Think like an attacker. Decide like a business leader.
A 90-day program for IT, dev, and security professionals stepping into the security architect role. Learn the offensive techniques and the defensive controls across the Microsoft stack. Translate technical risk into business risk. Then apply all of it by building the security program for your own company.
A security architect lives in two heads at the same time. The attacker's head, to know what actually breaks. The business leader's head, to decide what is worth fixing first. Most training picks one and ignores the other. This program builds both.
You cannot defend what you cannot break, in your head. The architect who has never walked an attack path designs controls that look right on paper and collapse in the first incident. We start here. Real chains, real techniques, on the stack you actually run.
Every control has a cost. Every risk has a price. The architect who cannot translate a CVE into a business conversation gets overruled by the people writing the budget. We coach the language: risk registers, prioritization, memos, board-readable trade-offs.
Four pillars build the skills. The fifth applies them. By the end, you have both the mindset and a deliverable.
Real attack chains across the Microsoft stack. Active Directory: Kerberoasting, AS-REP roasting, ACL abuse, Pass-the-Hash, Golden and Silver tickets. Entra ID: token theft, consent phishing, illicit grant flows, abuse of service principals. Azure: managed identity pivoting, RBAC misconfigurations, lateral movement across subscriptions. M365: business email compromise patterns, OAuth app abuse, Teams and SharePoint exfiltration paths. You learn what attackers actually do, not what vendors warn about generically.
Offensive thinkingCounter-measures designed at architectural level, not bolted on. The tier model and Privileged Access Workstations for AD. Conditional Access designs that survive both audit and attack. Hybrid identity hardening with Entra Connect. Azure landing zones, segmentation, and policy as code. Defender XDR for detection across endpoint, identity, email, and cloud apps. Microsoft Sentinel for response. The hardening references for each layer, and where they fall short.
Defensive designThe risk register that is actually used, not the one filed and forgotten. Threat modeling at scale: STRIDE, Pasta, MITRE ATT&CK, attack trees, and the questions that surface real risks during a design review. Prioritization frameworks that hold up: FAIR-style scoring, business impact analysis, control cost vs. risk reduction. The conversation with the CFO about why the budget is what it is. Memos and architecture decision records that turn opinions into decisions.
Risk + business languageThe mental model of the role. Reference architectures and how to read them: Microsoft Cloud Adoption Framework, NIST CSF, CIS controls. Identity-first design and zero trust beyond the marketing slide. Network segmentation for a real cloud, not the textbook one. Secure design reviews that produce decisions, not delays. Writing the design documents that get implemented because they are clear, not because they are long.
Architect mindsetThe four pillars build the skills. This pillar produces a deliverable. We work through your environment (or a sanitized representation if your context requires) and you build the security program for it: current-state assessment, target architecture, prioritized risk register, control set with rationale, 12-month roadmap, governance plan. You leave the program with a document you can hand to your manager, your CISO, or your board, and defend on the merits.
Real deliverable, your environmentA private community of architects-in-the-making and practitioners, plus monthly expert webinars on Microsoft security, architecture patterns, and risk.
A focused group of professionals working on the same problems: identity hardening, design reviews, board memos, control trade-offs. People who will critique your architecture diagrams instead of liking them politely.
Open to serious learners only. For experience sharing between professionals making the jump.
Every month, a practitioner shares what you actually need to know to operate at architect level. No fluff, no vendor pitches. Topics rotate between attack and defense on the Microsoft stack, architecture patterns, and risk.
Fabien Soulis. Multicloud security architect, pentester, incident responder. 15+ years securing global enterprises across North America and Europe.
Sorbonne instructor teaching security architecture at Paris 1 Panthéon-Sorbonne. Built a SaaS cybersecurity business with dozens of enterprise clients. Zero major incidents across 150K+ employee environments.
I have built attack chains and the defenses against them. I have written the risk memos and presented them to executives. I have designed the architectures and answered for them in audit. The program is the formation I wish I had had when I was making the jump.
Start with an Architect Readiness Assessment, or commit to the full 90-day program with the capstone deliverable.
A focused audit of where you are against the security architect role. Skill gap analysis across attack, defense, risk, and architecture. Honest read on your current environment. You leave with a 90-day learning plan and a clear next step.
All 5 pillars delivered. Attack and defense across the Microsoft stack, risk management, architecture skills, and the capstone: the security program for your own environment. You leave with a deliverable, not just a certificate.
Not sure which plan? Book a free 15-min call or message me on LinkedIn. No pitch, just clarity.
Fabien leads the program and is supported by equally (or better) qualified coaches to adapt to your specific needs: industry context, language preference (English, French, Spanish), timezone, or specialized expertise.
Begin with an Architect Readiness Assessment, or commit to the full 90-day program.
Read the free book, or join the Discord to learn from peers walking the same path.
Discord is open to serious learners only. For experience sharing between professionals making the jump.