Develop a security and compliance plan
- Offered byMicrosoft
Develop a security and compliance plan at Microsoft Overview
Duration | 7 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Develop a security and compliance plan at Microsoft Course details
- Secure your identities by using Azure Active Directory
- Create Azure users and groups in Azure Active Directory
- Authenticate apps to Azure services by using service principals and managed identities for Azure resources
- Configure and manage secrets in Azure Key Vault
- Control authentication for your APIs with Azure API Management
- Protect against security threats on Azure
- Monitor and report on security events in Azure Active Directory
- Maintain a secure repository by using GitHub best practices
- Build a cloud governance strategy on Azure
- Improve your reliability with modern operations practices: Learning from failure
- Improve your reliability with modern operations practices: Incident response
- Build strategies around security and compliance that enable you to authenticate and authorize your users, handle sensitive information, and enforce proper governance
- Discover how to protect your APIs from unauthorized use with API keys and client certificate authentication
- Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter
- Learn best practices for building, hosting, and maintaining a secure repository on GitHub
Develop a security and compliance plan at Microsoft Curriculum
Secure your identities by using Azure Active Directory
Introduction
Azure Active Directory overview
Understand Azure AD licenses and terminology
Essential features of Azure AD
Get started with Azure AD
Summary
Create Azure users and groups in Azure Active Directory
Introduction
What are user accounts in Azure Active Directory?
Exercise - Add and delete users in Azure Active Directory
Manage app and resource access by using Azure Active Directory groups
Exercise - Assign users to Azure Active Directory groups
Collaborate by using guest accounts and Azure Active Directory B2B
Exercise - Give guest users access in Azure Active Directory B2B
Summary
Authenticate apps to Azure services by using service principals and managed identities for Azure resources
Introduction
Authentication with service principals in Azure AD
Authentication with managed identities
Use managed identities with Azure virtual machines
Exercise - Configure a system-assigned managed identity for an Azure VM
Build applications by using Azure AD managed identities
Exercise - Configure a custom application in .NET by using managed identity
Summary
Configure and manage secrets in Azure Key Vault
Introduction
Guidelines for using Azure Key Vault
Manage access to secrets, certificates, and keys
Exercise - store secrets in Azure Key Vault
Manage certificates
Summary
Control authentication for your APIs with Azure API Management
Introduction
What is API Management?
Create subscriptions in Azure API Management
Exercise - Create subscriptions in Azure API Management
Use client certificates to secure access to an API
Exercise - Use client certificates to secure access to an API
Summary
Protect against security threats on Azure
Introduction
Protect against security threats by using Azure Security Center
Detect and respond to security threats by using Azure Sentinel
Store and manage secrets by using Azure Key Vault
Exercise - Manage a password in Azure Key Vault
Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
Knowledge check
Summary
Monitor and report on security events in Azure Active Directory
Introduction
Use logs to detect suspicious activity
Exercise - Set up and view sign-in logs and audit logs
Integrate logs with a Log Analytics workspace
Exercise - Integrate logs with a Log Analytics workspace
Set and view alerts in your Log Analytics workspace
Exercise - Set an alert in your Log Analytics workspace and view alerts
Set up dashboards and reports to visualize log data
Exercise - Set up a dashboard and add a report
Summary
Maintain a secure repository by using GitHub best practices
Introduction
How to maintain a secure GitHub repository
Exercise - Add a .gitignore file
Automated security
Knowledge check
Summary
Build a cloud governance strategy on Azure
Introduction
Control access to cloud resources by using Azure role-based access control
Prevent accidental changes by using resource locks
Exercise - Protect a storage account from accidental deletion by using a resource lock
Organize your Azure resources by using tags
Control and audit your resources by using Azure Policy
Exercise - Restrict deployments to a specific location by using Azure Policy
Govern multiple subscriptions by using Azure Blueprints
Accelerate your cloud adoption journey by using the Cloud Adoption Framework for Azure
Create a subscription governance strategy
Knowledge check
Summary
Improve your reliability with modern operations practices: Learning from failure
Introduction
Why learn from incidents?
What is a post-incident review?
Characteristics and components of a good post-incident review
The post-incident review process
Common traps to avoid
Helpful practices for learning from failure
Summary
Improve your reliability with modern operations practices: Incident response
Introduction
Importance of incident response
Characteristics and lifecycle of an incident
Foundations of incident response
Incident tracking
Communication and collaboration
Remediation
Summary