Secure your cloud data
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter. Prepare for AZ-900.
- Strengthen your security posture and protect against threats by using Azure Security Center.
- Collect and act on security data from many different sources by using Azure Sentinel.
- Store and access sensitive information such as passwords and encryption keys securely in Azure Key Vault.
- Manage dedicated physical servers to host your Azure VMs for Windows and Linux by using Azure Dedicated Host.
- Module 2: Learn about the Site Reliability Engineering approach to the challenge of assuring reliability and gain a better understanding of why it matters.
- Use Microsoft Defender for Cloud
- Verify your application's inputs and outputs
- Store your secrets into Key Vault
- Ensure you are using the latest version of your framework, and its security features
- Validate that your program dependencies and libraries are safe to use
- Module 3: Learn how to set up policies to classify, retain, and protect your cloud-based data.
- Learn how to classify your data
- Configure your data retention requirements
- Explore data ownership and sovereignty
- Module 4: Learn how Azure Storage provides multilayered security to protect your data with access keys, secure networks, and Advanced Threat Protection monitoring.
- Explore the Azure Data Lake enterprise-class security features.
- Understand storage account keys.
- Understand shared access signatures.
- Understand transport-level encryption with HTTPS.
- Understand Advanced Threat Protection.
- Control network access.
- Module 5: Configure and manage secrets in Azure Key Vault
- Explore proper usage of Azure Key Vault
- Manage access to an Azure Key Vault
- Explore certificate management with Azure Key Vault
- Configure a Hardware Security Module Key-generation solution
- Module 6: Learn how to use Azure role-based access control to effectively manage your team’s access to Azure resources.
- Verify access to resources for yourself and others
- Grant access to resources
- View activity logs of Azure RBAC changes
- Module 7: Secure an Azure SQL database to keep the information safe and diagnose potential security concerns as they happen.
- Control network access to your Azure SQL Database using firewall rules
- Control user access to your Azure SQL Database using authentication and authorization
- Protect your data in transit and at rest
- Audit and monitor your Azure SQL Database for access violations
After completing this module, you'll be able to:
In this module, you will:
In this module, you will:
In this module you will:
In this module, you will:
In this module, you will:
In this module, you will:
Syllabus
- Module 1: Protect against security threats on Azure
- Introduction
- Protect against security threats by using Azure Security Center
- Detect and respond to security threats by using Azure Sentinel
- Store and manage secrets by using Azure Key Vault
- Exercise - Manage a password in Azure Key Vault
- Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
- Knowledge check
- Summary
- Module 2: Top 5 security items to consider before pushing to production
- Introduction
- Microsoft Defender for Cloud
- Inputs and Outputs
- Secrets in Key Vault
- Framework Updates
- Safe Dependencies
- Conclusion
- Module 3: Configure security policies to manage data
- Introduction
- Classify your data at rest, in process, and in transit
- Exercise - Classify an Azure SQL Database
- Explore data recovery, retention, and disposal
- Understand data sovereignty
- Summary
- Module 4: Secure your Azure Storage account
- Introduction
- Explore Azure Storage security features
- Understand storage account keys
- Understand shared access signatures
- Control network access to your storage account
- Understand advanced threat protection for Azure Storage
- Explore Azure Data Lake Storage security features
- Summary
- Module 5: Configure and manage secrets in Azure Key Vault
- Introduction
- Guidelines for using Azure Key Vault
- Manage access to secrets, certificates, and keys
- Exercise - store secrets in Azure Key Vault
- Manage certificates
- Summary
- Module 6: Secure your Azure resources with Azure role-based access control (Azure RBAC)
- Introduction
- What is Azure RBAC?
- Knowledge check - What is Azure RBAC?
- Exercise - List access using Azure RBAC and the Azure portal
- Exercise - Grant access using Azure RBAC and the Azure portal
- Exercise - View activity logs for Azure RBAC changes
- Knowledge check - Using Azure RBAC
- Summary
- Module 7: Secure your Azure SQL Database
- Introduction
- Exercise - Set up sandbox environment
- Exercise - Restrict network access
- Exercise - Control who can access your database
- Exercise - Secure your data in transit, at rest, and on display
- Exercise - Monitor your database
- Knowledge check
- Summary
Tags
Related Courses
Azure Security and ComplianceMicrosoft via edX Microsoft Azure Security Engineer: Monitor Security Using Azure Security Center
Pluralsight Managing Microsoft Azure Security
Pluralsight Maintaining Deployment Security in Microsoft Azure
Pluralsight Microsoft Azure Security - Getting Started
Pluralsight