Implement virtual machine host security in Azure
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
- Develop a defense-in-depth approach to securing your architecture
- Choose the technologies to secure your Azure infrastructure
- Develop a strategy for secure identity management
- Module 2: Create security baselines
- Learn Azure platform security baselines and how they were created
- Create and validate a security baseline for the most commonly used Azure services
- Module 3: This module guides you through options for virtual machines in Azure, creating and connecting a Linux virtual machine, and configuring your network settings.
- Understand the options that are available for virtual machines in Azure
- Create a Linux virtual machine using the Azure portal
- Connect to a running Linux virtual machine using SSH
- Install software and change the network configuration on a VM using the Azure portal
- Module 4: Learn to create an Azure virtual machine in minutes that can be used like a local physical desktop or server.
- Create a Windows virtual machine using the Azure portal
- Connect to a running Windows virtual machine using Remote Desktop
- Install software and change the network configuration on a VM using the Azure portal
- Module 5: Explore the options for Azure disk encryption to encrypt OS and data disks on existing and new virtual machines.
- Determine which encryption method is best for your VM
- Encrypt existing virtual machine disks using the Azure portal
- Encrypt existing virtual machine disks using PowerShell
- Modify Azure Resource Manager templates to automate disk encryption on new VMs
- Module 6: Stop hackers from getting into your Windows and Linux servers. In this module, you’ll discover how to protect VMs and servers with Microsoft Defender for Cloud
- Learn how to protect VM-based resources and networks with Microsoft Defender for Cloud
- Install and use malware protection to stop virus attacks on your exposed endpoints
By the end of this module, you'll be able to:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
Syllabus
- Module 1: Microsoft Azure Well-Architected Framework - Security
- Introduction
- Defense in depth
- Identity management
- Infrastructure protection
- Encryption
- Network security
- Application security
- Summary
- Module 2: Create security baselines
- Create a platform security baseline
- Understand the Azure platform security baseline
- Create an Identity & Access Management (IAM) baseline
- Create a Microsoft Defender for Cloud baseline
- Create an Azure storage accounts baseline
- Create an Azure SQL Database baseline
- Create a logging and monitoring baseline
- Create a Networking baseline
- Create an Azure VM baseline
- Other baseline security considerations
- Summary
- Module 3: Create a Linux virtual machine in Azure
- Introduction
- Create a Linux virtual Machine in Azure
- Exercise - Decide an authentication method for SSH
- Exercise - Create a Linux virtual machine with the Azure portal
- Azure virtual machines IP addresses and SSH options
- Exercise - Connect to a Linux virtual machine with SSH
- Network and security settings
- Exercise - Configure network settings
- Summary
- Module 4: Create a Windows virtual machine in Azure
- Introduction
- Create a Windows virtual machine in Azure
- Exercise - Create a Windows virtual machine
- Use RDP to connect to Windows Azure virtual machines
- Exercise - Connect to a Windows virtual machine using RDP
- Configure Azure virtual machine network settings
- Summary
- Module 5: Secure your Azure virtual machine disks
- Introduction
- Encryption options for protecting Windows and Linux VMs
- Encrypt existing VM disks
- Exercise - Encrypt existing VM disks
- Automate secure VM deployments by adding encryption to Azure Resource Manager templates
- Exercise - Use a Resource Manager template to decrypt the VM
- Knowledge check
- Summary
- Module 6: Protect your servers and VMs from brute-force and malware attacks with Microsoft Defender for Cloud
- Introduction
- Protect virtual machines with JIT VM access
- Exercise - Enable JIT VM access
- Understand the malware threat
- Exercise - Configure malware detection
- Summary
Tags
Related Courses
Capstone and Practice Exam (AZ-500)Microsoft via Coursera Apple Certified Support Professional macOS 11 Cert Prep: 3 Data Management
LinkedIn Learning Linux Security and Hardening Essential Training
LinkedIn Learning Securing Windows Server 2016: Server Hardening Solutions
LinkedIn Learning Administer infrastructure resources in Azure
Microsoft via Microsoft Learn