SC-100 Cybersecurity Architect Bootcamp
Bootcamp Certificate Track
Security architecture labs and threat-modeling workshops. Estimated effort: 80–120 hours.
🔗 Official Certification PageWho This Is For?
- Security architects and senior engineers
- Cloud professionals designing enterprise security
- Compliance and risk leaders
What You'll Achieve
- End-to-end cybersecurity architecture skills
- Strong zero-trust and defense-in-depth design capability
- Confidence designing secure enterprise systems
Start Date
Rolling Enrollment
New cohorts start every month
Duration
6 Weeks
Expert cybersecurity architect training
Instructor
CloudeGree Academy
Learn from industry-expert cybersecurity architects with years of real-world enterprise security experience. Our academy provides hands-on, exam-focused training designed to get you certified faster.
What You'll Learn
Zero Trust Strategy
Design and evaluate zero trust security strategies
Security Operations
Design security operations, logging, and threat detection
Identity & Access
Architect secure identity, access management, and privileged access
Infrastructure Security
Secure applications, data, and infrastructure components
Full Curriculum Outline (Exam-Aligned)
Comprehensive coverage of all exam objectives with hands-on practice
Bootcamp Curriculum
6-week intensive program with hands-on security labs and real-world architecture projects
Week 1 - Security Strategy, Zero Trust & Resiliency
Skills Area: Security best practices and priorities (20–25%)
What You'll Learn
- Design a security strategy that supports business resiliency goals
- Identify and prioritize threats to business-critical assets
- Design ransomware resiliency strategies: Secure backup and restore, Privileged access prioritization
- Design BCDR solutions for hybrid and multicloud environments
- Evaluate security update strategies
- Design solutions aligned with MCRA, MCSB
- Design Zero Trust architectures: Zero Trust Rapid Modernization Plan (RaMP)
- Align security with Microsoft Cloud Adoption Framework (CAF) and Azure Well-Architected Framework (WAF)
- Design security governance using Azure landing zones
- Design DevSecOps processes aligned with CAF best practices
Hands-On Labs
- Design a Zero Trust enterprise reference architecture
- Build a ransomware resiliency and BCDR strategy
- Map security controls to CAF and WAF
- Design a secure Azure landing zone security model
Week 2 - Security Operations, SIEM, SOAR & Threat Coverage
Skills Area: Security operations capabilities (part of 25–30%)
What You'll Learn
- Design detection and response solutions using Microsoft Defender XDR and SIEM (Microsoft Sentinel)
- Design centralized logging and auditing: Microsoft Purview Audit
- Design monitoring for hybrid and multicloud environments
- Design SOAR solutions using Sentinel
- Design and evaluate incident response workflows, threat hunting workflows, and incident management processes
- Evaluate threat detection coverage using MITRE ATT&CK: Enterprise, Cloud, Mobile, ICS
Hands-On Labs
- Design an enterprise SOC architecture
- Map detection coverage to MITRE ATT&CK matrices
- Design Sentinel-based SOAR playbooks
- Build centralized logging and audit architecture
Week 3 - Identity, Access & Privileged Security
Skills Area: Identity and privileged access (part of 25–30%)
What You'll Learn
- Design access solutions for SaaS, PaaS, IaaS, and hybrid/multicloud environments
- Design Microsoft Entra ID architectures: Hybrid identity, Multicloud identity
- Design solutions for External identities (B2B) and Decentralized identity
- Design modern authentication and authorization: Conditional Access, Continuous Access Evaluation, Risk scoring
- Validate Conditional Access alignment with Zero Trust
- Specify requirements to harden AD DS
- Design secrets, keys, and certificate management solutions
- Design privileged access strategies: Enterprise access model, Entra PIM, Entitlement management, Access reviews
- Design Privileged Access Workstations (PAW)
- Design cloud infrastructure entitlement management
Hands-On Labs
- Design a Zero Trust identity architecture
- Implement privileged access governance with Entra PIM
- Design Conditional Access policies aligned to Zero Trust
- Design PAW and secure admin access model
Week 4 - Compliance, Privacy & Governance
Skills Area: Regulatory compliance (part of 25–30%)
What You'll Learn
- Translate regulatory requirements into security controls
- Design compliance solutions using Microsoft Purview and Microsoft Priva
- Design Azure Policy strategies for security and compliance
- Evaluate regulatory alignment using Microsoft Defender for Cloud
- Design compliance monitoring and validation strategies
Hands-On Labs
- Map compliance requirements to Azure Policy controls
- Design a Purview-based compliance architecture
- Implement Defender for Cloud compliance assessments
- Design privacy controls using Microsoft Priva
Week 5 - Infrastructure, Network & Endpoint Security
Skills Area: Infrastructure security (25–30%)
What You'll Learn
- Design security posture management for hybrid and multicloud: Defender for Cloud, Secure Score
- Design integrated posture management solutions
- Design workload protection strategies
- Design Azure Arc security integration
- Design External Attack Surface Management (Defender EASM)
- Define posture management processes using Security Exposure Management and Attack paths
- Specify security requirements for Servers, Clients, Mobile devices, IoT and OT/ICS
- Evaluate Windows LAPS
- Design security baselines for SaaS, PaaS, IaaS
- Design network security and SSE solutions: Entra Internet Access, Entra Private Access
Hands-On Labs
- Design hybrid and multicloud posture management architecture
- Implement Defender for Cloud workload protection model
- Design network security with SSE and Zero Trust access
- Design OT / IoT security architecture
Week 6 - Application & Data Security + Capstone
Skills Area: Applications and data security (20–25%)
What You'll Learn
- Evaluate Microsoft 365 security posture using Secure Score
- Design security using Defender for Office 365 and Defender for Cloud Apps
- Design device management using Intune
- Design data security using Microsoft Purview
- Evaluate Copilot for Microsoft 365 security controls
- Design application security: Threat modeling, Secure SDLC, Workload identity, API security, Azure WAF
- Design data security solutions: Data discovery and classification, Encryption (at rest/in transit), Key Vault
- Design security for Azure SQL, Synapse, Cosmos DB, Azure Storage
- Design Defender for Storage and Defender for Databases
Hands-On Labs
- Design a secure Microsoft 365 architecture
- Perform threat modeling for critical applications
- Design API and workload identity security
- Design data protection architecture for Azure workloads
Capstone Project
- Design a full enterprise cybersecurity architecture covering Zero Trust, Identity, SOC & SIEM, Infrastructure, Applications, and Data
- Architecture review and defense session with instructor
Certification Outcome
By completing this bootcamp, learners will be able to:
- Design enterprise-grade cybersecurity architectures
- Align security strategy with business risk
- Confidently sit the SC-100 certification exam
- Operate at Cybersecurity Architect level
Need a Custom Learning Path?
If you are new to cloud or security, we recommend starting with Cloud Foundation - Live Bootcamp before SC-100.
You can book a free consultation to receive a personalized learning curriculum.
Begin Your Security Architecture Journey
This comprehensive bootcamp takes you from security fundamentals to expert-level architecture design with zero-trust principles.