Manage security operations
- Offered byMicrosoft
Manage security operations at Microsoft Overview
Duration | 4 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Manage security operations at Microsoft Highlights
- Earn a certificate of completion
Manage security operations at Microsoft Course details
- Plan, implement, and manage governance for security
- Manage security posture by using Microsoft Defender for Cloud
- Configure and manage threat protection by using Microsoft Defender for Cloud
- Configure and manage security monitoring and automation solutions
- Master the art of managing security operations in Azure, from governance and policy creation to infrastructure security, key management, security posture, threat protection, and advanced security monitoring and automation.
Manage security operations at Microsoft Curriculum
Plan, implement, and manage governance for security
Introduction
Create, assign, and interpret security policies and initiatives in Azure Policy
Configure security settings by using Azure Blueprint
Deploy secure infrastructures by using a landing zone
Create and configure an Azure Key Vault
Recommend when to use a dedicated Hardware Security Module (HSM)
Configure access to Key Vault, including vault access policies and Azure Role Based Access Control
Manage certificates, secrets, and keys
Configure key rotation
Configure backup and recovery of certificates, secrets, and keys
Knowledge check
Summary
Manage security posture by using Microsoft Defender for Cloud
Introduction
Implement Microsoft Defender for Cloud
Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory
Assess compliance against security frameworks and Microsoft Defender for Cloud
Add industry and regulatory standards to Microsoft Defender for Cloud
Add custom initiatives to Microsoft Defender for Cloud
Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud
Identify and monitor external assets by using Microsoft Defender External Attack Surface Management
Knowledge check
Summary
Configure and manage threat protection by using Microsoft Defender for Cloud
Introduction
Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS
Configure Microsoft Defender for Servers
Configure Microsoft Defender for Azure SQL Database
Manage and respond to security alerts in Microsoft Defender for Cloud
Configure workflow automation by using Microsoft Defender for Cloud
Evaluate vulnerability scans from Microsoft Defender for Server
Knowledge check
Summary
Configure and manage security monitoring and automation solutions
Introduction
Monitor security events by using Azure Monitor
Configure data connectors in Microsoft Sentinel
Create and customize analytics rules in Microsoft Sentinel
Configure automation in Microsoft Sentinel
Knowledge check
Summary