757-216-3656 | Monday–Friday 8:30 AM – 4:30 PM | info@itdojo.com

Course Duration

4 Days

Audience

Employees of federal, state and local governments; and businesses working with the government.

Prerequisites

Candidates should hold an Associate-level Microsoft security certification such as AZ-500, SC-200, or SC-300, or have equivalent hands-on experience in cybersecurity architecture and Azure security.

Course Description

This Expert-level course prepares senior security professionals to design and evaluate cybersecurity strategy across enterprise environments. Covering Zero Trust architecture, security operations, identity, compliance, data, application, and infrastructure security, this course addresses the full scope of the SC-100 exam. Participants will learn to translate business requirements into technical security solutions, assess security posture, and advise executive leadership on risk and governance. Ideal for DoD and federal security architects, ISSMs, and senior engineers moving into an architect role.

Learning Objectives

  • Design a Zero Trust strategy and architecture aligned with organizational requirements
  • Evaluate and design a security operations strategy including logging, SIEM, and SOAR
  • Design an identity security strategy using Azure Active Directory and hybrid identity
  • Evaluate regulatory compliance strategies against GRC frameworks including NIST, FedRAMP, and CMMC
  • Assess and improve security posture using Microsoft Defender for Cloud and Secure Score
  • Design security for infrastructure including servers, containers, and hybrid environments
  • Design a security strategy for applications including DevSecOps and API protection
  • Design a data security strategy covering classification, protection, and governance
  • Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA)
  • Translate business risk requirements into actionable technical security architecture

Course Outline

Module 1 – BUILD AN OVERALL SECURITY STRATEGY AND ARCHITECTURE
  • Introduction to Zero Trust and best practice frameworks
  • Design solutions that align with the Cloud Adoption Framework and Well-Architected Framework
  • Design solutions that align with Microsoft Cybersecurity Reference Architectures (MCRA)
  • Translate business goals into security requirements
  • Design a resiliency strategy for ransomware and other attacks
  • Design a security strategy for hybrid and multi-cloud environments
Module 2 – DESIGN A SECURITY OPERATIONS STRATEGY
  • Design a security operations strategy for logging and auditing
  • Design a security operations strategy for SIEM and SOAR using Microsoft Sentinel
  • Design a security operations strategy for incident management
  • Design a security operations strategy for monitoring hybrid and multi-cloud environments
  • Design a strategy for security workflow automation
Module 3 – DESIGN AN IDENTITY SECURITY STRATEGY
  • Design a strategy for access to cloud resources
  • Recommend an identity store for security
  • Recommend a secure authentication strategy
  • Recommend a secure authorization strategy
  • Design a strategy for conditional access and identity protection
  • Design a strategy for privileged access and role assignments
  • Design a security strategy for hybrid and external identities
Module 4 – EVALUATE REGULATORY COMPLIANCE
  • Interpret compliance requirements and translate into technical controls
  • Evaluate compliance using Microsoft Defender for Cloud
  • Evaluate privacy requirements
  • Address compliance requirements using Azure Policy
  • Evaluate infrastructure compliance using Microsoft Defender for Cloud
  • Design a data residency strategy
  • Translate privacy requirements into controls for data and applications
Module 5 – EVALUATE SECURITY POSTURE AND RECOMMEND TECHNICAL STRATEGIES
  • Evaluate security posture using benchmarks and MCSB
  • Evaluate security posture using Microsoft Defender for Cloud
  • Evaluate security posture of cloud workloads
  • Evaluate external attack surface using Microsoft Defender External Attack Surface Management
  • Assess organizational security hygiene using Secure Score
  • Review security posture for on-premises and hybrid environments
  • Design technical security improvements
Module 6 – DESIGN SECURITY FOR INFRASTRUCTURE
  • Design a security strategy for endpoint security
  • Design a strategy for server and client endpoint security
  • Design security for OT and IoT workloads
  • Design a security baseline strategy for server workloads
  • Design a security strategy for containers and container orchestration
Module 7 – DESIGN A STRATEGY FOR DATA AND APPLICATIONS
  • Design an application security strategy
  • Prioritize threats using threat modeling
  • Design a security lifecycle strategy for applications
  • Secure access to workloads using identity-based security controls
  • Design a DevSecOps strategy
  • Design a data security strategy
  • Design a strategy for data classification and labeling
  • Design a strategy for data encryption at rest and in transit

Frequently Asked Questions

What is the SC-100 Microsoft Cybersecurity Architect certification?

SC-100 is Microsoft's Expert-level cybersecurity certification — the highest tier in the Microsoft security certification track. It validates the ability to design and evaluate enterprise security architecture across identity, operations, infrastructure, data, and applications. It is especially relevant for DoD and federal security architects, ISSMs, and senior security engineers advising on Zero Trust and compliance strategy.

What are the prerequisites for SC-100 training?

Microsoft recommends holding at least one Associate-level security certification such as AZ-500, SC-200, or SC-300, or having equivalent experience. At IT Dojo, most students attending this course are experienced security professionals with hands-on Azure or Microsoft 365 security experience.

How long is IT Dojo's SC-100 training?

IT Dojo's SC-100 training is 4 Days. It is available as live remote online instruction or on-site at your facility. All sessions are instructor-led with small class sizes to ensure individual attention.

Is this course available as live remote online training?

Yes. IT Dojo offers SC-100T00 as live remote online training. A certified instructor leads the session in real time — students interact via chat or microphone. Classes are kept small (typically no more than 16 students) to ensure engagement. On-site delivery at your government facility or contractor location is also available.

How does SC-100 differ from SC-200 or AZ-500?

SC-200 and AZ-500 are Associate-level certifications focused on operating and implementing security controls. SC-100 is the Expert-level certification that builds on those skills, focusing on designing and evaluating security strategy and architecture across an entire enterprise — including governance, risk, compliance, and Zero Trust alignment.

How do I register for this course?

IT Dojo training is employer-sponsored — your organization registers and pays for seats. To schedule SC-100T00 for your team, contact IT Dojo via the Request Training form or call 757-216-3656. IT Dojo will work with your contracting officer, training coordinator, or program office to set up the course.

Get More Information

We cannot work with the general public. We only work with Government Agencies, Military, government contractors, and corporate clients.