Secure compute, storage, and databases
- Offered byMicrosoft
Secure compute, storage, and databases at Microsoft Overview
Duration | 4 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Secure compute, storage, and databases at Microsoft Highlights
- Earn a certificate of completion
Secure compute, storage, and databases at Microsoft Course details
- Plan and implement advanced security for compute
- Plan and implement security for storage
- Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
- Master the art of securing Azure compute resources, storage, and databases, including advanced security measures, encryption, access control, and database protection.
Secure compute, storage, and databases at Microsoft Curriculum
Plan and implement advanced security for compute
Introduction
Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access
Configure network isolation for Azure Kubernetes Service (AKS)
Secure and monitor AKS
Configure authentication for AKS
Configure security for Azure Container Instances (ACIs)
Configure security for Azure Container Apps (ACAs)
Manage access to Azure Container Registry (ACR)
Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption
Recommend security configurations for Azure API Management
Knowledge check
Summary
Plan and implement security for storage
Introduction
Configure access control for storage accounts
Manage life cycle for storage account access keys
Select and configure an appropriate method for access to Azure Files
Select and configure an appropriate method for access to Azure Blob Storage
Select and configure an appropriate method for access to Azure Tables
Select and configure an appropriate method for access to Azure Queues
Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage
Configure Bring your own key (BYOK)
Enable double encryption at the Azure Storage infrastructure level
Knowledge check
Summary
Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
Introduction
Enable database authentication by using Microsoft Entra ID
Enable and monitor database audit
Identify use cases for the Microsoft Purview governance portal
Implement data classification of sensitive information by using the Microsoft Purview governance portal
Plan and implement dynamic mask
Implement transparent data encryption
Recommend when to use Azure SQL Database Always Encrypted
Knowledge check
Summary