Design Principles for Implementing Data Security with Microsoft Azure
Offered By: Pluralsight
Course Description
Overview
Security is one of the most important aspects of any architecture. This course will teach you key architectural security considerations as you design an environment on the cloud.
There's no easy approach for security and no solution that solves all your problems from a security perspective. In this course, Design Principles for Implementing Data Security with Microsoft Azure, you’ll learn to consider key architectural security when designing for the cloud. First, you’ll explore cloud defense in depth. Next, you’ll discover identity management and protecting your infrastructure on Microsoft Azure. Finally, you’ll learn how to secure your Azure data storage and encrypt your data. When you’re finished with this course, you’ll have the skills and knowledge of data and security engineering needed to secure your cloud architecture.
There's no easy approach for security and no solution that solves all your problems from a security perspective. In this course, Design Principles for Implementing Data Security with Microsoft Azure, you’ll learn to consider key architectural security when designing for the cloud. First, you’ll explore cloud defense in depth. Next, you’ll discover identity management and protecting your infrastructure on Microsoft Azure. Finally, you’ll learn how to secure your Azure data storage and encrypt your data. When you’re finished with this course, you’ll have the skills and knowledge of data and security engineering needed to secure your cloud architecture.
Syllabus
- Course Overview 1min
- Defense in Depth 10mins
- Identity Management 25mins
- Data Security and Encryption 25mins
Taught by
Bismark Adomako
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera