- Module 1: Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter. Prepare for AZ-900.
- Strengthen your security posture and protect against threats by using Azure Security Center.
- Collect and act on security data from many different sources by using Azure Sentinel.
- Store and access sensitive information such as passwords and encryption keys securely in Azure Key Vault.
- Manage dedicated physical servers to host your Azure VMs for Windows and Linux by using Azure Dedicated Host.
- Module 2: Learn about the Site Reliability Engineering approach to the challenge of assuring reliability and gain a better understanding of why it matters.
- Use Microsoft Defender for Cloud
- Verify your application's inputs and outputs
- Store your secrets into Key Vault
- Ensure you are using the latest version of your framework, and its security features
- Validate that your program dependencies and libraries are safe to use
- Module 3: Learn how to set up policies to classify, retain, and protect your cloud-based data.
- Learn how to classify your data
- Configure your data retention requirements
- Explore data ownership and sovereignty
- Module 4: Learn how Azure Storage provides multilayered security to protect your data with access keys, secure networks, and Advanced Threat Protection monitoring.
- Explore the Azure Data Lake enterprise-class security features.
- Understand storage account keys.
- Understand shared access signatures.
- Understand transport-level encryption with HTTPS.
- Understand Advanced Threat Protection.
- Control network access.
- Module 5: Configure and manage secrets in Azure Key Vault
- Explore proper usage of Azure Key Vault
- Manage access to an Azure Key Vault
- Explore certificate management with Azure Key Vault
- Configure a Hardware Security Module Key-generation solution
- Module 6: Learn how to use Azure role-based access control to effectively manage your team’s access to Azure resources.
- Verify access to resources for yourself and others
- Grant access to resources
- View activity logs of Azure RBAC changes
- Module 7: Secure an Azure SQL database to keep the information safe and diagnose potential security concerns as they happen.
- Control network access to your Azure SQL Database using firewall rules
- Control user access to your Azure SQL Database using authentication and authorization
- Protect your data in transit and at rest
- Audit and monitor your Azure SQL Database for access violations
After completing this module, you'll be able to:
In this module, you will:
In this module, you will:
In this module you will:
In this module, you will:
In this module, you will:
In this module, you will: