Course Details
Topic 1 Design solutions that align with security best practices and priorities
1.1 Introduction to Zero Trust and best practice frameworks
- Introduction to best practices5
- Introduction to Zero Trust
- Zero Trust initiatives
- Zero Trust technology pillars part 1
- Zero Trust technology pillars part 2
1.2 Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Define a security strategy
- Introduction to the Cloud Adoption Framework
- Cloud Adoption Framework secure methodology
- Introduction to Azure Landing Zones
- Design security with Azure Landing Zones
- Introduction to the Well-Architected Framework
- The Well-Architected Framework security pillar
1.3 Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
- Design solutions with best practices for capabilities and controls
- Design solutions with best practices for attack protection
1.4 Design a resiliency strategy for common cyberthreats like ransomware
- Common cyberthreats and attack patterns
- Support business resiliency
- Ransomware protection
- Configurations for secure backup and restore
- • Security updates
1.5 Case study: Design solutions that align with security best practices and priorities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 2 Design security operations, identity, and compliance capabilities
2.1 Design solutions for regulatory compliance
- Introduction to regulatory compliance
- Translate compliance requirements into a security solution
- Address compliance requirements with Microsoft Purview
- Address privacy requirements with Microsoft Priva
- Address security and compliance requirements with Azure policy
- Evaluate infrastructure compliance with Defender for Cloud
2.2 Design security solutions for applications and data
- Introduction to security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
2.3 Design solutions for identity and access management
- Introduction to Identity and Access Management
- Design cloud, hybrid and multicloud access strategies (including Azure AD)
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Align conditional access and Zero Trust
- Specify requirements to secure Active Directory Domain Services (AD DS)
- Design a solution to manage secrets, keys, and certificates
2.4 Design solutions for securing privileged access
- Introduction to privileged access
- The enterprise access model
- Design identity governance solutions
- Design a solution to secure tenant administration15 min
- Design a solution for cloud infrastructure entitlement management (CIEM)
- Design a solution for privileged access workstations and bastion services
2.5 Design solutions for security operations
- Introduction to Security operations (SecOps)
- Design security operations capabilities in hybrid and multicloud environments
- Design centralized logging and auditing
- Design security information and event management (SIEM) solutions
- Design solutions for detection and response
- Design a solution for security orchestration, automation, and response (SOAR)
- Design security workflows
- Design threat detection coverage
2.6 Case study: Design security operations, identity and compliance capabilities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 3 Design security solutions for applications and data
3.1 Design solutions for securing Microsoft 365
- Introduction to security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
3.2 Design solutions for securing applications
- Introduction to application security
- Design and implement standards to secure application development
- Evaluate security posture of existing application portfolios
- Evaluate application threats with threat modeling
- Design security lifecycle strategy for applications
- Secure access for workload identities
- Design a solution for API management and security
- Design a solution for secure access to applications
3.3 Design solutions for securing an organization's data
- Introduction to data security5
- Design a solution for data discovery and classification using Microsoft Purview
- Design a solution for data protection
- Design data security for Azure workloads
- Design security for Azure Storage
- Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
3.4 Case study: Design security solutions for applications and data
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Topic 4 Design security solutions for infrastructure
4.1 Specify requirements for securing SaaS, PaaS, and IaaS services
- Introduction to security for SaaS, PaaS, and IaaS
- Specify security baselines for SaaS, PaaS, and IaaS services
- Specify security requirements for web workloads
- Specify security requirements for containers and container orchestration
4.2 Design solutions for security posture management in hybrid and multicloud environments
- Introduction to hybrid and multicloud posture management
- Evaluate security posture by using Microsoft Cloud Security Benchmark
- Design integrated posture management and workload protection
- Evaluate security posture by using Microsoft Defender for Cloud
- Posture evaluation with Microsoft Defender for Cloud secure score
- Design cloud workload protection with Microsoft Defender for Cloud
- Integrate hybrid and multicloud environments with Azure Arc
- Design a solution for external attack surface management
4.3 Design solutions for securing server and client endpoints
- Introduction to endpoint security
- Specify server security requirements
- Specify requirements for mobile devices and clients
- Specify internet of things (IoT) and embedded device security requirements
- Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
4.4 Design solutions for network security
- Design solutions for network segmentation
- Design solutions for traffic filtering with network security groups
- Design solutions for network posture management
- Design solutions for network monitoring
4.5 Case study: Design security solutions for infrastructure
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Final Assessment
- Written Assessment - Short Answer Questions (WA-SAQ)
- Practical Performance (PP)
Course Info
Promotion Code
Promo or discount cannot be applied to WSQ courses
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target age group: 21-65 years old
Minimum Software/Hardware Requirement
<p
Software:
Sign up for a free Microsoft Account
Hardware: Windows and Mac Laptops
About Progressive Wage Model (PWM)
The Progressive Wage Model (PWM) helps to increase wages of workers through upgrading skills and improving productivity.
Employers must ensure that their Singapore citizen and PR workers meet the PWM training requirements of attaining at least 1 Workforce Skills Qualification (WSQ) Statement of Attainment, out of the list of approved WSQ training modules.
For more information on PWM, please visit MOM site.
Funding Eligility Criteria
| Individual Sponsored Trainee | Employer Sponsored Trainee |
|
|
|
SkillsFuture Credit:
PSEA:
|
Absentee Payroll (AP) Funding:
SFEC:
|
Steps to Apply Skills Future Claim
- The staff will send you an invoice with the fee breakdown.
- Login to the MySkillsFuture portal, select the course you’re enrolling on and enter the course date and schedule.
- Enter the course fee payable by you (including GST) and enter the amount of credit to claim.
- Upload your invoice and click ‘Submit’
SkillsFuture Level-Up Program
The SkillsFuture Level-Up Programme provides greater structural support for mid-career Singaporeans aged 40 years and above to pursue a substantive skills reboot and stay relevant in a changing economy. For more information, visit SkillsFuture Level-Up Programme
Get Additional Course Fee Support Up to $500 under UTAP
The Union Training Assistance Programme (UTAP) is a training benefit provided to NTUC Union Members with an objective of encouraging them to upgrade with skills training. It is provided to minimize the training cost. If you are a NTUC Union Member then you can get 50% funding (capped at $500 per year) under Union Training Assistance Programme (UTAP).
For more information visit NTUC U Portal – Union Training Assistance Program (UTAP)
Steps to Apply UTAP
- Log in to your U Portal account to submit your UTAP application upon completion of the course.
Note
- SSG subsidy is available for Singapore Citizens, Permanent Residents, and Corporates.
- All Singaporeans aged 25 and above can use their SkillsFuture Credit to pay. For more details, visit www.skillsfuture.gov.sg/credit
- An unfunded course fee can be claimed via SkillsFuture Credit or paid in cash.
- UTAP funding for NTUC Union Members is capped at $250 for 39 years and below and at $500 for 40 years and above.
- UTAP support amount will be paid to training provider first and claimed after end of class by learner.
Appeal Process
- The candidate has the right to disagree with the assessment decision made by the assessor.
- When giving feedback to the candidate, the assessor must check with the candidate if he agrees with the assessment outcome.
- If the candidate agrees with the assessment outcome, the assessor & the candidate must sign the Assessment Summary Record.
- If the candidate disagrees with the assessment outcome, he/she should not sign in the Assessment Summary Record.
- If the candidate intends to appeal the decision, he/she should first discuss the matter with the assessor/assessment manager.
- If the candidate is still not satisfied with the decision, the candidate must notify the assessor of the decision to appeal. The assessor will reflect the candidate’s intention in the Feedback Section of the Assessment Summary Record.
- The assessor will notify the assessor manager about the candidate’s intention to lodge an appeal.
- The candidate must lodge the appeal within 7 days, giving reasons for appeal
- The assessor can help the candidate with writing and lodging the appeal.
- he assessment manager will collect information from the candidate & assessor and give a final decision.
- A record of the appeal and any subsequent actions and findings will be made.
- An Assessment Appeal Panel will be formed to review and give a decision.
- The outcome of the appeal will be made known to the candidate within 2 weeks from the date the appeal was lodged.
- The decision of the Assessment Appeal Panel is final and no further appeal will be entertained.
- Please click the link below to fill up the Candidates Appeal Form.
Job Roles
- Cybersecurity Architect
- Information Security Analyst
- Security Consultant
- IT Security Manager
- Network Security Engineer
- Security Analyst
- Chief Information Security Officer (CISO)
- Security Solutions Architect
- Cybersecurity Engineer
- IT Manager
- Systems Administrator
- Risk Manager
- Compliance Officer
- Security Researcher
- Incident Responder
Trainers
Sivanesan Sivakaruniam: Sivanesan Sivakaruniam is a cybersecurity architect and IT governance expert with over 25 years of experience in enterprise infrastructure, data protection, and information security management. He has led large-scale implementations across financial and government sectors, focusing on compliance, audit, and risk frameworks. As a certified ISO 27001 Lead Auditor and ACTA-qualified trainer, Sivanesan has successfully delivered training in cybersecurity, IT service management, and cloud security to professionals across the Asia-Pacific region.
In “Microsoft Cybersecurity Architect (SC-100) Training,” Sivanesan draws on his expertise in enterprise security architecture and governance to guide learners through advanced defense strategies using Microsoft technologies. His sessions emphasize risk mitigation, zero-trust frameworks, and integrated cloud security architecture. Through hands-on case studies, he equips participants to design, evaluate, and maintain resilient cybersecurity systems aligned with organizational goals and compliance requirements.
Achim Ludwig Dietzenbach: Achim Ludwig Dietzenbach is an IT security and cloud infrastructure specialist with more than two decades of global experience in enterprise systems, cybersecurity frameworks, and Microsoft solutions. Having worked in leadership roles across Europe and Asia, he has designed and deployed secure hybrid infrastructures integrating Microsoft Azure, Active Directory, and M365 ecosystems. Achim is also a certified trainer known for simplifying complex security architectures into practical, business-aligned implementations.
In “Microsoft Cybersecurity Architect (SC-100) Training,” Achim leverages his international experience to help learners understand and implement advanced cybersecurity strategies. His teaching covers enterprise security posture management, cloud security architecture, and identity governance. Through a blend of technical insights and real-world best practices, he prepares professionals to architect secure, scalable, and compliant systems across Microsoft environments.
Agus Salim: Agus Salim is a cloud and cybersecurity professional with over 15 years of experience in IT infrastructure, cloud migration, and enterprise networking. He has led implementation projects involving Azure, AWS, and hybrid security systems for multinational clients. As a certified Microsoft and CompTIA instructor, Agus is recognized for his practical, hands-on teaching style that bridges theoretical cybersecurity concepts with operational applications.
In “Microsoft Cybersecurity Architect (SC-100) Training,” Agus focuses on helping learners design secure enterprise architectures aligned with Microsoft’s cloud security principles. His training covers advanced topics such as zero-trust implementation, workload protection, and hybrid identity management. By combining technical expertise with real-world project experience, Agus ensures participants develop the skills needed to architect secure and resilient digital environments.
Danny Teo Yong Song: Danny Teo is a cybersecurity and IT infrastructure consultant with over 20 years of experience in systems administration, endpoint protection, and enterprise network management. A certified Microsoft trainer, he has delivered professional courses in security operations, cloud administration, and IT compliance for organizations across Southeast Asia. Danny’s background in integrating cloud and on-premise systems gives him a strong foundation in designing secure, high-performance enterprise environments.
In “Microsoft Cybersecurity Architect (SC-100) Training,” Danny helps learners master the core principles of Microsoft’s enterprise security architecture. His sessions emphasize practical implementation of threat protection, information governance, and security monitoring across Azure and Microsoft 365. Through real-world examples and interactive discussions, he prepares participants to apply cybersecurity architecture frameworks effectively in professional settings.
Truman Ng: Truman Ng is a senior cloud and cybersecurity specialist with over two decades of experience in enterprise IT infrastructure, cybersecurity strategy, and digital transformation. He holds professional certifications including PMP, ACTA, and Huawei HCIE, and has trained thousands of IT professionals in cloud computing, cybersecurity operations, and DevOps automation. His deep technical expertise and hands-on approach make him a sought-after trainer for enterprise cybersecurity and Microsoft certification programs.
In “Microsoft Cybersecurity Architect (SC-100) Training,” Truman focuses on helping learners develop a holistic understanding of Microsoft’s cybersecurity architecture and its integration across hybrid and cloud environments. His sessions highlight threat modeling, governance, and incident response planning within the Microsoft ecosystem. By merging strategic and technical perspectives, he equips professionals with the knowledge and frameworks needed to design, secure, and manage complex enterprise infrastructures.
Customer Reviews (2)
- All good Review by Course Participant/Trainee
-
. (Posted on 9/12/2025)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - All good Review by Course Participant/Trainee
-
All good (Posted on 9/12/2025)1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment








