Microsoft
Microsoft Logo

Secure compute, storage, and databases 

  • Offered byMicrosoft

Secure compute, storage, and databases
 at 
Microsoft 
Overview

Duration

4 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Secure compute, storage, and databases
 at 
Microsoft 
Highlights

  • Earn a certificate of completion
Details Icon

Secure compute, storage, and databases
 at 
Microsoft 
Course details

What are the course deliverables?
  • Plan and implement advanced security for compute
  • Plan and implement security for storage
  • Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
More about this course
  • Master the art of securing Azure compute resources, storage, and databases, including advanced security measures, encryption, access control, and database protection.

Secure compute, storage, and databases
 at 
Microsoft 
Curriculum

Plan and implement advanced security for compute

Introduction

Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access

Configure network isolation for Azure Kubernetes Service (AKS)

Secure and monitor AKS

Configure authentication for AKS

Configure security for Azure Container Instances (ACIs)

Configure security for Azure Container Apps (ACAs)

Manage access to Azure Container Registry (ACR)

Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption

Recommend security configurations for Azure API Management

Knowledge check

Summary

Plan and implement security for storage

Introduction

Configure access control for storage accounts

Manage life cycle for storage account access keys

Select and configure an appropriate method for access to Azure Files

Select and configure an appropriate method for access to Azure Blob Storage

Select and configure an appropriate method for access to Azure Tables

Select and configure an appropriate method for access to Azure Queues

Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage

Configure Bring your own key (BYOK)

Enable double encryption at the Azure Storage infrastructure level

Knowledge check

Summary

Plan and implement security for Azure SQL Database and Azure SQL Managed Instance

Introduction

Enable database authentication by using Microsoft Entra ID

Enable and monitor database audit

Identify use cases for the Microsoft Purview governance portal

Implement data classification of sensitive information by using the Microsoft Purview governance portal

Plan and implement dynamic mask

Implement transparent data encryption​

Recommend when to use Azure SQL Database Always Encrypted

Knowledge check

Summary

Secure compute, storage, and databases
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
4 hours
Intermediate
Free
5 hours
Beginner
Free
1 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

Secure compute, storage, and databases
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...