YoVDO

Learn how Microsoft supports secure software development as part of a cybersecurity solution

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Azure Courses Cybersecurity Courses DevOps Courses

Course Description

Overview

  • Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
  • By the end of this module, you'll be able to:

    • Develop a defense-in-depth approach to securing your architecture
    • Choose the technologies to secure your Azure infrastructure
    • Develop a strategy for secure identity management
  • Module 2: Explore Azure DevOps capabilities and get started setting up your own organization knowing what separates elite performers from low performers.
  • After completing this module, you'll be able to:

    • Identify what separates elite performers from low performers
    • List what services Azure DevOps provides
    • Create an Azure DevOps organization
  • Module 3: Learn to use key GitHub features, including issues, notifications, branches, commits, and pull requests.
  • In this module, you will:

    • Communicate with the project community in issues
    • Manage notifications for project events
    • Create branches to manage work in parallel
    • Make commits to update project source
    • Introduce changes with pull requests
    • Deploy a web page to GitHub Pages
  • Module 4: Learn best practices for building, hosting, and maintaining a secure repository on GitHub.
  • In this module, you will:

    • Identify the tools and GitHub features to establish a secure development strategy
    • Enable vulnerable dependency detection for private repositories
    • Detect and fix outdated dependencies with security vulnerabilities
    • Automate the detection of vulnerable dependencies with Dependabot
    • Add a security policy with a SECURITY.md file
    • Remove a commit exposing sensitive data in a pull request
    • Keep sensitive files out of your repository by applying the use of a .gitignore file
    • Remove historical commits exposing sensitive data deep in your repository
  • Module 5: Create security baselines
  • In this module, you will:

    • Learn Azure platform security baselines and how they were created
    • Create and validate a security baseline for the most commonly used Azure services
  • Module 6: Learn how to create an Azure Key Vault to store secret values and how to enable secure access to the vault.
  • In this module, you will:

    • Explore what types of information can be stored in Azure Key Vault
    • Create an Azure Key Vault and use it to store secret configuration values
    • Enable secure access to the vault from an Azure App Service web app with managed identities for Azure resources
    • Implement a web application that retrieves secrets from the vault
  • Module 7: Learn how Azure Active Directory, single sign-on (SSO), multifactor authentication, and Conditional Access can help you manage and secure identities on Azure. Prepare for AZ-900.
  • After completing this module, you'll be able to:

    • Explain the difference between authentication and authorization.
    • Describe how Azure Active Directory provides identity and access management.
    • Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play in managing user identity.
  • Module 8: In this module, you’ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats.
  • In this module, you will:

    • View security alerts in Microsoft Defender for Cloud
    • Define an incident response plan
    • Use a Workflow automation to automate a security response

Syllabus

  • Module 1: Microsoft Azure Well-Architected Framework - Security
    • Introduction
    • Defense in depth
    • Identity management
    • Infrastructure protection
    • Encryption
    • Network security
    • Application security
    • Summary
  • Module 2: Introduction to Azure DevOps
    • Introduction
    • What is DevOps?
    • What is Azure DevOps?
    • Exercise - Create an Azure DevOps organization
    • Summary
  • Module 3: Introduction to GitHub
    • Introduction
    • What is GitHub?
    • Exercise - A guided tour of GitHub
    • Knowledge check
    • Summary
  • Module 4: Maintain a secure repository by using GitHub best practices
    • Introduction
    • How to maintain a secure GitHub repository
    • Exercise - Add a .gitignore file
    • Automated security
    • Knowledge check
    • Summary
  • Module 5: Create security baselines
    • Create a platform security baseline
    • Understand the Azure platform security baseline
    • Create an Identity & Access Management (IAM) baseline
    • Create a Microsoft Defender for Cloud baseline
    • Create an Azure storage accounts baseline
    • Create an Azure SQL Database baseline
    • Create a logging and monitoring baseline
    • Create a Networking baseline
    • Create an Azure VM baseline
    • Other baseline security considerations
    • Summary
  • Module 6: Manage secrets in your server apps with Azure Key Vault
    • Introduction
    • What is Azure Key Vault?
    • Exercise - Create a Key Vault and store secrets
    • Vault authentication with managed identities for Azure resources
    • Exercise - Access secrets stored in Azure Key Vault
    • Exercise - Configure, deploy, and run your app in Azure
    • Summary
  • Module 7: Secure access to your applications by using Azure identity services
    • Introduction
    • Compare authentication and authorization
    • What is Azure Active Directory?
    • What are multifactor authentication and Conditional Access?
    • Knowledge check
    • Summary
  • Module 8: Resolve security threats with Microsoft Defender for Cloud
    • Introduction
    • View security alerts
    • Respond to alerts
    • Define a security incident response plan
    • Use a workflow automation to automate responses
    • Exercise - Configure a Playbook for a security event
    • Summary

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network