Secure your cloud applications in Azure
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
- Develop a defense-in-depth approach to securing your architecture
- Choose the technologies to secure your Azure infrastructure
- Develop a strategy for secure identity management
- Module 2: Learn about the Site Reliability Engineering approach to the challenge of assuring reliability and gain a better understanding of why it matters.
- Use Microsoft Defender for Cloud
- Verify your application's inputs and outputs
- Store your secrets into Key Vault
- Ensure you are using the latest version of your framework, and its security features
- Validate that your program dependencies and libraries are safe to use
- Module 3: Create security baselines
- Learn Azure platform security baselines and how they were created
- Create and validate a security baseline for the most commonly used Azure services
- Module 4: Learn how to create an Azure Key Vault to store secret values and how to enable secure access to the vault.
- Explore what types of information can be stored in Azure Key Vault
- Create an Azure Key Vault and use it to store secret configuration values
- Enable secure access to the vault from an Azure App Service web app with managed identities for Azure resources
- Implement a web application that retrieves secrets from the vault
- Module 5: Discover how to protect your APIs from unauthorized use with API keys and client certificate authentication.
- Use API keys to secure your APIs
- Use client certificate authentication to secure your APIs
By the end of this module, you'll be able to:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
Syllabus
- Module 1: Microsoft Azure Well-Architected Framework - Security
- Introduction
- Defense in depth
- Identity management
- Infrastructure protection
- Encryption
- Network security
- Application security
- Summary
- Module 2: Top 5 security items to consider before pushing to production
- Introduction
- Microsoft Defender for Cloud
- Inputs and Outputs
- Secrets in Key Vault
- Framework Updates
- Safe Dependencies
- Conclusion
- Module 3: Create security baselines
- Create a platform security baseline
- Understand the Azure platform security baseline
- Create an Identity & Access Management (IAM) baseline
- Create a Microsoft Defender for Cloud baseline
- Create an Azure storage accounts baseline
- Create an Azure SQL Database baseline
- Create a logging and monitoring baseline
- Create a Networking baseline
- Create an Azure VM baseline
- Other baseline security considerations
- Summary
- Module 4: Manage secrets in your server apps with Azure Key Vault
- Introduction
- What is Azure Key Vault?
- Exercise - Create a Key Vault and store secrets
- Vault authentication with managed identities for Azure resources
- Exercise - Access secrets stored in Azure Key Vault
- Exercise - Configure, deploy, and run your app in Azure
- Summary
- Module 5: Control authentication for your APIs with Azure API Management
- Introduction
- What is API Management?
- Create subscriptions in Azure API Management
- Exercise - Create subscriptions in Azure API Management
- Use client certificates to secure access to an API
- Exercise - Use client certificates to secure access to an API
- Summary
Tags
Related Courses
5G for EveryoneQualcomm via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Working with tcpdump Filters
Coursera Project Network via Coursera Cloud Computing Fundamentals on Alibaba Cloud
Alibaba Cloud Academy via Coursera Protecting Cloud Architecture with Alibaba Cloud
Alibaba via Coursera