YoVDO

Develop a security and compliance plan

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Entra ID Courses Incident Response Courses Azure Key Vault Courses Azure API Management Courses Secrets Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
  • Module 1: Use Microsoft Entra ID to you secure your internal, external, and customer identities.

    In this module, you will:

    • Describe the core terminology of Microsoft Entra ID.
    • Describe the core features of Microsoft Entra ID.
    • Describe the licensing models for Microsoft Entra ID.
  • Module 2: Learn how to create users and groups in Microsoft Entra ID.

    In this module, you will:

    • Add users to Microsoft Entra ID.
    • Manage app and resource access by using Microsoft Entra groups.
    • Give guest users access in Microsoft Entra business to business (B2B).
  • Module 3: Securely authenticate apps to Azure to manage and access Azure services. Service principals and managed identities give your app a Microsoft Entra identity.

    In this module, you will:

    • Identify the benefits of and use cases for service principals.
    • Identify the benefits of using managed identities for Azure resources.
    • Enable managed identity on an Azure VM.
    • Use managed identity with Azure SDKs in applications.
  • Module 4: Configure and manage secrets in Azure Key Vault

    In this module, you will:

    • Explore proper usage of Azure Key Vault
    • Manage access to an Azure Key Vault
    • Explore certificate management with Azure Key Vault
    • Configure a Hardware Security Module Key-generation solution
  • Module 5: Discover how to protect your APIs from unauthorized use with API keys and client certificate authentication.

    In this module, you will:

    • Use API keys to authorize access to your APIs
    • Use client certificate authentication to secure your APIs
  • Module 6: Monitor Microsoft Entra security events with built-in reporting and monitoring capabilities to prevent unauthorized access and potential data loss.

    In this module, you will:

    • Store Azure audit logs and sign-in activity logs in a Log Analytics workspace.
    • Create alerts for security events in a Log Analytics workspace.
    • Create and view dashboards to support improved monitoring.
  • Module 7: Learn best practices for building, hosting, and maintaining a secure repository on GitHub.

    In this module, you will:

    • Identify the tools and GitHub features to establish a secure development strategy
    • Enable vulnerable dependency detection for private repositories
    • Detect and fix outdated dependencies with security vulnerabilities
    • Automate the detection of vulnerable dependencies with Dependabot
    • Add a security policy with a SECURITY.md file
    • Remove a commit exposing sensitive data in a pull request
    • Keep sensitive files out of your repository by applying the use of a .gitignore file
    • Remove historical commits exposing sensitive data deep in your repository
  • Module 8: Learn about post-incident reviews, a practice necessary to help you sustainably achieve the appropriate level of reliability in your systems, services, and products.

    In this module you will:

    • Discover the importance of learning from incidents
    • Understand the aspects of complex systems that make learning from failure important
    • Learn when and how to conduct a post-incident review
    • Understand the purpose and goals of a post-incident review
    • Learn the components that go into a good post-incident review
    • Explore the Azure tools that can assist with getting started with post-incident reviews
    • Become aware of common traps to avoid
    • Identify helpful practices to conduct a better review
  • Module 9: Learn the incident response fundamentals necessary to help you sustainably achieve the appropriate level of reliability in your systems, services, and products.

    In this module you will:

    • Learn the importance of effective incident response
    • Gain an understanding of the lifecycle of an incident so we know just how to apply our efforts
    • Learn the building blocks for constructing an incident response process that allows us to respond with urgency.
    • Begin to track your incidents effectively using Azure DevOps tools.
    • Explore ways to automate your incident tracking for a speedy and consistent response
    • Understand the guidelines around communication that allow incident response to be more efficient
    • Visit some Azure tools that can significantly speed up your remediation times during an incident

Syllabus

  • Module 1: Module 1: Secure your identities by using Microsoft Entra ID
    • Introduction
    • Microsoft Entra overview
    • Understand Microsoft Entra ID licenses and terminology
    • Essential features of Microsoft Entra ID
    • Get started with Microsoft Entra ID
    • Summary
  • Module 2: Module 2: Create Azure users and groups in Microsoft Entra ID
    • Introduction
    • What are user accounts in Microsoft Entra ID?
    • Exercise - Add and delete users in Microsoft Entra ID
    • Manage app and resource access by using Microsoft Entra groups
    • Exercise - Assign users to Microsoft Entra groups
    • Collaborate by using guest accounts and Microsoft Entra B2B
    • Exercise - Give guest users access in Microsoft Entra B2B
    • Summary
  • Module 3: Module 3: Authenticate apps to Azure services by using service principals and managed identities for Azure resources
    • Introduction
    • Authentication with service principals in Microsoft Entra ID
    • Authentication with managed identities
    • Use managed identities with Azure virtual machines
    • Exercise - Configure a system-assigned managed identity for an Azure VM
    • Build applications by using Microsoft Entra managed identities
    • Exercise - Configure a custom application in .NET by using managed identity
    • Summary
  • Module 4: Module 4: Configure and manage secrets in Azure Key Vault
    • Introduction
    • Guidelines for using Azure Key Vault
    • Manage access to secrets, certificates, and keys
    • Exercise - store secrets in Azure Key Vault
    • Manage certificates
    • Summary
  • Module 5: Module 5: Control access to your APIs with Azure API Management
    • Introduction
    • What is API Management?
    • Create subscriptions in Azure API Management
    • Exercise - Create subscriptions in Azure API Management
    • Use client certificates to secure access to an API
    • Exercise - Use client certificates to secure access to an API
    • Summary
  • Module 6: Module 6: Monitor and report on security events in Microsoft Entra ID
    • Introduction
    • Use logs to detect suspicious activity
    • Exercise - Set up and view sign-in logs and audit logs
    • Integrate logs with a Log Analytics workspace
    • Exercise - Integrate logs with a Log Analytics workspace
    • Set and view alerts in your Log Analytics workspace
    • Exercise - Set an alert in your Log Analytics workspace and view alerts
    • Set up dashboards and reports to visualize log data
    • Exercise - Set up a dashboard and add a report
    • Summary
  • Module 7: Module 7: Maintain a secure repository by using GitHub best practices
    • Introduction
    • How to maintain a secure GitHub repository
    • Exercise - Add a .gitignore file
    • Automated security
    • Knowledge check
    • Summary
  • Module 8: Module 8: Improve your reliability with modern operations practices: Learning from failure
    • Introduction
    • Why learn from incidents?
    • What is a post-incident review?
    • Characteristics and components of a good post-incident review
    • The post-incident review process
    • Common traps to avoid
    • Helpful practices for learning from failure
    • Summary
  • Module 9: Module 9: Improve your reliability with modern operations practices: Incident response
    • Introduction
    • Importance of incident response
    • Characteristics and lifecycle of an incident
    • Foundations of incident response
    • Incident tracking
    • Communication and collaboration
    • Remediation
    • Summary

Tags

Related Courses

Azure Administration Essential Training
LinkedIn Learning
Azure Administration: Manage Identities
LinkedIn Learning
Microsoft Azure: Management and Security Essentials
LinkedIn Learning
Microsoft Cloud Fundamentals: Explore Cloud Services
LinkedIn Learning
Planning a Microsoft Cloud Solution
LinkedIn Learning