Coursera
Coursera Logo

Microsoft - Implement Platform Protection 

  • Offered byCoursera

Implement Platform Protection
 at 
Coursera 
Overview

Duration

18 hours

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Implement Platform Protection
 at 
Coursera 
Highlights

  • Earn a certificate of completion
  • Add to your LinkedIn profile
  • 13 assignments
Details Icon

Implement Platform Protection
 at 
Coursera 
Course details

What are the course deliverables?
  • What you'll learn
  • Describe defense in depth.
  • Review core security concepts and approaches that form part of the defense in depth strategy.
  • Implement and configure an Azure Application Gateway to protect your perimeter.
  • Configure and deploy the Azure Web Application Firewall.
More about this course
  • Are you a security engineer who wants to learn how to lock down the infrastructure and network resources running in your Azure environment? Then, Implement Platform Protection is the right course for you!
  • Throughout this course, you will explore perimeter security, network security, and host and containers security, along with various security components, tools, solutions, deployment methods, strategies, and services for protecting your Azure environment
  • You will examine connecting networks via peering, implementing hub-and-spoke topology and distributed denial of service (DDoS ) protection, securing solutions with VPNs, traffic control with network virtual appliances (NVAs), and using Azure Web Application Firewall (WAF) to prevent attacks
  • Within the course, you will discover the ins and outs of defense in depth, endpoint protection host security, network client and server technology, privileged access, serverless compute, and virtual machines (VMs)
  • You will learn how to configure, deploy, enable, and manage various security solutions, including Azure App Service, Azure Application Gateway, Azure Bastion, Azure Container Instances, Azure Container Registry, Azure Defender, Azure Disk Encryption, Azure ExpressRoute, Azure Firewall and Firewall Manager, Azure Front Door, Azure Functions, Azure Kubernetes Service, Azure Private Link, Azure Security Benchmarks, and Azure Update Management
  • This is the third course in a series of seven courses that will prepare you to succeed in the AZ-500: Microsoft Azure Security Technologies exam
Read more

Implement Platform Protection
 at 
Coursera 
Curriculum

Perimeter Security

Course introduction

Define defense in depth

Recap network client and server technology

Explore virtual network security

Perimeter protection as part of your defense strategy

Enable distributed denial of service protection

Configure a distributed denial of service protection implementation

Explore Azure Firewall features

Deploy an Azure Firewall implementation

Overview of Azure Firewall Manager

Network isolation and security

VPNs as part of perimeter security

What is a network virtual appliance?

Configure VPN-forced tunneling

Choose between virtual network peering and VPN gateways

Create user-defined routes and network virtual appliances

Module summary

How to be successful in this course

Understand firewalls and network security

Network monitoring

Exercise: Azure Firewall

Solution: Azure Firewall

How Azure Firewall Manager works

Configure and deploy Azure Firewall Manager

Explore hub and spoke topology

Introduction to routing Azure virtual networks

Connect services using peering

Exercise: Azure Virtual Network peering or network virtual appliance routes

Solution: Azure Virtual Network peering or network virtual appliance routes

Azure Functions networking options

Azure Network Virtual Appliances Firewall architecture overview

Knowledge check: Defense concepts

Knowledge check: Secure your solutions using distributed denial of service protection and firewalls

Knowledge check: Secure your solutions using VPNs

Module quiz: Perimeter Security

Meet and greet

Network security

Network security as part of your defense strategy

Deploy and configure network security groups

Create application security groups

Enable service endpoints

Configure service endpoint services

Deploy private links

Application Gateway and encryption

Implement an Azure Application Gateway

Deploy a web application firewall

Configure and manage Azure Front Door

Review ExpressRoute

Module summary

Exercise: Network security groups

Solution: Network security groups

Integrating private endpoints with other services

Exercise: Service Endpoints and Securing Storage

Solution: Service Endpoints and Securing Storage

Application Gateway Components

Configure back-end pools for encryption

Configure an Application Gateway listener for encryption

Exercise: Application service groups

Solution: Application service groups

Exercise: Azure Front Door

Solution: Azure Front Door

Knowledge check: Network security groups and application security groups

Knowledge check: Application Gateway

Knowledge check: Web application firewall, Front Door, and ExpressRoute

Module quiz: Network security

Host and container security

Host security as part of your defense strategy

Enable endpoint protection

Define a privileged access device strategy

Deploy privileged access workstations

Create virtual machine templates

Enable and secure remote access management

Configure update management

Deploy Disk Encryption

Deploy and configure Windows Defender

Explore Microsoft Defender for Cloud recommendations

Secure Azure workloads with Azure Security Benchmarks

What is a container?

Configure Azure Container Instances security​

Manage security for Azure Container Instances (ACI)

Explore the Azure Container Registry (ACR)​

Enable Azure Container Registry authentication

Overview of serverless compute

Overview Azure App service

What is Kubernetes?

Review Azure Kubernetes Service (AKS)

Configure Azure Kubernetes Service networking

Deploy Azure Kubernetes Service storage​

Secure authentication to Azure Kubernetes Service with Active Directory

Manage access to Azure Kubernetes Service using Azure role-based access controls

Module summary

Scheduled updates

Exercise: Virtual machine updates

Solution: Virtual machine updates

Exercise: Deploy a container instance in Azure

Solution: Deploy a container instance in Azure

Security for serverless compute

Security for Azure App service

Additional resources: Security recommendations for App Service

How Kubernetes works?

How Kubernetes deployments work?

How Azure Kubernetes Service works

Exercise: Configuring and securing ACR and AKS

Solution: Configuring and securing ACR and AKS

Course 3 Glossary: Implement Platform Protection

Knowledge check: Configure and manage host security

Knowledge check: Configure and manage container security

Knowledge check: Azure Kubernetes Service (AKS)

Module quiz: Host and container security

Project and graded assessment

Course summary

About the graded assessment

Congratulations

Next steps

About the course project

Graded assessment: Implement Platform Protection

Course project

Compare your work

Share helpful hints

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6719 CoursesRight Arrow Icon
qna

Implement Platform Protection
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...