Implement virtual machine host security in Azure
- Offered byMicrosoft
Implement virtual machine host security in Azure at Microsoft Overview
Duration | 6 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Implement virtual machine host security in Azure at Microsoft Highlights
- Use Azure Disk Encryption (ADE) to encrypt OS and data disks on existing and new VMs
- Discover how to protect VMs and servers with Azure Security Center
Implement virtual machine host security in Azure at Microsoft Course details
- Develop a defense-in-depth approach to securing your architecture
- Choose the technologies to secure your Azure infrastructure
- Develop a strategy for secure identity management
- Learn Azure platform security baselines and how they were created
- Create and validate a security baseline for the most commonly used Azure services
- Understand the options that are available for virtual machines in Azure
- Create a Linux virtual machine using the Azure portal
- Learn how protect and harden your virtual machines in Azure
- This learning path can help you prepare for the Microsoft Certified: Azure Security Engineer Associate certification
Implement virtual machine host security in Azure at Microsoft Curriculum
Microsoft Azure Well-Architected Framework - Security
Introduction
Defense in depth
Identity management
Infrastructure protection
Encryption
Network security
Application security
Summary
Create security baselines
Create a platform security baseline
Understand the Azure platform security baseline
Create an Identity & Access Management (IAM) baseline
Create an Azure Security Center baseline
Create an Azure storage accounts baseline
Create an Azure SQL Database baseline
Create a logging and monitoring baseline
Create a Networking baseline
Create an Azure VM baseline
Other baseline security considerations
Summary
Create a Linux virtual machine in Azure
Introduction
Create a Linux virtual Machine in Azure
Exercise - Decide an authentication method for SSH
Exercise - Create a Linux virtual machine with the Azure portal
Azure virtual machines IP addresses and SSH options
Exercise - Connect to a Linux virtual machine with SSH
Network and security settings
Exercise - Configure network settings
Summary
Create a Windows virtual machine in Azure
Introduction
Create a Windows virtual machine in Azure
Exercise - Create a Windows virtual machine
Use RDP to connect to Windows Azure virtual machines
Exercise - Connect to a Windows virtual machine using RDP
Configure Azure virtual machine network settings
Summary
Secure your Azure virtual machine disks
Introduction
Encryption options for protecting Windows and Linux VMs
Encrypt existing VM disks
Exercise - Encrypt existing VM disks
Automate secure VM deployments by adding encryption to Azure Resource Manager templates
Exercise - Use a Resource Manager template to decrypt the VM
Knowledge check
Summary
Protect your servers and VMs from brute-force and malware attacks with Azure Security Center
Introduction
Protect virtual machines with JIT VM access
Exercise - Enable JIT VM access
Understand the malware threat
Exercise - Configure malware detection
Summary