Architect secure infrastructure in Azure
- Offered byMicrosoft
Architect secure infrastructure in Azure at Microsoft Overview
Duration | 7 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Architect secure infrastructure in Azure at Microsoft Course details
- Resolve security threats with Microsoft Defender for Cloud
- Secure your Azure virtual machine disks
- Manage secrets in your server apps with Azure Key Vault
- Secure your Azure resources with Azure role-based access control (Azure RBAC)
- Encrypt network traffic end to end with Azure Application Gateway
- Introduction to securing data at rest on Azure
- Secure your Azure SQL Database
- Monitor and report on security events in Azure Active Directory
- Learn about the tools and services available on Azure to ensure your resources are secure
- In this course, you?ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats
- Learn how to use Azure RBAC to manage access to resources in Azure
Architect secure infrastructure in Azure at Microsoft Curriculum
Resolve security threats with Microsoft Defender for Cloud
Introduction
View security alerts
Respond to alerts
Define a security incident response plan
Use a workflow automation to automate responses
Exercise - Configure a Playbook for a security event
Summary
Secure your Azure virtual machine disks
Introduction
Encryption options for protecting Windows and Linux VMs
Encrypt existing VM disks
Exercise - Encrypt existing VM disks
Automate secure VM deployments by adding encryption to Azure Resource Manager templates
Exercise - Use a Resource Manager template to decrypt the VM
Knowledge check
Summary
Manage secrets in your server apps with Azure Key Vault
Introduction
What is Azure Key Vault?
Exercise - Create a Key Vault and store secrets
Vault authentication with managed identities for Azure resources
Exercise - Access secrets stored in Azure Key Vault
Exercise - Configure, deploy, and run your app in Azure
Summary
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Introduction
What is Azure RBAC?
Knowledge check - What is Azure RBAC?
Exercise - List access using Azure RBAC and the Azure portal
Exercise - Grant access using Azure RBAC and the Azure portal
Exercise - View activity logs for Azure RBAC changes
Knowledge check - Using Azure RBAC
Summary
Encrypt network traffic end to end with Azure Application Gateway
Introduction
Application Gateway and encryption
Configure back-end pools for encryption
Exercise - Configure back-end pools for encryption
Configure an Application Gateway listener for encryption
Exercise - Configure an Application Gateway listener for encryption
Summary
Introduction to securing data at rest on Azure
Introduction
Classify your data and protect confidential information
Secure data at rest by using Azure Storage Service Encryption
Secure data at rest in Azure SQL Database and Azure Cosmos DB
Keep your keys and secrets safe by using Azure Key Vault
Summary
Secure your Azure SQL Database
Introduction
Exercise - Set up sandbox environment
Exercise - Restrict network access
Exercise - Control who can access your database
Exercise - Secure your data in transit, at rest, and on display
Exercise - Monitor your database
Knowledge check
Summary
Monitor and report on security events in Azure Active Directory
Introduction
Use logs to detect suspicious activity
Exercise - Set up and view sign-in logs and audit logs
Integrate logs with a Log Analytics workspace
Exercise - Integrate logs with a Log Analytics workspace
Set and view alerts in your Log Analytics workspace
Exercise - Set an alert in your Log Analytics workspace and view alerts
Set up dashboards and reports to visualize log data
Exercise - Set up a dashboard and add a report
Summary