Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Learn how Microsoft supports secure software development as part of a cybersecurity solution

Microsoft via Microsoft Learn

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
  • Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
  • By the end of this module, you'll be able to:

    • Develop a defense-in-depth approach to securing your architecture
    • Choose the technologies to secure your Azure infrastructure
    • Develop a strategy for secure identity management
  • Module 2: Explore Azure DevOps capabilities and get started setting up your own organization knowing what separates elite performers from low performers.
  • After completing this module, you'll be able to:

    • Identify what separates elite performers from low performers
    • List what services Azure DevOps provides
    • Create an Azure DevOps organization
  • Module 3: Learn to use key GitHub features, including issues, notifications, branches, commits, and pull requests.
  • In this module, you will:

    • Communicate with the project community in issues
    • Manage notifications for project events
    • Create branches to manage work in parallel
    • Make commits to update project source
    • Introduce changes with pull requests
    • Deploy a web page to GitHub Pages
  • Module 4: Learn best practices for building, hosting, and maintaining a secure repository on GitHub.
  • In this module, you will:

    • Identify the tools and GitHub features to establish a secure development strategy
    • Enable vulnerable dependency detection for private repositories
    • Detect and fix outdated dependencies with security vulnerabilities
    • Automate the detection of vulnerable dependencies with Dependabot
    • Add a security policy with a SECURITY.md file
    • Remove a commit exposing sensitive data in a pull request
    • Keep sensitive files out of your repository by applying the use of a .gitignore file
    • Remove historical commits exposing sensitive data deep in your repository
  • Module 5: Create security baselines
  • In this module, you will:

    • Learn Azure platform security baselines and how they were created
    • Create and validate a security baseline for the most commonly used Azure services
  • Module 6: Learn how to create an Azure Key Vault to store secret values and how to enable secure access to the vault.
  • In this module, you will:

    • Explore what types of information can be stored in Azure Key Vault
    • Create an Azure Key Vault and use it to store secret configuration values
    • Enable secure access to the vault from an Azure App Service web app with managed identities for Azure resources
    • Implement a web application that retrieves secrets from the vault
  • Module 7: Learn how Azure Active Directory, single sign-on (SSO), multifactor authentication, and Conditional Access can help you manage and secure identities on Azure. Prepare for AZ-900.
  • After completing this module, you'll be able to:

    • Explain the difference between authentication and authorization.
    • Describe how Azure Active Directory provides identity and access management.
    • Explain the role single sign-on (SSO), multifactor authentication, and Conditional Access play in managing user identity.
  • Module 8: In this module, you’ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats.
  • In this module, you will:

    • View security alerts in Microsoft Defender for Cloud
    • Define an incident response plan
    • Use a Workflow automation to automate a security response

Syllabus

  • Module 1: Microsoft Azure Well-Architected Framework - Security
    • Introduction
    • Defense in depth
    • Identity management
    • Infrastructure protection
    • Encryption
    • Network security
    • Application security
    • Summary
  • Module 2: Introduction to Azure DevOps
    • Introduction
    • What is DevOps?
    • What is Azure DevOps?
    • Exercise - Create an Azure DevOps organization
    • Summary
  • Module 3: Introduction to GitHub
    • Introduction
    • What is GitHub?
    • Exercise - A guided tour of GitHub
    • Knowledge check
    • Summary
  • Module 4: Maintain a secure repository by using GitHub best practices
    • Introduction
    • How to maintain a secure GitHub repository
    • Exercise - Add a .gitignore file
    • Automated security
    • Knowledge check
    • Summary
  • Module 5: Create security baselines
    • Create a platform security baseline
    • Understand the Azure platform security baseline
    • Create an Identity & Access Management (IAM) baseline
    • Create a Microsoft Defender for Cloud baseline
    • Create an Azure storage accounts baseline
    • Create an Azure SQL Database baseline
    • Create a logging and monitoring baseline
    • Create a Networking baseline
    • Create an Azure VM baseline
    • Other baseline security considerations
    • Summary
  • Module 6: Manage secrets in your server apps with Azure Key Vault
    • Introduction
    • What is Azure Key Vault?
    • Exercise - Create a Key Vault and store secrets
    • Vault authentication with managed identities for Azure resources
    • Exercise - Access secrets stored in Azure Key Vault
    • Exercise - Configure, deploy, and run your app in Azure
    • Summary
  • Module 7: Secure access to your applications by using Azure identity services
    • Introduction
    • Compare authentication and authorization
    • What is Azure Active Directory?
    • What are multifactor authentication and Conditional Access?
    • Knowledge check
    • Summary
  • Module 8: Resolve security threats with Microsoft Defender for Cloud
    • Introduction
    • View security alerts
    • Respond to alerts
    • Define a security incident response plan
    • Use a workflow automation to automate responses
    • Exercise - Configure a Playbook for a security event
    • Summary

Reviews

Start your review of Learn how Microsoft supports secure software development as part of a cybersecurity solution

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.