AZ-400: Develop a security and compliance plan
- Offered byMicrosoft
AZ-400: Develop a security and compliance plan at Microsoft Overview
Duration | 8 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
AZ-400: Develop a security and compliance plan at Microsoft Course details
- Develop an instrumentation strategy
- Develop a Site Reliability Engineering (SRE) strategy
- Develop a security and compliance plan
- Manage source control
- Facilitate communication and collaboration
- Define and implement continuous integration
- Learn about the features and capabilities of Azure AD
- A secure storage area for managing all your app secrets
- Discover how to protect your APIs from unauthorized use with API keys and client certificate authentication
- The best practices for building, hosting, and maintaining a secure repository on GitHub
AZ-400: Develop a security and compliance plan at Microsoft Curriculum
MODULE: 1 Secure your identities by using Azure Active Directory
Azure Active Directory overview
Understand Azure AD licenses and terminology
Essential features of Azure AD
Get started with Azure AD
MODULE: 2 Create Azure users and groups in Azure Active Directory
What are user accounts in Azure Active Directory?
Exercise - Add and delete users in Azure Active Directory
Manage app and resource access by using Azure Active Directory groups
Exercise - Assign users to Azure Active Directory groups
Collaborate by using guest accounts and Azure Active Directory B2B
Exercise - Give guest users access in Azure Active Directory B2B
MODULE: 3 Authenticate apps to Azure services by using service principals and managed identities for Azure resources
Authentication with service principals in Azure AD
Authentication with managed identities
Use managed identities with Azure virtual machines
Exercise - Configure a system-assigned managed identity for an Azure VM
Build applications by using Azure AD managed identities
Exercise - Configure a custom application in .NET by using managed identity
MODULE: 4 Configure and manage secrets in Azure Key Vault
Guidelines for using Azure Key Vault
Manage access to secrets, certificates, and keys
Exercise - store secrets in Azure Key Vault
Manage certificates
MODULE: 5 Control authentication for your APIs with Azure API Management
What is API Management?
Create subscriptions in Azure API Management
Exercise - Create subscriptions in Azure API Management
Use client certificates to secure access to an API
Exercise - Use client certificates to secure access to an API
MODULE: 6 Protect against security threats on Azure
Protect against security threats by using Azure Security Center
Detect and respond to security threats by using Azure Sentinel
Store and manage secrets by using Azure Key Vault
Exercise - Manage a password in Azure Key Vault
Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
MODULE: 7 Monitor and report on security events in Azure AD
Use sign-in, audit, and provisioning logs to detect suspicious activity
Integrate activity logs with Azure Monitor logs
Set up reports and dashboards to visualize the information
Exercise - Set up reports and dashboards to visualize the information
MODULE: 8 Maintain a secure repository by using GitHub best practices
How to maintain a secure GitHub repository
Exercise - Secure strategy essentials
MODULE: 9 Build a cloud governance strategy on Azure
Control access to cloud resources by using Azure role-based access control
Prevent accidental changes by using resource locks
Exercise - Protect a storage account from accidental deletion by using a resource lock
Organize your Azure resources by using tags
Control and audit your resources by using Azure Policy
Exercise - Restrict deployments to a specific location by using Azure Policy
Govern multiple subscriptions by using Azure Blueprints
Accelerate your cloud adoption journey by using the Cloud Adoption Framework for Azure
Create a subscription governance strategy
MODULE: 10 Improve your reliability with modern operations practices: Learning from failure
Why learn from incidents?
What is a post-incident review?
Characteristics and components of a good post-incident review
The post-incident review process
Common traps to avoid
Helpful practices for learning from failure