Microsoft
Microsoft Logo

Implement virtual machine host security in Azure 

  • Offered byMicrosoft

Implement virtual machine host security in Azure
 at 
Microsoft 
Overview

Learn how to protect VM-based resources and networks with Azure Security Center

Duration

6 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Implement virtual machine host security in Azure
 at 
Microsoft 
Highlights

  • Use Azure Disk Encryption (ADE) to encrypt OS and data disks on existing and new VMs
  • Discover how to protect VMs and servers with Azure Security Center
Details Icon

Implement virtual machine host security in Azure
 at 
Microsoft 
Course details

What are the course deliverables?
  • Develop a defense-in-depth approach to securing your architecture
  • Choose the technologies to secure your Azure infrastructure
  • Develop a strategy for secure identity management
  • Learn Azure platform security baselines and how they were created
  • Create and validate a security baseline for the most commonly used Azure services
  • Understand the options that are available for virtual machines in Azure
  • Create a Linux virtual machine using the Azure portal
More about this course
  • Learn how protect and harden your virtual machines in Azure
  • This learning path can help you prepare for the Microsoft Certified: Azure Security Engineer Associate certification

Implement virtual machine host security in Azure
 at 
Microsoft 
Curriculum

Microsoft Azure Well-Architected Framework - Security

Introduction

Defense in depth

Identity management

Infrastructure protection

Encryption

Network security

Application security

Summary

Create security baselines

Create a platform security baseline

Understand the Azure platform security baseline

Create an Identity & Access Management (IAM) baseline

Create an Azure Security Center baseline

Create an Azure storage accounts baseline

Create an Azure SQL Database baseline

Create a logging and monitoring baseline

Create a Networking baseline

Create an Azure VM baseline

Other baseline security considerations

Summary

Create a Linux virtual machine in Azure

Introduction

Create a Linux virtual Machine in Azure

Exercise - Decide an authentication method for SSH

Exercise - Create a Linux virtual machine with the Azure portal

Azure virtual machines IP addresses and SSH options

Exercise - Connect to a Linux virtual machine with SSH

Network and security settings

Exercise - Configure network settings

Summary

Create a Windows virtual machine in Azure

Introduction

Create a Windows virtual machine in Azure

Exercise - Create a Windows virtual machine

Use RDP to connect to Windows Azure virtual machines

Exercise - Connect to a Windows virtual machine using RDP

Configure Azure virtual machine network settings

Summary

Secure your Azure virtual machine disks

Introduction

Encryption options for protecting Windows and Linux VMs

Encrypt existing VM disks

Exercise - Encrypt existing VM disks

Automate secure VM deployments by adding encryption to Azure Resource Manager templates

Exercise - Use a Resource Manager template to decrypt the VM

Knowledge check

Summary

Protect your servers and VMs from brute-force and malware attacks with Azure Security Center

Introduction

Protect virtual machines with JIT VM access

Exercise - Enable JIT VM access

Understand the malware threat

Exercise - Configure malware detection

Summary

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
4 hours
Intermediate
Free
5 hours
Beginner
Free
1 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

Implement virtual machine host security in Azure
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...