Type
Virtual
Classroom ILT
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R9 700,00
Price excluding VAT
Introduction:
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Audience profile:
IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.
Job role: Solution Architect
Pre-requisites:
Before attending this course, students must have:
- Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
- Experience with hybrid and cloud implementations.
Course Objectives:
- Design a Zero Trust strategy and architecture
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Design security for infrastructure
- Design a strategy for data and applications
Module 1: Build an overall security strategy and architecture |
Learn how to build an overall security strategy and architecture.
Lessons: |
|
After completing this module, students will be able to: |
|
Module 2: Design a security operations strategy |
Learn how to design a security operations strategy.
Lessons: |
|
After completing this module, students will be able to |
|
Module 3: Design an identity security strategy |
Learn how to design an identity security strategy.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 4: Evaluate a regulatory compliance strategy |
Learn how to evaluate a regulatory compliance strategy.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 5: Evaluate security posture and recommend technical strategies to manage risk |
Learn how to evaluate security posture and recommend technical strategies to manage risk.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 6: Understand architecture best practices and how they are changing with the Cloud |
Learn about architecture best practices and how they are changing with the Cloud.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 7: Design a strategy for securing server and client endpoints |
Learn how to design a strategy for securing server and client endpoints.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services |
Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 9: Specify security requirements for applications |
Learn how to specify security requirements for applications.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 10: Design a strategy for securing data |
Learn how to design a strategy for securing data.
Lessons: |
|
After completing this module, you will be able to: |
|
Torque IT specializes in providing our Clients with Vendor authorized instructor-led training, enablement IT courses, and certification solutions.
Associated certifications and exam:
The course helps learners prepare for the Exam SC-100: Microsoft Cybersecurity Architect.
On successful completion of this course students will receive a Torque IT attendance certificate.
Microsoft Overview
Skilled Microsoft engineers add significant value to the marketplace by reducing the cost of technology solutions whilst improving efficiency and fuelling innovation. Through authorized Microsoft training, Torque IT empowers engineers, developers and end-users to realise their full potential by providing them with the necessary knowledge and skills to optimise the adoption and use of Microsoft solutions.
Torque IT considers authorised Microsoft training to be an integral part of any Microsoft implementation. Microsoft authorised training, and associated certification, ensures that you get the most from your technology investment and that you are able to operate above the technology curve. Microsoft career certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Authorized Microsoft training and certification is the industry standard for any solution that includes designing, selling, implementing, upgrading, managing, and operating Microsoft solutions.
For 19 years, Torque IT has maintained the status of Gold Learning Partner for Microsoft in South Africa. This is the highest level of accreditation that Microsoft awards to Learning Partners that specialize in technical, product, sales, development, end-user and solutions training.
These achievements reflect our commitment to providing our customers with quality skills development, enablement, training, and certification solutions that demonstrate exceptional depth, breadth, and expertise across Windows Server, Windows Client, Microsoft Virtualization, Microsoft Azure, Office 365, Exchange Server, SharePoint Server, Skype for Business, System Centre Server, Visual Studio and Microsoft Office technologies.
Torque is recognized by Microsoft, and the industry, as having met rigorous standards for educational competency, service, customer satisfaction and investment in Microsoft technologies that will prepare the next generation of IT industry professionals.