In this course, we will explore IAM to help protect organizations against breaches and achieve compliance. We'll see how AD Connect lets you sync and manage cloud and on-premises identities. Always use Least Privilege to control access by leveraging conditional access and MFA. We will see how infrastructure and network design can use the Zero Trust model through tools such as Firewalls, Azure Bastion, and Just in Time. Learn what steps to take to secure data with secured keys. We will dive deep into Security Center to detect and fix top layer security vulnerabilities. Then we will dive deep into the SOAR and SIEM capabilities of Sentinel to identify deep threat detection and protection tool.
Overview
Syllabus
- Introduction to Security in Azure
- In this lesson, we will look at the history behind cloud computing and Azure, the major stakeholders you will interact with, as well as the workspaces we use to provide access to the Azure portal.
- Identity, Authentication and Access
- In this lesson, we look at identities, roles and scopes within IAM to protect against breaches and achieve compliance. We will use Conditional Access Policy and Privileged Identity Management.
- Infrastructure and Network Security
- Security starts with strong barriers and walls. We will see how logical segmentation, tenants and subscriptions, resource groups help provide that security
- Data Security and Protection
- In this lesson, we discuss how we will protect the data itself. Key Vaults and encryption are two primary tools we have to help provide database protection.
- Protect and Monitor Cloud Resources
- In this lesson, we will explore how Security Center and Sentinel are complementary pieces to the security solution.
- Secure the Enterprise
- You are an Azure Cloud Architect for a business with a growing online presence and a desire to utilize the cloud for your IT enterprise. You have been asked to do ensure security for this transition.
Taught by
Edward Clausen