Microsoft
Microsoft Logo

AZ-400: Develop a security and compliance plan 

  • Offered byMicrosoft

AZ-400: Develop a security and compliance plan
 at 
Microsoft 
Overview

Build strategies around security and compliance that enable to authenticate and authorize the users

Duration

8 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

AZ-400: Develop a security and compliance plan
 at 
Microsoft 
Course details

What are the course deliverables?
  • Develop an instrumentation strategy
  • Develop a Site Reliability Engineering (SRE) strategy
  • Develop a security and compliance plan
  • Manage source control
  • Facilitate communication and collaboration
  • Define and implement continuous integration
More about this course
  • Learn about the features and capabilities of Azure AD
  • A secure storage area for managing all your app secrets
  • Discover how to protect your APIs from unauthorized use with API keys and client certificate authentication
  • The best practices for building, hosting, and maintaining a secure repository on GitHub

AZ-400: Develop a security and compliance plan
 at 
Microsoft 
Curriculum

MODULE: 1 Secure your identities by using Azure Active Directory

Azure Active Directory overview

Understand Azure AD licenses and terminology

Essential features of Azure AD

Get started with Azure AD

MODULE: 2 Create Azure users and groups in Azure Active Directory

What are user accounts in Azure Active Directory?

Exercise - Add and delete users in Azure Active Directory

Manage app and resource access by using Azure Active Directory groups

Exercise - Assign users to Azure Active Directory groups

Collaborate by using guest accounts and Azure Active Directory B2B

Exercise - Give guest users access in Azure Active Directory B2B

MODULE: 3 Authenticate apps to Azure services by using service principals and managed identities for Azure resources

Authentication with service principals in Azure AD

Authentication with managed identities

Use managed identities with Azure virtual machines

Exercise - Configure a system-assigned managed identity for an Azure VM

Build applications by using Azure AD managed identities

Exercise - Configure a custom application in .NET by using managed identity

MODULE: 4 Configure and manage secrets in Azure Key Vault

Guidelines for using Azure Key Vault

Manage access to secrets, certificates, and keys

Exercise - store secrets in Azure Key Vault

Manage certificates

MODULE: 5 Control authentication for your APIs with Azure API Management

What is API Management?

Create subscriptions in Azure API Management

Exercise - Create subscriptions in Azure API Management

Use client certificates to secure access to an API

Exercise - Use client certificates to secure access to an API

MODULE: 6 Protect against security threats on Azure

Protect against security threats by using Azure Security Center

Detect and respond to security threats by using Azure Sentinel

Store and manage secrets by using Azure Key Vault

Exercise - Manage a password in Azure Key Vault

Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host

MODULE: 7 Monitor and report on security events in Azure AD

Use sign-in, audit, and provisioning logs to detect suspicious activity

Integrate activity logs with Azure Monitor logs

Set up reports and dashboards to visualize the information

Exercise - Set up reports and dashboards to visualize the information

MODULE: 8 Maintain a secure repository by using GitHub best practices

How to maintain a secure GitHub repository

Exercise - Secure strategy essentials

MODULE: 9 Build a cloud governance strategy on Azure

Control access to cloud resources by using Azure role-based access control

Prevent accidental changes by using resource locks

Exercise - Protect a storage account from accidental deletion by using a resource lock

Organize your Azure resources by using tags

Control and audit your resources by using Azure Policy

Exercise - Restrict deployments to a specific location by using Azure Policy

Govern multiple subscriptions by using Azure Blueprints

Accelerate your cloud adoption journey by using the Cloud Adoption Framework for Azure

Create a subscription governance strategy

MODULE: 10 Improve your reliability with modern operations practices: Learning from failure

Why learn from incidents?

What is a post-incident review?

Characteristics and components of a good post-incident review

The post-incident review process

Common traps to avoid

Helpful practices for learning from failure

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
1 hours
Beginner
Free
4 hours
Intermediate
Free
5 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

AZ-400: Develop a security and compliance plan
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...