About On-Demand Learning
TechSherpas 365’s On-Demand courses provide you with access to Microsoft official courseware materials and hands-on labs, empowering you to learn at your own pace. On-Demand allows you to design your training around your schedule, budget, and individual learning needs.
On-Demand Learning is a perfect solution for students who are unable to attend traditional instructor-led training due to schedule constraints. You receive the same materials and labs as an instructor-led course, with the added convenience of flexible scheduling and a lower price tag.
This On-Demand Course Includes:
- Microsoft Official Courseware License with Lifetime Access (and automatic version updates)
- Access to Hands-on Labs for 180 days
- Access to 3 hours of Instructor Time (upon request):
- One-on-one live instructor time geared towards your specific needs
- Scheduled in 1-hour increments
ABOUT THIS COURSE
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Audience Profile
IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.
Job role: Solution Architect
Preparation for exam: SC-100
Features: none
Skills gained
- Design a Zero Trust strategy and architecture
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Design security for infrastructure
- Design a strategy for data and applications
Prerequisites
Before attending this course, students must have:
- Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
- Experience with hybrid and cloud implementations.