YoVDO

Implement virtual machine host security in Azure

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Azure Courses Disk Encryption Courses Azure Security Courses

Course Description

Overview

  • Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
  • By the end of this module, you'll be able to:

    • Develop a defense-in-depth approach to securing your architecture
    • Choose the technologies to secure your Azure infrastructure
    • Develop a strategy for secure identity management
  • Module 2: Create security baselines
  • In this module, you will:

    • Learn Azure platform security baselines and how they were created
    • Create and validate a security baseline for the most commonly used Azure services
  • Module 3: This module guides you through options for virtual machines in Azure, creating and connecting a Linux virtual machine, and configuring your network settings.
  • In this module, you will:

    • Understand the options that are available for virtual machines in Azure
    • Create a Linux virtual machine using the Azure portal
    • Connect to a running Linux virtual machine using SSH
    • Install software and change the network configuration on a VM using the Azure portal
  • Module 4: Learn to create an Azure virtual machine in minutes that can be used like a local physical desktop or server.
  • In this module, you will:

    • Create a Windows virtual machine using the Azure portal
    • Connect to a running Windows virtual machine using Remote Desktop
    • Install software and change the network configuration on a VM using the Azure portal
  • Module 5: Explore the options for Azure disk encryption to encrypt OS and data disks on existing and new virtual machines.
  • In this module, you will:

    • Determine which encryption method is best for your VM
    • Encrypt existing virtual machine disks using the Azure portal
    • Encrypt existing virtual machine disks using PowerShell
    • Modify Azure Resource Manager templates to automate disk encryption on new VMs
  • Module 6: Stop hackers from getting into your Windows and Linux servers. In this module, you’ll discover how to protect VMs and servers with Microsoft Defender for Cloud
  • In this module, you will:

    • Learn how to protect VM-based resources and networks with Microsoft Defender for Cloud
    • Install and use malware protection to stop virus attacks on your exposed endpoints

Syllabus

  • Module 1: Microsoft Azure Well-Architected Framework - Security
    • Introduction
    • Defense in depth
    • Identity management
    • Infrastructure protection
    • Encryption
    • Network security
    • Application security
    • Summary
  • Module 2: Create security baselines
    • Create a platform security baseline
    • Understand the Azure platform security baseline
    • Create an Identity & Access Management (IAM) baseline
    • Create a Microsoft Defender for Cloud baseline
    • Create an Azure storage accounts baseline
    • Create an Azure SQL Database baseline
    • Create a logging and monitoring baseline
    • Create a Networking baseline
    • Create an Azure VM baseline
    • Other baseline security considerations
    • Summary
  • Module 3: Create a Linux virtual machine in Azure
    • Introduction
    • Create a Linux virtual Machine in Azure
    • Exercise - Decide an authentication method for SSH
    • Exercise - Create a Linux virtual machine with the Azure portal
    • Azure virtual machines IP addresses and SSH options
    • Exercise - Connect to a Linux virtual machine with SSH
    • Network and security settings
    • Exercise - Configure network settings
    • Summary
  • Module 4: Create a Windows virtual machine in Azure
    • Introduction
    • Create a Windows virtual machine in Azure
    • Exercise - Create a Windows virtual machine
    • Use RDP to connect to Windows Azure virtual machines
    • Exercise - Connect to a Windows virtual machine using RDP
    • Configure Azure virtual machine network settings
    • Summary
  • Module 5: Secure your Azure virtual machine disks
    • Introduction
    • Encryption options for protecting Windows and Linux VMs
    • Encrypt existing VM disks
    • Exercise - Encrypt existing VM disks
    • Automate secure VM deployments by adding encryption to Azure Resource Manager templates
    • Exercise - Use a Resource Manager template to decrypt the VM
    • Knowledge check
    • Summary
  • Module 6: Protect your servers and VMs from brute-force and malware attacks with Microsoft Defender for Cloud
    • Introduction
    • Protect virtual machines with JIT VM access
    • Exercise - Enable JIT VM access
    • Understand the malware threat
    • Exercise - Configure malware detection
    • Summary

Tags

Related Courses

Capstone and Practice Exam (AZ-500)
Microsoft via Coursera
Apple Certified Support Professional macOS 11 Cert Prep: 3 Data Management
LinkedIn Learning
Linux Security and Hardening Essential Training
LinkedIn Learning
Securing Windows Server 2016: Server Hardening Solutions
LinkedIn Learning
Administer infrastructure resources in Azure
Microsoft via Microsoft Learn