Secure conditional access.&lt;/li&gt;&lt;li&gt;Design a strategy for role assignment and delegation.&lt;/li&gt;&lt;li&gt;Define Identity governance for access reviews and entitlement management.&lt;/li&gt;&lt;li&gt;Design a security strategy for privileged role access to infrastructure.&lt;/li&gt;&lt;li&gt;Design a security strategy for privileged access.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 4: Evaluate a regulatory compliance strategy&lt;/h5&gt;&lt;p&gt;Learn how to evaluate a regulatory compliance strategy.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Interpret compliance requirements and their technical capabilities&lt;/li&gt;&lt;li&gt;Evaluate infrastructure compliance by using Microsoft Defender for Cloud&lt;/li&gt;&lt;li&gt;Interpret compliance scores and recommend actions to resolve issues or improve security&lt;/li&gt;&lt;li&gt;Design and validate implementation of Azure Policy&lt;/li&gt;&lt;li&gt;Design for data residency Requirements&lt;/li&gt;&lt;li&gt;Translate privacy requirements into requirements for security solutions&lt;/li&gt;&lt;li&gt;After completing this module, students will be able to:&lt;/li&gt;&lt;li&gt;Interpret compliance requirements and their technical capabilities&lt;/li&gt;&lt;li&gt;Evaluate infrastructure compliance by using Microsoft Defender for Cloud&lt;/li&gt;&lt;li&gt;Interpret compliance scores and recommend actions to resolve issues or improve security&lt;/li&gt;&lt;li&gt;Design and validate implementation of Azure Policy&lt;/li&gt;&lt;li&gt;Design for data residency requirements&lt;/li&gt;&lt;li&gt;Translate privacy requirements into requirements for security solutions&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 5: Evaluate security posture and recommend technical strategies to manage risk&lt;/h5&gt;&lt;p&gt;Learn how to evaluate security posture and recommend technical strategies to manage risk.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Evaluate security postures by using benchmarks&lt;/li&gt;&lt;li&gt;Evaluate security postures by using Microsoft Defender for Cloud&lt;/li&gt;&lt;li&gt;Evaluate security postures by using Secure Scores&lt;/li&gt;&lt;li&gt;Evaluate security hygiene of Cloud Workloads&lt;/li&gt;&lt;li&gt;Design security for an Azure Landing Zone&lt;/li&gt;&lt;li&gt;Interpret technical threat intelligence and recommend risk mitigations&lt;/li&gt;&lt;li&gt;Recommend security capabilities or controls to mitigate identified risks&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Evaluate security postures by using benchmarks&lt;/li&gt;&lt;li&gt;Evaluate security postures by using Microsoft Defender for Cloud&lt;/li&gt;&lt;li&gt;Evaluate security postures by using Secure Scores&lt;/li&gt;&lt;li&gt;Evaluate security hygiene of Cloud Workloads&lt;/li&gt;&lt;li&gt;Design security for an Azure Landing Zone&lt;/li&gt;&lt;li&gt;Interpret technical threat intelligence and recommend risk mitigations&lt;/li&gt;&lt;li&gt;Recommend security capabilities or controls to mitigate identified risks&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 6: Understand architecture best practices and how they are changing with the Cloud&lt;/h5&gt;&lt;p&gt;Learn about architecture best practices and how they are changing with the Cloud.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Plan and implement a security strategy across teams&lt;/li&gt;&lt;li&gt;Establish a strategy and process for proactive and continuous evolution of a security strategy&lt;/li&gt;&lt;li&gt;Understand network protocols and best practices for network segmentation and traffic filtering&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe best practices for network segmentation and traffic filtering.&lt;/li&gt;&lt;li&gt;Plan and implement a security strategy across teams.&lt;/li&gt;&lt;li&gt;Establish a strategy and process for proactive and continuous evaluation of security strategy.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 7: Design a strategy for securing server and client endpoints&lt;/h5&gt;&lt;p&gt;Learn how to design a strategy for securing server and client endpoints.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Specify security baselines for server and client endpoints&lt;/li&gt;&lt;li&gt;Specify security requirements for servers&lt;/li&gt;&lt;li&gt;Specify security requirements for mobile devices and clients&lt;/li&gt;&lt;li&gt;Specify requirements for securing Active Directory Domain Services&lt;/li&gt;&lt;li&gt;Design a strategy to manage secrets, keys, and certificates&lt;/li&gt;&lt;li&gt;Design a strategy for secure remote access&lt;/li&gt;&lt;li&gt;Understand security operations frameworks, processes, and procedures&lt;/li&gt;&lt;li&gt;Understand deep forensics procedures by resource type&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Specify security baselines for server and client endpoints&lt;/li&gt;&lt;li&gt;Specify security requirements for servers&lt;/li&gt;&lt;li&gt;Specify security requirements for mobile devices and clients&lt;/li&gt;&lt;li&gt;Specify requirements for securing Active Directory Domain Services&lt;/li&gt;&lt;li&gt;Design a strategy to manage secrets, keys, and certificates&lt;/li&gt;&lt;li&gt;Design a strategy for secure remote access&lt;/li&gt;&lt;li&gt;Understand security operations frameworks, processes, and procedures&lt;/li&gt;&lt;li&gt;Understand deep forensics procedures by resource type&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services&lt;/h5&gt;&lt;p&gt;Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Specify security baselines for PaaS services&lt;/li&gt;&lt;li&gt;Specify security baselines for IaaS services&lt;/li&gt;&lt;li&gt;Specify security baselines for SaaS services&lt;/li&gt;&lt;li&gt;Specify security requirements for IoT workloads&lt;/li&gt;&lt;li&gt;Specify security requirements for data workloads&lt;/li&gt;&lt;li&gt;Specify security requirements for web workloads&lt;/li&gt;&lt;li&gt;Specify security requirements for storage workloads&lt;/li&gt;&lt;li&gt;Specify security requirements for containers&lt;/li&gt;&lt;li&gt;Specify security requirements for container orchestration&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Specify security baselines for PaaS, SaaS and IaaS services&lt;/li&gt;&lt;li&gt;Specify security requirements for IoT, data, storage, and web workloads&lt;/li&gt;&lt;li&gt;Specify security requirements for containers and container orchestration&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 9: Specify security requirements for applications&lt;/h5&gt;&lt;p&gt;Learn how to specify security requirements for applications.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Understand application threat modeling&lt;/li&gt;&lt;li&gt;Specify priorities for mitigating threats to applications&lt;/li&gt;&lt;li&gt;Specify a security standard for onboarding a new application&lt;/li&gt;&lt;li&gt;Specify a security strategy for applications and APIs&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Specify priorities for mitigating threats to applications&lt;/li&gt;&lt;li&gt;Specify a security standard for onboarding a new application&lt;/li&gt;&lt;li&gt;Specify a security strategy for applications and APIs&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 10: Design a strategy for securing data&lt;/h5&gt;&lt;p&gt;Learn how to design a strategy for securing data.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction&lt;/li&gt;&lt;li&gt;Prioritize mitigating threats to data&lt;/li&gt;&lt;li&gt;Design a strategy to identify and protect sensitive data&lt;/li&gt;&lt;li&gt;Specify an encryption standard for data at rest and in motion&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prioritize mitigating threats to data&lt;/li&gt;&lt;li&gt;Design a strategy to identify and protect sensitive data&lt;/li&gt;&lt;li&gt;Specify an encryption standard for data at rest and in motion&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Design a Zero Trust strategy and architecture
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Design security for infrastructure
- Design a strategy for data and applications</objective_plain><essentials_plain>Before attending this course, students must have:


- Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
- Experience with hybrid and cloud implementations.</essentials_plain><audience_plain>IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.</audience_plain><contents_plain>- Build an overall security strategy and architecture
- Design a security operations strategy
- Design an identity security strategy
- Evaluate a regulatory compliance strategy
- Evaluate security posture and recommend technical strategies to manage risk
- Understand architecture best practices and how they are changing with the Cloud
- Design a strategy for securing server and client endpoints
- Design a strategy for securing PaaS, IaaS, and SaaS services
- Specify security requirements for applications
- Design a strategy for securing data</contents_plain><outline_plain>Module 1: Build an overall security strategy and architecture

Learn how to build an overall security strategy and architecture.

Lessons


- Introduction
- Zero Trust overview
- Develop Integration points in an architecture
- Develop security requirements based on business goals
- Translate security requirements into technical capabilities
- Design security for a resiliency strategy
- Design a security strategy for hybrid and multi-tenant environments
- Design technical and governance strategies for traffic filtering and segmentation
- Understand security for protocols
- Exercise: Build an overall security strategy and architecture
- Knowledge check
- Summary
After completing this module, students will be able to:


- Develop Integration points in an architecture
- Develop security requirements based on business goals
- Translate security requirements into technical capabilities
- Design security for a resiliency strategy
- Design security strategy for hybrid and multi-tenant environments
- Design technical and governance strategies for traffic filtering and segmentation
Module 2: Design a security operations strategy

Learn how to design a security operations strategy.

Lessons


- Introduction
- Understand security operations frameworks, processes, and procedures
- Design a logging and auditing security strategy
- Develop security operations for hybrid and multi-cloud environments
- Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,
- Evaluate security workflows
- Review security strategies for incident management
- Evaluate security operations strategy for sharing technical threat intelligence
- Monitor sources for insights on threats and mitigations
- After completing this module, students will be able to:
- Design a logging and auditing security strategy
- Develop security operations for hybrid and multi-cloud environments.
- Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A
- Evaluate security workflows.
- Review security strategies for incident management.
- Evaluate security operations for technical threat intelligence.
- Monitor sources for insights on threats and mitigations.
Module 3: Design an identity security strategy

Learn how to design an identity security strategy.

Lessons


- Introduction
- Secure access to cloud resources
- Recommend an identity store for security
- Recommend secure authentication and security authorization strategies
- Secure conditional access
- Design a strategy for role assignment and delegation
- Define Identity governance for access reviews and entitlement management
- Design a security strategy for privileged role access to infrastructure
- Design a security strategy for privileged activities
- Understand security for protocols
After completing this module, students will be able to:


- Recommend an identity store for security.
- Recommend secure authentication and security authorization strategies.
- Secure conditional access.
- Design a strategy for role assignment and delegation.
- Define Identity governance for access reviews and entitlement management.
- Design a security strategy for privileged role access to infrastructure.
- Design a security strategy for privileged access.
Module 4: Evaluate a regulatory compliance strategy

Learn how to evaluate a regulatory compliance strategy.

Lessons


- Introduction
- Interpret compliance requirements and their technical capabilities
- Evaluate infrastructure compliance by using Microsoft Defender for Cloud
- Interpret compliance scores and recommend actions to resolve issues or improve security
- Design and validate implementation of Azure Policy
- Design for data residency Requirements
- Translate privacy requirements into requirements for security solutions
- After completing this module, students will be able to:
- Interpret compliance requirements and their technical capabilities
- Evaluate infrastructure compliance by using Microsoft Defender for Cloud
- Interpret compliance scores and recommend actions to resolve issues or improve security
- Design and validate implementation of Azure Policy
- Design for data residency requirements
- Translate privacy requirements into requirements for security solutions
Module 5: Evaluate security posture and recommend technical strategies to manage risk

Learn how to evaluate security posture and recommend technical strategies to manage risk.

Lessons


- Introduction
- Evaluate security postures by using benchmarks
- Evaluate security postures by using Microsoft Defender for Cloud
- Evaluate security postures by using Secure Scores
- Evaluate security hygiene of Cloud Workloads
- Design security for an Azure Landing Zone
- Interpret technical threat intelligence and recommend risk mitigations
- Recommend security capabilities or controls to mitigate identified risks
After completing this module, students will be able to:


- Evaluate security postures by using benchmarks
- Evaluate security postures by using Microsoft Defender for Cloud
- Evaluate security postures by using Secure Scores
- Evaluate security hygiene of Cloud Workloads
- Design security for an Azure Landing Zone
- Interpret technical threat intelligence and recommend risk mitigations
- Recommend security capabilities or controls to mitigate identified risks
Module 6: Understand architecture best practices and how they are changing with the Cloud

Learn about architecture best practices and how they are changing with the Cloud.

Lessons


- Introduction
- Plan and implement a security strategy across teams
- Establish a strategy and process for proactive and continuous evolution of a security strategy
- Understand network protocols and best practices for network segmentation and traffic filtering
After completing this module, students will be able to:


- Describe best practices for network segmentation and traffic filtering.
- Plan and implement a security strategy across teams.
- Establish a strategy and process for proactive and continuous evaluation of security strategy.
Module 7: Design a strategy for securing server and client endpoints

Learn how to design a strategy for securing server and client endpoints.

Lessons


- Introduction
- Specify security baselines for server and client endpoints
- Specify security requirements for servers
- Specify security requirements for mobile devices and clients
- Specify requirements for securing Active Directory Domain Services
- Design a strategy to manage secrets, keys, and certificates
- Design a strategy for secure remote access
- Understand security operations frameworks, processes, and procedures
- Understand deep forensics procedures by resource type
After completing this module, students will be able to:


- Specify security baselines for server and client endpoints
- Specify security requirements for servers
- Specify security requirements for mobile devices and clients
- Specify requirements for securing Active Directory Domain Services
- Design a strategy to manage secrets, keys, and certificates
- Design a strategy for secure remote access
- Understand security operations frameworks, processes, and procedures
- Understand deep forensics procedures by resource type
Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services

Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.

Lessons


- Introduction
- Specify security baselines for PaaS services
- Specify security baselines for IaaS services
- Specify security baselines for SaaS services
- Specify security requirements for IoT workloads
- Specify security requirements for data workloads
- Specify security requirements for web workloads
- Specify security requirements for storage workloads
- Specify security requirements for containers
- Specify security requirements for container orchestration
After completing this module, students will be able to:


- Specify security baselines for PaaS, SaaS and IaaS services
- Specify security requirements for IoT, data, storage, and web workloads
- Specify security requirements for containers and container orchestration
Module 9: Specify security requirements for applications

Learn how to specify security requirements for applications.

Lessons


- Introduction
- Understand application threat modeling
- Specify priorities for mitigating threats to applications
- Specify a security standard for onboarding a new application
- Specify a security strategy for applications and APIs
After completing this module, students will be able to:


- Specify priorities for mitigating threats to applications
- Specify a security standard for onboarding a new application
- Specify a security strategy for applications and APIs
Module 10: Design a strategy for securing data

Learn how to design a strategy for securing data.

Lessons


- Introduction
- Prioritize mitigating threats to data
- Design a strategy to identify and protect sensitive data
- Specify an encryption standard for data at rest and in motion
After completing this module, students will be able to:


- Prioritize mitigating threats to data
- Design a strategy to identify and protect sensitive data
- Specify an encryption standard for data at rest and in motion</outline_plain><duration unit="d" days="4">4 dias</duration><pricelist><price country="IT" currency="EUR">1690.00</price><price country="DE" currency="EUR">2690.00</price><price country="SE" currency="EUR">2690.00</price><price country="IL" currency="ILS">9330.00</price><price country="GR" currency="EUR">1000.00</price><price country="MK" currency="EUR">1000.00</price><price country="HU" currency="EUR">1000.00</price><price country="SG" currency="USD">1919.00</price><price country="IN" currency="USD">1499.00</price><price country="AE" currency="USD">2450.00</price><price country="NL" currency="EUR">1995.00</price><price country="BE" currency="EUR">1995.00</price><price country="PL" currency="PLN">3600.00</price><price country="AT" currency="EUR">2690.00</price><price country="CA" currency="CAD">2595.00</price><price country="US" currency="USD">2595.00</price><price country="UA" currency="USD">1200.00</price><price country="GB" currency="GBP">2610.00</price><price country="CH" currency="CHF">3380.00</price><price country="SI" currency="EUR">2690.00</price><price country="FR" currency="EUR">2850.00</price></pricelist><miles/></course>