Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Secure your cloud data

Microsoft via Microsoft Learn

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
  • Module 1: Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter. Prepare for AZ-900.
  • After completing this module, you'll be able to:

    • Strengthen your security posture and protect against threats by using Azure Security Center.
    • Collect and act on security data from many different sources by using Azure Sentinel.
    • Store and access sensitive information such as passwords and encryption keys securely in Azure Key Vault.
    • Manage dedicated physical servers to host your Azure VMs for Windows and Linux by using Azure Dedicated Host.
  • Module 2: Learn about the Site Reliability Engineering approach to the challenge of assuring reliability and gain a better understanding of why it matters.
  • In this module, you will:

    • Use Microsoft Defender for Cloud
    • Verify your application's inputs and outputs
    • Store your secrets into Key Vault
    • Ensure you are using the latest version of your framework, and its security features
    • Validate that your program dependencies and libraries are safe to use
  • Module 3: Learn how to set up policies to classify, retain, and protect your cloud-based data.
  • In this module, you will:

    • Learn how to classify your data
    • Configure your data retention requirements
    • Explore data ownership and sovereignty
  • Module 4: Learn how Azure Storage provides multilayered security to protect your data with access keys, secure networks, and Advanced Threat Protection monitoring.
  • In this module you will:

    • Explore the Azure Data Lake enterprise-class security features.
    • Understand storage account keys.
    • Understand shared access signatures.
    • Understand transport-level encryption with HTTPS.
    • Understand Advanced Threat Protection.
    • Control network access.
  • Module 5: Configure and manage secrets in Azure Key Vault
  • In this module, you will:

    • Explore proper usage of Azure Key Vault
    • Manage access to an Azure Key Vault
    • Explore certificate management with Azure Key Vault
    • Configure a Hardware Security Module Key-generation solution
  • Module 6: Learn how to use Azure role-based access control to effectively manage your team’s access to Azure resources.
  • In this module, you will:

    • Verify access to resources for yourself and others
    • Grant access to resources
    • View activity logs of Azure RBAC changes
  • Module 7: Secure an Azure SQL database to keep the information safe and diagnose potential security concerns as they happen.
  • In this module, you will:

    • Control network access to your Azure SQL Database using firewall rules
    • Control user access to your Azure SQL Database using authentication and authorization
    • Protect your data in transit and at rest
    • Audit and monitor your Azure SQL Database for access violations

Syllabus

  • Module 1: Protect against security threats on Azure
    • Introduction
    • Protect against security threats by using Azure Security Center
    • Detect and respond to security threats by using Azure Sentinel
    • Store and manage secrets by using Azure Key Vault
    • Exercise - Manage a password in Azure Key Vault
    • Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
    • Knowledge check
    • Summary
  • Module 2: Top 5 security items to consider before pushing to production
    • Introduction
    • Microsoft Defender for Cloud
    • Inputs and Outputs
    • Secrets in Key Vault
    • Framework Updates
    • Safe Dependencies
    • Conclusion
  • Module 3: Configure security policies to manage data
    • Introduction
    • Classify your data at rest, in process, and in transit
    • Exercise - Classify an Azure SQL Database
    • Explore data recovery, retention, and disposal
    • Understand data sovereignty
    • Summary
  • Module 4: Secure your Azure Storage account
    • Introduction
    • Explore Azure Storage security features
    • Understand storage account keys
    • Understand shared access signatures
    • Control network access to your storage account
    • Understand advanced threat protection for Azure Storage
    • Explore Azure Data Lake Storage security features
    • Summary
  • Module 5: Configure and manage secrets in Azure Key Vault
    • Introduction
    • Guidelines for using Azure Key Vault
    • Manage access to secrets, certificates, and keys
    • Exercise - store secrets in Azure Key Vault
    • Manage certificates
    • Summary
  • Module 6: Secure your Azure resources with Azure role-based access control (Azure RBAC)
    • Introduction
    • What is Azure RBAC?
    • Knowledge check - What is Azure RBAC?
    • Exercise - List access using Azure RBAC and the Azure portal
    • Exercise - Grant access using Azure RBAC and the Azure portal
    • Exercise - View activity logs for Azure RBAC changes
    • Knowledge check - Using Azure RBAC
    • Summary
  • Module 7: Secure your Azure SQL Database
    • Introduction
    • Exercise - Set up sandbox environment
    • Exercise - Restrict network access
    • Exercise - Control who can access your database
    • Exercise - Secure your data in transit, at rest, and on display
    • Exercise - Monitor your database
    • Knowledge check
    • Summary

Reviews

Start your review of Secure your cloud data

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.