Course Description

Microsoft Cybersecurity Architect designs and implements security solutions to protect an organization’s digital assets from cyber threats. Learn how to design cybersecurity solutions that protect an organization's mission and business processes across all aspects of the enterprise architecture.

Students will learn how to design a Zero Trust strategy and architecture, evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies, design security for infrastructure, design strategies for data and applications, and recommend security best practices and priorities.

The course combines lecture with case studies and group discussions.

Before attending this course, you must have experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications.

This course covers the objectives for Microsoft Exam SC-100: Microsoft Cybersecurity Architect.

The University of Calgary is Microsoft Education Global Training Partner.

Course Details

Learning Outcomes:

By the completion of this course, successful students will be able to:

  • Design a Zero Trust strategy and architecture 
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies 
  • Design security for infrastructure 
  • Design a strategy for data and applications 
  • Recommend security best practices and priorities 


  • Build overall security strategy and architecture
  • Design a security operations strategy
  • Design an identity security strategy
  • Evaluate a regulatory compliance strategy
  • Evaluate security posture and recommend technical strategies to manage risk
  • Understand architecture best practices and how they are changing with the Cloud
  • Designing a strategy for securing server and client endpoints
  • Design a strategy for securing PaaS, IaaS, and SaaS services
  • Specify security requirements for applications
  • Design a strategy for securing data
  • Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks
  • Recommend a secure methodology using the Cloud Adoption Framework (CAF)
  • Recommend a ransomware strategy by using Microsoft Security Best Practices


No mandatory prerequisite.  

Self-assessment for enrolment: 

A minimum of 12 months of relevant working experience and knowledge in: 

  • Identity and access, platform protection, security operations, securing data, and securing applications 
  • Hybrid and cloud implementations 


Recommended prerequisites: 

  • SEC 310 Microsoft Identity and Access Administrator 
  • SEC 320 Microsoft Security Operations Analyst 

Applies Towards the Following Program(s)

Enrol Now - Select a section to enrol in
Online Synchronous
T, Th
6:00PM to 9:00PM
May 27, 2025 to Jun 26, 2025
Schedule and Location
Delivery Options
Course Fees
Flat Fee non-credit $979.00
Section Notes

Classes are held online in real time (Mountain Time) at the specified time and dates.

Students will require access to a computer with the required software, Internet connection, a headset with speakers and microphone, webcam, and a monitor large enough to display multiple applications (or the use of two monitors).

This course uses Desire2Learn (D2L), an online learning management system, and Zoom web conferencing software. The instructor will post the course outline and other materials in D2L. For more information, please visit our Online Learning Resources.

Unless notified, all online courses are available at 9 am MT the day before the start date. Students registered on (or after) the start date will receive access within one day of registration.

Students unfamiliar with online learning are encouraged to take our free Digital Skills for Learning Online course.

Unless otherwise stated, notice of withdrawal or transfer from a course must be received at least seven calendar days prior to the start date of the course.

Required fields are indicated by .