About the Course
In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
Read More
Who is it for?
Students in this course are interested in implementing Azure Directory, policies and security over their platform.
Read Less
Entry Requirements
Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.
- Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks.
- Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
- Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).
- Understanding of resilience and disaster recovery, including backup and restore operations.
Recommended prerequisites: M-AZ303 – Microsoft Azure Architect Technologies
The Exam
There is no exam for this course
Course Objectives
After completing this course, students will be able to:
- Describe specialized data classifications on Azure
- Identify Azure data protection mechanisms
- Implement Azure data encryption methods
- Secure Internet protocols and how to implement them on Azure
- Describe Azure security services and features
Syllabus – Key points
Module 1: Identity and Access
- Configure Azure Active Directory for Azure workloads and subscriptions
- Configure Azure AD Privileged Identity Management
- Configure security for an Azure subscription
Module 2: Platform Protection
- Understand cloud security
- Build a network
- Secure network
- Implement host security
- Implement platform security
- Implement subscription security
Module 3: Security Operations
- Configure security services
- Configure security policies by using Azure Security Centre
- Manage security alerts
- Respond to and remediate security issues
- Create security baselines
Module 4: Data and applications
- Configure security policies to manage data
- Configure security for data infrastructure
- Configure encryption for data at rest
- Understand application security
- Implement security for application lifecycle
- Secure applications
- Configure and manage Azure Key Vault
Reviews
There are no reviews yet.