When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 2 modules in this course
Welcome to Design Security Solutions for Applications and Data, a focused and practical course designed for cybersecurity professionals, cloud security architects, and Microsoft cloud administrators. This course is part of the SC-100: Microsoft Certified Cybersecurity Architect Expert specialization and equips you with the expertise to design, implement, and manage secure application and data protection strategies in Microsoft’s cloud ecosystem.
You’ll explore secure cloud application development practices, enforce strong identity controls with Microsoft Entra ID, and leverage Microsoft Defender for Cloud to safeguard workloads. The course also covers encryption at rest and in transit, key management with Azure Key Vault, data residency considerations, and governance strategies using Data Lifecycle Management (DLM).
The course delivers 6–7 hours of targeted video lectures that combine theoretical insights with hands-on demonstrations, demos, and real-world security design scenarios. Organized into two core modules, each includes quizzes and in-video assessments to validate understanding.
Enroll in “Design Security Solutions for Applications and Data” to gain the skills required to design secure, compliant, and resilient application and data protection strategies in Microsoft’s cloud ecosystem.
Who Should Take This Course?
Application Security Engineers & Cloud Developers
Data Protection and Compliance Specialists
Microsoft 365 and Azure Security Administrators
Security Architects preparing for the SC-100 exam
Course Modules:
Microsoft Defender for Cloud to Protect Cloud Applications
Microsoft Cloud Data Protection and Governance
By the end of this specialization, you will:
Master secure application design aligned with Microsoft’s security frameworks
Implement encryption, classification, and governance for sensitive data
Integrate identity-first strategies into application and data security design
Be fully prepared to take and pass the SC-100 certification exam
Welcome to Week 1 of the course! In this module, you’ll explore how to design and protect modern cloud-native applications using Microsoft Defender for Cloud and Entra ID.
You’ll start by examining security considerations in cloud application development, followed by secure coding practices and vulnerability management. Then, you’ll learn how identity and access management plays a central role in securing apps with Microsoft Entra ID. Through practical demos, you’ll see how Defender for Cloud enhances application-level security and how data classification and sensitivity labels help manage information access.
By the end of this week, you’ll be equipped with essential skills to build secure applications, apply access controls, and classify sensitive data to reduce risk and ensure compliance.
What's included
6 videos3 readings2 assignments
Show info about module content
6 videos•Total 38 minutes
Security considerations for developing and deploying cloud applications•8 minutes
Secure Coding Practices and Vulnerability Management for Cloud Applications•6 minutes
Identity and Access Management for Cloud Applications (Microsoft Entra ID Integration)•7 minutes
Microsoft Defender for Cloud to Secure Cloud Applications•7 minutes
Data Classification and Sensitivity Labeling•5 minutes
Data classification and sensitivity labeling - Demo•5 minutes
3 readings•Total 90 minutes
Specialization Course Introduction•35 minutes
Welcome to the Course•30 minutes
Microsoft Defender for Cloud to Protect Cloud Applications - Course Overview•25 minutes
2 assignments•Total 90 minutes
Microsoft Defender for Cloud to Protect Cloud Applications - Graded Assessment•50 minutes
Securing Cloud Applications: Development, Identity, and Data Protection Strategies - Practice Assessment•40 minutes
Microsoft Cloud Data Protection and Governance
Module 2•3 hours to complete
Module details
This week’s focus is on building secure identity foundations using Microsoft Entra ID. You’ll begin by exploring core identity concepts such as users, roles, and access models (RBAC and ABAC), and then move into authentication strategies like MFA and Conditional Access.
You’ll also dive into identity governance-including provisioning, deprovisioning, and access reviews-to ensure that user access is secure, minimal, and auditable. These lessons provide practical insights into securing access in both cloud-native and hybrid environments.
By the end of the week, you’ll gain the confidence to implement robust identity and access policies using Entra ID to protect your organization’s digital assets.
What's included
7 videos1 reading2 assignments1 discussion prompt
Show info about module content
7 videos•Total 35 minutes
Encryption at rest for data protection•6 minutes
Encryption in transit for data protection•4 minutes
Azure Key Vault for managing encryption keys•6 minutes
Data residency considerations in the cloud•7 minutes
Data Lifecycle Management (DLM) for data governance•5 minutes
Module 4: Exam Tips Overview•5 minutes
Conclusion, What's Next, Job Roles, and Best Practices•3 minutes
1 reading•Total 30 minutes
Microsoft Cloud Data Protection and Governance - Overview•30 minutes
2 assignments•Total 90 minutes
Microsoft Cloud Data Protection and Governance - Graded Assessment•50 minutes
Data Protection Strategies in Microsoft Cloud: Encryption and Key Management - Practice Assessment•40 minutes
1 discussion prompt•Total 15 minutes
Meet & Greet•15 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Providing certification training since the year 2000, Whizlabs is the pioneer among online training providers across the globe. We are dedicated to helping you learn the skills you need to transform your career in the IT industry.
We provide certification training in the form of Video Courses, Practice Tests, Hands-on Labs and Sandbox in various disciplines such as Cloud Computing, DevOps, Cyber Security, Java, Big Data, Snowflake, CompTIA, Agile, Linux, CCNA, Blockchain, and much more.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.