Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls
- Offered byMicrosoft
Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls at Microsoft Overview
Duration | 3 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls at Microsoft Course details
- Filter network traffic with a network security group using the Azure portal
- Create a Log Analytics workspace for Microsoft Defender for Cloud
- Set up Microsoft Defender for Cloud
- Configure and integrate a Log Analytics agent and workspace in Defender for Cloud
- Configure Azure Key Vault networking settings
- Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal
- This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.
Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls at Microsoft Curriculum
Filter network traffic with a network security group using the Azure portal
Introduction
Azure resource group
Azure Virtual Network
How network security groups filter network traffic
Application security groups
Exercise - Create a virtual network infrastructure
Knowledge check
Summary
Create a Log Analytics workspace for Microsoft Defender for Cloud
Introduction
Defender for Cloud monitoring components
Exercise - Create a workspace
Knowledge check
Summary
Set up Microsoft Defender for Cloud
Introduction
Implement Microsoft Defender for Cloud
Security posture
Workload protections
Deploy Microsoft Defender for Cloud
Exercise - Enable Defender for Cloud on your Azure subscription
Azure Arc
Azure Arc capabilities
Microsoft cloud security benchmark
Improve your regulatory compliance.
Configure Microsoft Defender for Cloud policies
View and edit security policies
Manage and implement Microsoft Defender for Cloud recommendations
Explore secure score
MITRE Attack matrix
Define brute force attacks
Understand just-in-time VM access
Implement just-in-time VM access
Exercise - Enable just-in-time access on Virtual Machines
Knowledge check
Summary
Configure and integrate a Log Analytics agent and workspace in Defender for Cloud
Introduction
Collect data from your workloads with the Log Analytics agent
Configure the Log Analytics agent and workspace
Exercise - Collect data from your workloads with the Log Analytics agent
Knowledge check
Summary
Configure Azure Key Vault networking settings
Introduction
Azure Key Vault basic concepts
Best practices for Azure Key Vault
Azure Key Vault security
Configure Azure Key Vault firewalls and virtual networks
Exercise - Configure Key Vault firewall and virtual networks
Azure Key Vault soft delete overview
Virtual network service endpoints for Azure Key Vault
Exercise - Configure Azure Key Vault recovery management with soft delete and purge protection
Knowledge check
Summary
Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal
Introduction
Azure Private Endpoint
Azure Private Link
Exercise - Deploy a virtual machine to test connectivity privately and securely to the SQL server across the private endpoint
Knowledge check
Summary