Microsoft - Implement Platform Protection
- Offered byCoursera
Implement Platform Protection at Coursera Overview
Duration | 18 hours |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Implement Platform Protection at Coursera Highlights
- Earn a certificate of completion
- Add to your LinkedIn profile
- 13 assignments
Implement Platform Protection at Coursera Course details
- What you'll learn
- Describe defense in depth.
- Review core security concepts and approaches that form part of the defense in depth strategy.
- Implement and configure an Azure Application Gateway to protect your perimeter.
- Configure and deploy the Azure Web Application Firewall.
- Are you a security engineer who wants to learn how to lock down the infrastructure and network resources running in your Azure environment? Then, Implement Platform Protection is the right course for you!
- Throughout this course, you will explore perimeter security, network security, and host and containers security, along with various security components, tools, solutions, deployment methods, strategies, and services for protecting your Azure environment
- You will examine connecting networks via peering, implementing hub-and-spoke topology and distributed denial of service (DDoS ) protection, securing solutions with VPNs, traffic control with network virtual appliances (NVAs), and using Azure Web Application Firewall (WAF) to prevent attacks
- Within the course, you will discover the ins and outs of defense in depth, endpoint protection host security, network client and server technology, privileged access, serverless compute, and virtual machines (VMs)
- You will learn how to configure, deploy, enable, and manage various security solutions, including Azure App Service, Azure Application Gateway, Azure Bastion, Azure Container Instances, Azure Container Registry, Azure Defender, Azure Disk Encryption, Azure ExpressRoute, Azure Firewall and Firewall Manager, Azure Front Door, Azure Functions, Azure Kubernetes Service, Azure Private Link, Azure Security Benchmarks, and Azure Update Management
- This is the third course in a series of seven courses that will prepare you to succeed in the AZ-500: Microsoft Azure Security Technologies exam
Implement Platform Protection at Coursera Curriculum
Perimeter Security
Course introduction
Define defense in depth
Recap network client and server technology
Explore virtual network security
Perimeter protection as part of your defense strategy
Enable distributed denial of service protection
Configure a distributed denial of service protection implementation
Explore Azure Firewall features
Deploy an Azure Firewall implementation
Overview of Azure Firewall Manager
Network isolation and security
VPNs as part of perimeter security
What is a network virtual appliance?
Configure VPN-forced tunneling
Choose between virtual network peering and VPN gateways
Create user-defined routes and network virtual appliances
Module summary
How to be successful in this course
Understand firewalls and network security
Network monitoring
Exercise: Azure Firewall
Solution: Azure Firewall
How Azure Firewall Manager works
Configure and deploy Azure Firewall Manager
Explore hub and spoke topology
Introduction to routing Azure virtual networks
Connect services using peering
Exercise: Azure Virtual Network peering or network virtual appliance routes
Solution: Azure Virtual Network peering or network virtual appliance routes
Azure Functions networking options
Azure Network Virtual Appliances Firewall architecture overview
Knowledge check: Defense concepts
Knowledge check: Secure your solutions using distributed denial of service protection and firewalls
Knowledge check: Secure your solutions using VPNs
Module quiz: Perimeter Security
Meet and greet
Network security
Network security as part of your defense strategy
Deploy and configure network security groups
Create application security groups
Enable service endpoints
Configure service endpoint services
Deploy private links
Application Gateway and encryption
Implement an Azure Application Gateway
Deploy a web application firewall
Configure and manage Azure Front Door
Review ExpressRoute
Module summary
Exercise: Network security groups
Solution: Network security groups
Integrating private endpoints with other services
Exercise: Service Endpoints and Securing Storage
Solution: Service Endpoints and Securing Storage
Application Gateway Components
Configure back-end pools for encryption
Configure an Application Gateway listener for encryption
Exercise: Application service groups
Solution: Application service groups
Exercise: Azure Front Door
Solution: Azure Front Door
Knowledge check: Network security groups and application security groups
Knowledge check: Application Gateway
Knowledge check: Web application firewall, Front Door, and ExpressRoute
Module quiz: Network security
Host and container security
Host security as part of your defense strategy
Enable endpoint protection
Define a privileged access device strategy
Deploy privileged access workstations
Create virtual machine templates
Enable and secure remote access management
Configure update management
Deploy Disk Encryption
Deploy and configure Windows Defender
Explore Microsoft Defender for Cloud recommendations
Secure Azure workloads with Azure Security Benchmarks
What is a container?
Configure Azure Container Instances security
Manage security for Azure Container Instances (ACI)
Explore the Azure Container Registry (ACR)
Enable Azure Container Registry authentication
Overview of serverless compute
Overview Azure App service
What is Kubernetes?
Review Azure Kubernetes Service (AKS)
Configure Azure Kubernetes Service networking
Deploy Azure Kubernetes Service storage
Secure authentication to Azure Kubernetes Service with Active Directory
Manage access to Azure Kubernetes Service using Azure role-based access controls
Module summary
Scheduled updates
Exercise: Virtual machine updates
Solution: Virtual machine updates
Exercise: Deploy a container instance in Azure
Solution: Deploy a container instance in Azure
Security for serverless compute
Security for Azure App service
Additional resources: Security recommendations for App Service
How Kubernetes works?
How Kubernetes deployments work?
How Azure Kubernetes Service works
Exercise: Configuring and securing ACR and AKS
Solution: Configuring and securing ACR and AKS
Course 3 Glossary: Implement Platform Protection
Knowledge check: Configure and manage host security
Knowledge check: Configure and manage container security
Knowledge check: Azure Kubernetes Service (AKS)
Module quiz: Host and container security
Project and graded assessment
Course summary
About the graded assessment
Congratulations
Next steps
About the course project
Graded assessment: Implement Platform Protection
Course project
Compare your work
Share helpful hints