YoVDO

Manage security operations in Azure

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Azure Courses Incident Response Courses Threat Detection Courses Azure Key Vault Courses Azure Monitor Courses Azure Security Courses

Course Description

Overview

  • Module 1: Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter. Prepare for AZ-900.
  • After completing this module, you'll be able to:

    • Strengthen your security posture and protect against threats by using Azure Security Center.
    • Collect and act on security data from many different sources by using Azure Sentinel.
    • Store and access sensitive information such as passwords and encryption keys securely in Azure Key Vault.
    • Manage dedicated physical servers to host your Azure VMs for Windows and Linux by using Azure Dedicated Host.
  • Module 2: Create security baselines
  • In this module, you will:

    • Learn Azure platform security baselines and how they were created
    • Create and validate a security baseline for the most commonly used Azure services
  • Module 3: Master securing your Azure workloads with Microsoft Defender for Cloud. In this module, you’ll discover how to detect and respond to threats with Microsoft Defender for Cloud.
  • In this module, you will:

    • Configure Microsoft Defender for Cloud to monitor your Azure resources
    • Use the workload protection dashboard to identify potential security issues
    • Analyze the recommendations made by Defender for Cloud
  • Module 4: In this module, you’ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats.
  • In this module, you will:

    • View security alerts in Microsoft Defender for Cloud
    • Define an incident response plan
    • Use a Workflow automation to automate a security response
  • Module 5: Stop hackers from getting into your Windows and Linux servers. In this module, you’ll discover how to protect VMs and servers with Microsoft Defender for Cloud
  • In this module, you will:

    • Learn how to protect VM-based resources and networks with Microsoft Defender for Cloud
    • Install and use malware protection to stop virus attacks on your exposed endpoints
  • Module 6: Use Azure Monitor logs to extract valuable information about your infrastructure from log data.
  • In this module, you will:

    • Identify the features and capabilities of Azure Monitor logs
    • Create basic Azure Monitor log queries to extract information from log data
  • Module 7: Respond to incidents and activities in your infrastructure through alerting capabilities in Azure Monitor.
  • In this module, you will:

    • Configure alerts on events in your Azure resources based on metrics, log events, and Activity log events
    • Learn how to use smart groups to identify and group related alerts to reduce alert noise
  • Module 8: Learn about how to capture trace output from your Azure web apps. View a live log stream and download logs files for offline analysis.
  • In this module, you will:

    • Enable application logging on an Azure Web App
    • View live application logging activity with the log streaming service
    • Retrieve application log files from an application with Kudu or the Azure CLI

Syllabus

  • Module 1: Protect against security threats on Azure
    • Introduction
    • Protect against security threats by using Azure Security Center
    • Detect and respond to security threats by using Azure Sentinel
    • Store and manage secrets by using Azure Key Vault
    • Exercise - Manage a password in Azure Key Vault
    • Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
    • Knowledge check
    • Summary
  • Module 2: Create security baselines
    • Create a platform security baseline
    • Understand the Azure platform security baseline
    • Create an Identity & Access Management (IAM) baseline
    • Create a Microsoft Defender for Cloud baseline
    • Create an Azure storage accounts baseline
    • Create an Azure SQL Database baseline
    • Create a logging and monitoring baseline
    • Create a Networking baseline
    • Create an Azure VM baseline
    • Other baseline security considerations
    • Summary
  • Module 3: Identify security threats with Microsoft Defender for Cloud
    • Introduction
    • Explore the Microsoft Defender for Cloud service tiers
    • Customize Microsoft Defender for Cloud options
    • Centralized policy management with Microsoft Defender for Cloud
    • Monitor your security status with Defender for Cloud recommendations
    • Knowledge check
    • Summary
  • Module 4: Resolve security threats with Microsoft Defender for Cloud
    • Introduction
    • View security alerts
    • Respond to alerts
    • Define a security incident response plan
    • Use a workflow automation to automate responses
    • Exercise - Configure a Playbook for a security event
    • Summary
  • Module 5: Protect your servers and VMs from brute-force and malware attacks with Microsoft Defender for Cloud
    • Introduction
    • Protect virtual machines with JIT VM access
    • Exercise - Enable JIT VM access
    • Understand the malware threat
    • Exercise - Configure malware detection
    • Summary
  • Module 6: Analyze your Azure infrastructure by using Azure Monitor logs
    • Introduction
    • Features of Azure Monitor logs
    • Create basic Azure Monitor log queries to extract information from log data
    • Exercise - Create basic Azure Monitor log queries to extract information from log data
    • Summary
  • Module 7: Improve incident response with alerting on Azure
    • Introduction
    • Explore the different alert types that Azure Monitor supports
    • Use metric alerts for alerts about performance issues in your Azure environment
    • Exercise - Use metric alerts to alert on performance issues in your Azure environment
    • Use log alerts to alert on events in your application
    • Use activity log alerts to alert on events within your Azure infrastructure
    • Exercise - Use activity log alerts to alert on events within your Azure infrastructure
    • Use smart groups to reduce alert noise in Azure Monitor
    • Summary
  • Module 8: Capture Web Application Logs with App Service Diagnostics Logging
    • Introduction
    • Enable and configure App Service application logging
    • Exercise - Enable and configure App Service application logging using the Azure portal
    • View live application logging with the log streaming service
    • Exercise - View live application logging with the log streaming service using Azure CLI
    • Retrieve application log files
    • Exercise - Retrieve Application Log Files using Azure CLI and Kudu
    • Summary

Tags

Related Courses

Exam Alert: Implement Azure Security
Pluralsight
Securing Microsoft Azure Subscriptions
Pluralsight
Planning and Designing Microsoft Azure Security Solutions
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Exam Alert: Manage Identity and Access in Microsoft Azure
Pluralsight