Learn how Microsoft supports secure software development as part of a cybersecurity solution
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
- Develop a defense-in-depth approach to securing your architecture
- Choose the technologies to secure your Azure infrastructure
- Develop a strategy for secure identity management
- Module 2: Explore Azure DevOps capabilities and get started setting up your own organization knowing what separates elite performers from low performers.
- Identify what separates elite performers from low performers
- List what services Azure DevOps provides
- Create an Azure DevOps organization
- Module 3: Learn to use key GitHub features, including issues, notifications, branches, commits, and pull requests.
- Communicate with the project community in issues
- Manage notifications for project events
- Create branches to manage work in parallel
- Make commits to update project source
- Introduce changes with pull requests
- Deploy a web page to GitHub Pages
- Module 4: Learn best practices for building, hosting, and maintaining a secure repository on GitHub.
- Identify the tools and GitHub features to establish a secure development strategy
- Enable vulnerable dependency detection for private repositories
- Detect and fix outdated dependencies with security vulnerabilities
- Automate the detection of vulnerable dependencies with Dependabot
- Add a security policy with a SECURITY.md file
- Remove a commit exposing sensitive data in a pull request
- Keep sensitive files out of your repository by applying the use of a .gitignore file
- Remove historical commits exposing sensitive data deep in your repository
- Module 5: Create security baselines
- Learn Azure platform security baselines and how they were created
- Create and validate a security baseline for the most commonly used Azure services
- Module 6: Learn how to create an Azure Key Vault to store secret values and how to enable secure access to the vault.
- Explore what types of information can be stored in Azure Key Vault
- Create an Azure Key Vault and use it to store secret configuration values
- Enable secure access to the vault from an Azure App Service web app with managed identities for Azure resources
- Implement a web application that retrieves secrets from the vault
- Module 7: Learn how Azure Active Directory, single sign-on (SSO), multifactor authentication, and Conditional Access can help you manage and secure identities on Azure. Prepare for AZ-900.
- Explain the difference between authentication and authorization.
- Describe how Azure Active Directory provides identity and access management.
- Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play in managing user identity.
- Module 8: In this module, you’ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats.
- View security alerts in Microsoft Defender for Cloud
- Define an incident response plan
- Use a Workflow automation to automate a security response
By the end of this module, you'll be able to:
After completing this module, you'll be able to:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
After completing this module, you'll be able to:
In this module, you will:
Syllabus
- Module 1: Microsoft Azure Well-Architected Framework - Security
- Introduction
- Defense in depth
- Identity management
- Infrastructure protection
- Encryption
- Network security
- Application security
- Summary
- Module 2: Introduction to Azure DevOps
- Introduction
- What is DevOps?
- What is Azure DevOps?
- Exercise - Create an Azure DevOps organization
- Summary
- Module 3: Introduction to GitHub
- Introduction
- What is GitHub?
- Exercise - A guided tour of GitHub
- Knowledge check
- Summary
- Module 4: Maintain a secure repository by using GitHub best practices
- Introduction
- How to maintain a secure GitHub repository
- Exercise - Add a .gitignore file
- Automated security
- Knowledge check
- Summary
- Module 5: Create security baselines
- Create a platform security baseline
- Understand the Azure platform security baseline
- Create an Identity & Access Management (IAM) baseline
- Create a Microsoft Defender for Cloud baseline
- Create an Azure storage accounts baseline
- Create an Azure SQL Database baseline
- Create a logging and monitoring baseline
- Create a Networking baseline
- Create an Azure VM baseline
- Other baseline security considerations
- Summary
- Module 6: Manage secrets in your server apps with Azure Key Vault
- Introduction
- What is Azure Key Vault?
- Exercise - Create a Key Vault and store secrets
- Vault authentication with managed identities for Azure resources
- Exercise - Access secrets stored in Azure Key Vault
- Exercise - Configure, deploy, and run your app in Azure
- Summary
- Module 7: Secure access to your applications by using Azure identity services
- Introduction
- Compare authentication and authorization
- What is Azure Active Directory?
- What are multifactor authentication and Conditional Access?
- Knowledge check
- Summary
- Module 8: Resolve security threats with Microsoft Defender for Cloud
- Introduction
- View security alerts
- Respond to alerts
- Define a security incident response plan
- Use a workflow automation to automate responses
- Exercise - Configure a Playbook for a security event
- Summary
Tags
Related Courses
Startup EngineeringStanford University via Coursera Developing Scalable Apps in Java
Google via Udacity Cloud Computing Concepts, Part 1
University of Illinois at Urbana-Champaign via Coursera Cloud Networking
University of Illinois at Urbana-Champaign via Coursera Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera