YoVDO

Manage security operations in Azure

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Azure Courses Incident Response Courses Threat Detection Courses Azure Key Vault Courses Azure Monitor Courses Azure Security Courses

Course Description

Overview

  • Module 1: Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter. Prepare for AZ-900.
  • After completing this module, you'll be able to:

    • Strengthen your security posture and protect against threats by using Azure Security Center.
    • Collect and act on security data from many different sources by using Azure Sentinel.
    • Store and access sensitive information such as passwords and encryption keys securely in Azure Key Vault.
    • Manage dedicated physical servers to host your Azure VMs for Windows and Linux by using Azure Dedicated Host.
  • Module 2: Create security baselines
  • In this module, you will:

    • Learn Azure platform security baselines and how they were created
    • Create and validate a security baseline for the most commonly used Azure services
  • Module 3: Master securing your Azure workloads with Microsoft Defender for Cloud. In this module, you’ll discover how to detect and respond to threats with Microsoft Defender for Cloud.
  • In this module, you will:

    • Configure Microsoft Defender for Cloud to monitor your Azure resources
    • Use the workload protection dashboard to identify potential security issues
    • Analyze the recommendations made by Defender for Cloud
  • Module 4: In this module, you’ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats.
  • In this module, you will:

    • View security alerts in Microsoft Defender for Cloud
    • Define an incident response plan
    • Use a Workflow automation to automate a security response
  • Module 5: Stop hackers from getting into your Windows and Linux servers. In this module, you’ll discover how to protect VMs and servers with Microsoft Defender for Cloud
  • In this module, you will:

    • Learn how to protect VM-based resources and networks with Microsoft Defender for Cloud
    • Install and use malware protection to stop virus attacks on your exposed endpoints
  • Module 6: Use Azure Monitor logs to extract valuable information about your infrastructure from log data.
  • In this module, you will:

    • Identify the features and capabilities of Azure Monitor logs
    • Create basic Azure Monitor log queries to extract information from log data
  • Module 7: Respond to incidents and activities in your infrastructure through alerting capabilities in Azure Monitor.
  • In this module, you will:

    • Configure alerts on events in your Azure resources based on metrics, log events, and Activity log events
    • Learn how to use smart groups to identify and group related alerts to reduce alert noise
  • Module 8: Learn about how to capture trace output from your Azure web apps. View a live log stream and download logs files for offline analysis.
  • In this module, you will:

    • Enable application logging on an Azure Web App
    • View live application logging activity with the log streaming service
    • Retrieve application log files from an application with Kudu or the Azure CLI

Syllabus

  • Module 1: Protect against security threats on Azure
    • Introduction
    • Protect against security threats by using Azure Security Center
    • Detect and respond to security threats by using Azure Sentinel
    • Store and manage secrets by using Azure Key Vault
    • Exercise - Manage a password in Azure Key Vault
    • Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
    • Knowledge check
    • Summary
  • Module 2: Create security baselines
    • Create a platform security baseline
    • Understand the Azure platform security baseline
    • Create an Identity & Access Management (IAM) baseline
    • Create a Microsoft Defender for Cloud baseline
    • Create an Azure storage accounts baseline
    • Create an Azure SQL Database baseline
    • Create a logging and monitoring baseline
    • Create a Networking baseline
    • Create an Azure VM baseline
    • Other baseline security considerations
    • Summary
  • Module 3: Identify security threats with Microsoft Defender for Cloud
    • Introduction
    • Explore the Microsoft Defender for Cloud service tiers
    • Customize Microsoft Defender for Cloud options
    • Centralized policy management with Microsoft Defender for Cloud
    • Monitor your security status with Defender for Cloud recommendations
    • Knowledge check
    • Summary
  • Module 4: Resolve security threats with Microsoft Defender for Cloud
    • Introduction
    • View security alerts
    • Respond to alerts
    • Define a security incident response plan
    • Use a workflow automation to automate responses
    • Exercise - Configure a Playbook for a security event
    • Summary
  • Module 5: Protect your servers and VMs from brute-force and malware attacks with Microsoft Defender for Cloud
    • Introduction
    • Protect virtual machines with JIT VM access
    • Exercise - Enable JIT VM access
    • Understand the malware threat
    • Exercise - Configure malware detection
    • Summary
  • Module 6: Analyze your Azure infrastructure by using Azure Monitor logs
    • Introduction
    • Features of Azure Monitor logs
    • Create basic Azure Monitor log queries to extract information from log data
    • Exercise - Create basic Azure Monitor log queries to extract information from log data
    • Summary
  • Module 7: Improve incident response with alerting on Azure
    • Introduction
    • Explore the different alert types that Azure Monitor supports
    • Use metric alerts for alerts about performance issues in your Azure environment
    • Exercise - Use metric alerts to alert on performance issues in your Azure environment
    • Use log alerts to alert on events in your application
    • Use activity log alerts to alert on events within your Azure infrastructure
    • Exercise - Use activity log alerts to alert on events within your Azure infrastructure
    • Use smart groups to reduce alert noise in Azure Monitor
    • Summary
  • Module 8: Capture Web Application Logs with App Service Diagnostics Logging
    • Introduction
    • Enable and configure App Service application logging
    • Exercise - Enable and configure App Service application logging using the Azure portal
    • View live application logging with the log streaming service
    • Exercise - View live application logging with the log streaming service using Azure CLI
    • Retrieve application log files
    • Exercise - Retrieve Application Log Files using Azure CLI and Kudu
    • Summary

Tags

Related Courses

AWS Security Fundamentals (Second Edition) (French)
Amazon Web Services via AWS Skill Builder
AWS Security Fundamentals (Second Edition) (Japanese)
Amazon Web Services via AWS Skill Builder
AWS Security Fundamentals (Second Edition) (Spanish)
Amazon Web Services via AWS Skill Builder
AWS Security Fundamentals (Second Edition) (Traditional Chinese)
Amazon Web Services via AWS Skill Builder
Basics of Amazon Detective (French)
Amazon Web Services via AWS Skill Builder