Manage security operations in Azure
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter. Prepare for AZ-900.
- Strengthen your security posture and protect against threats by using Azure Security Center.
- Collect and act on security data from many different sources by using Azure Sentinel.
- Store and access sensitive information such as passwords and encryption keys securely in Azure Key Vault.
- Manage dedicated physical servers to host your Azure VMs for Windows and Linux by using Azure Dedicated Host.
- Module 2: Create security baselines
- Learn Azure platform security baselines and how they were created
- Create and validate a security baseline for the most commonly used Azure services
- Module 3: Master securing your Azure workloads with Microsoft Defender for Cloud. In this module, you’ll discover how to detect and respond to threats with Microsoft Defender for Cloud.
- Configure Microsoft Defender for Cloud to monitor your Azure resources
- Use the workload protection dashboard to identify potential security issues
- Analyze the recommendations made by Defender for Cloud
- Module 4: In this module, you’ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats.
- View security alerts in Microsoft Defender for Cloud
- Define an incident response plan
- Use a Workflow automation to automate a security response
- Module 5: Stop hackers from getting into your Windows and Linux servers. In this module, you’ll discover how to protect VMs and servers with Microsoft Defender for Cloud
- Learn how to protect VM-based resources and networks with Microsoft Defender for Cloud
- Install and use malware protection to stop virus attacks on your exposed endpoints
- Module 6: Use Azure Monitor logs to extract valuable information about your infrastructure from log data.
- Identify the features and capabilities of Azure Monitor logs
- Create basic Azure Monitor log queries to extract information from log data
- Module 7: Respond to incidents and activities in your infrastructure through alerting capabilities in Azure Monitor.
- Configure alerts on events in your Azure resources based on metrics, log events, and Activity log events
- Learn how to use smart groups to identify and group related alerts to reduce alert noise
- Module 8: Learn about how to capture trace output from your Azure web apps. View a live log stream and download logs files for offline analysis.
- Enable application logging on an Azure Web App
- View live application logging activity with the log streaming service
- Retrieve application log files from an application with Kudu or the Azure CLI
After completing this module, you'll be able to:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
Syllabus
- Module 1: Protect against security threats on Azure
- Introduction
- Protect against security threats by using Azure Security Center
- Detect and respond to security threats by using Azure Sentinel
- Store and manage secrets by using Azure Key Vault
- Exercise - Manage a password in Azure Key Vault
- Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
- Knowledge check
- Summary
- Module 2: Create security baselines
- Create a platform security baseline
- Understand the Azure platform security baseline
- Create an Identity & Access Management (IAM) baseline
- Create a Microsoft Defender for Cloud baseline
- Create an Azure storage accounts baseline
- Create an Azure SQL Database baseline
- Create a logging and monitoring baseline
- Create a Networking baseline
- Create an Azure VM baseline
- Other baseline security considerations
- Summary
- Module 3: Identify security threats with Microsoft Defender for Cloud
- Introduction
- Explore the Microsoft Defender for Cloud service tiers
- Customize Microsoft Defender for Cloud options
- Centralized policy management with Microsoft Defender for Cloud
- Monitor your security status with Defender for Cloud recommendations
- Knowledge check
- Summary
- Module 4: Resolve security threats with Microsoft Defender for Cloud
- Introduction
- View security alerts
- Respond to alerts
- Define a security incident response plan
- Use a workflow automation to automate responses
- Exercise - Configure a Playbook for a security event
- Summary
- Module 5: Protect your servers and VMs from brute-force and malware attacks with Microsoft Defender for Cloud
- Introduction
- Protect virtual machines with JIT VM access
- Exercise - Enable JIT VM access
- Understand the malware threat
- Exercise - Configure malware detection
- Summary
- Module 6: Analyze your Azure infrastructure by using Azure Monitor logs
- Introduction
- Features of Azure Monitor logs
- Create basic Azure Monitor log queries to extract information from log data
- Exercise - Create basic Azure Monitor log queries to extract information from log data
- Summary
- Module 7: Improve incident response with alerting on Azure
- Introduction
- Explore the different alert types that Azure Monitor supports
- Use metric alerts for alerts about performance issues in your Azure environment
- Exercise - Use metric alerts to alert on performance issues in your Azure environment
- Use log alerts to alert on events in your application
- Use activity log alerts to alert on events within your Azure infrastructure
- Exercise - Use activity log alerts to alert on events within your Azure infrastructure
- Use smart groups to reduce alert noise in Azure Monitor
- Summary
- Module 8: Capture Web Application Logs with App Service Diagnostics Logging
- Introduction
- Enable and configure App Service application logging
- Exercise - Enable and configure App Service application logging using the Azure portal
- View live application logging with the log streaming service
- Exercise - View live application logging with the log streaming service using Azure CLI
- Retrieve application log files
- Exercise - Retrieve Application Log Files using Azure CLI and Kudu
- Summary
Tags
Related Courses
Exam Alert: Implement Azure SecurityPluralsight Securing Microsoft Azure Subscriptions
Pluralsight Planning and Designing Microsoft Azure Security Solutions
Pluralsight Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight Exam Alert: Manage Identity and Access in Microsoft Azure
Pluralsight