- Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
- Develop a defense-in-depth approach to securing your architecture
- Choose the technologies to secure your Azure infrastructure
- Develop a strategy for secure identity management
- Module 2: Explore Azure DevOps capabilities and get started setting up your own organization knowing what separates elite performers from low performers.
- Identify what separates elite performers from low performers
- List what services Azure DevOps provides
- Create an Azure DevOps organization
- Module 3: Learn to use key GitHub features, including issues, notifications, branches, commits, and pull requests.
- Communicate with the project community in issues
- Manage notifications for project events
- Create branches to manage work in parallel
- Make commits to update project source
- Introduce changes with pull requests
- Deploy a web page to GitHub Pages
- Module 4: Learn best practices for building, hosting, and maintaining a secure repository on GitHub.
- Identify the tools and GitHub features to establish a secure development strategy
- Enable vulnerable dependency detection for private repositories
- Detect and fix outdated dependencies with security vulnerabilities
- Automate the detection of vulnerable dependencies with Dependabot
- Add a security policy with a SECURITY.md file
- Remove a commit exposing sensitive data in a pull request
- Keep sensitive files out of your repository by applying the use of a .gitignore file
- Remove historical commits exposing sensitive data deep in your repository
- Module 5: Create security baselines
- Learn Azure platform security baselines and how they were created
- Create and validate a security baseline for the most commonly used Azure services
- Module 6: Learn how to create an Azure Key Vault to store secret values and how to enable secure access to the vault.
- Explore what types of information can be stored in Azure Key Vault
- Create an Azure Key Vault and use it to store secret configuration values
- Enable secure access to the vault from an Azure App Service web app with managed identities for Azure resources
- Implement a web application that retrieves secrets from the vault
- Module 7: Learn how Azure Active Directory, single sign-on (SSO), multifactor authentication, and Conditional Access can help you manage and secure identities on Azure. Prepare for AZ-900.
- Explain the difference between authentication and authorization.
- Describe how Azure Active Directory provides identity and access management.
- Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play in managing user identity.
- Module 8: In this module, you’ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats.
- View security alerts in Microsoft Defender for Cloud
- Define an incident response plan
- Use a Workflow automation to automate a security response
By the end of this module, you'll be able to:
After completing this module, you'll be able to:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
After completing this module, you'll be able to:
In this module, you will: