YoVDO

Secure your cloud data

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Azure Courses Cloud Security Courses Data Classification Courses Azure Key Vault Courses Azure Security Center Courses Data Recovery Courses Data Sovereignty Courses

Course Description

Overview

  • Module 1: Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter. Prepare for AZ-900.
  • After completing this module, you'll be able to:

    • Strengthen your security posture and protect against threats by using Azure Security Center.
    • Collect and act on security data from many different sources by using Azure Sentinel.
    • Store and access sensitive information such as passwords and encryption keys securely in Azure Key Vault.
    • Manage dedicated physical servers to host your Azure VMs for Windows and Linux by using Azure Dedicated Host.
  • Module 2: Learn about the Site Reliability Engineering approach to the challenge of assuring reliability and gain a better understanding of why it matters.
  • In this module, you will:

    • Use Microsoft Defender for Cloud
    • Verify your application's inputs and outputs
    • Store your secrets into Key Vault
    • Ensure you are using the latest version of your framework, and its security features
    • Validate that your program dependencies and libraries are safe to use
  • Module 3: Learn how to set up policies to classify, retain, and protect your cloud-based data.
  • In this module, you will:

    • Learn how to classify your data
    • Configure your data retention requirements
    • Explore data ownership and sovereignty
  • Module 4: Learn how Azure Storage provides multilayered security to protect your data with access keys, secure networks, and Advanced Threat Protection monitoring.
  • In this module you will:

    • Explore the Azure Data Lake enterprise-class security features.
    • Understand storage account keys.
    • Understand shared access signatures.
    • Understand transport-level encryption with HTTPS.
    • Understand Advanced Threat Protection.
    • Control network access.
  • Module 5: Configure and manage secrets in Azure Key Vault
  • In this module, you will:

    • Explore proper usage of Azure Key Vault
    • Manage access to an Azure Key Vault
    • Explore certificate management with Azure Key Vault
    • Configure a Hardware Security Module Key-generation solution
  • Module 6: Learn how to use Azure role-based access control to effectively manage your team’s access to Azure resources.
  • In this module, you will:

    • Verify access to resources for yourself and others
    • Grant access to resources
    • View activity logs of Azure RBAC changes
  • Module 7: Secure an Azure SQL database to keep the information safe and diagnose potential security concerns as they happen.
  • In this module, you will:

    • Control network access to your Azure SQL Database using firewall rules
    • Control user access to your Azure SQL Database using authentication and authorization
    • Protect your data in transit and at rest
    • Audit and monitor your Azure SQL Database for access violations

Syllabus

  • Module 1: Protect against security threats on Azure
    • Introduction
    • Protect against security threats by using Azure Security Center
    • Detect and respond to security threats by using Azure Sentinel
    • Store and manage secrets by using Azure Key Vault
    • Exercise - Manage a password in Azure Key Vault
    • Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
    • Knowledge check
    • Summary
  • Module 2: Top 5 security items to consider before pushing to production
    • Introduction
    • Microsoft Defender for Cloud
    • Inputs and Outputs
    • Secrets in Key Vault
    • Framework Updates
    • Safe Dependencies
    • Conclusion
  • Module 3: Configure security policies to manage data
    • Introduction
    • Classify your data at rest, in process, and in transit
    • Exercise - Classify an Azure SQL Database
    • Explore data recovery, retention, and disposal
    • Understand data sovereignty
    • Summary
  • Module 4: Secure your Azure Storage account
    • Introduction
    • Explore Azure Storage security features
    • Understand storage account keys
    • Understand shared access signatures
    • Control network access to your storage account
    • Understand advanced threat protection for Azure Storage
    • Explore Azure Data Lake Storage security features
    • Summary
  • Module 5: Configure and manage secrets in Azure Key Vault
    • Introduction
    • Guidelines for using Azure Key Vault
    • Manage access to secrets, certificates, and keys
    • Exercise - store secrets in Azure Key Vault
    • Manage certificates
    • Summary
  • Module 6: Secure your Azure resources with Azure role-based access control (Azure RBAC)
    • Introduction
    • What is Azure RBAC?
    • Knowledge check - What is Azure RBAC?
    • Exercise - List access using Azure RBAC and the Azure portal
    • Exercise - Grant access using Azure RBAC and the Azure portal
    • Exercise - View activity logs for Azure RBAC changes
    • Knowledge check - Using Azure RBAC
    • Summary
  • Module 7: Secure your Azure SQL Database
    • Introduction
    • Exercise - Set up sandbox environment
    • Exercise - Restrict network access
    • Exercise - Control who can access your database
    • Exercise - Secure your data in transit, at rest, and on display
    • Exercise - Monitor your database
    • Knowledge check
    • Summary

Tags

Related Courses

Advanced AI on Microsoft Azure: Ethics and Laws, Research Methods and Machine Learning
Cloudswyft via FutureLearn
Ethics, Laws and Implementing an AI Solution on Microsoft Azure
Cloudswyft via FutureLearn
Deep Learning and Python Programming for AI with Microsoft Azure
Cloudswyft via FutureLearn
Advanced Artificial Intelligence on Microsoft Azure: Deep Learning, Reinforcement Learning and Applied AI
Cloudswyft via FutureLearn
AI Design and Engineering with Microsoft Azure
Cloudswyft via FutureLearn