Lesson 1
Introduction to Security in Azure
In this lesson, we will look at the history behind cloud computing and Azure, the major stakeholders you will interact with, as well as the workspaces we use to provide access to the Azure portal.
Course
In this course, we will explore IAM to help protect organizations against breaches and achieve compliance. We'll see how AD Connect lets you sync and manage cloud and on-premises identities. Always use Least Privilege to control access by leveraging conditional access and MFA. We will see how infrastructure and network design can use the Zero Trust model through tools such as Firewalls, Azure Bastion, and Just in Time. Learn what steps to take to secure data with secured keys. We will dive deep into Security Center to detect and fix top layer security vulnerabilities. Then we will dive deep into the SOAR and SIEM capabilities of Sentinel to identify deep threat detection and protection tool.
In this course, we will explore IAM to help protect organizations against breaches and achieve compliance. We'll see how AD Connect lets you sync and manage cloud and on-premises identities. Always use Least Privilege to control access by leveraging conditional access and MFA. We will see how infrastructure and network design can use the Zero Trust model through tools such as Firewalls, Azure Bastion, and Just in Time. Learn what steps to take to secure data with secured keys. We will dive deep into Security Center to detect and fix top layer security vulnerabilities. Then we will dive deep into the SOAR and SIEM capabilities of Sentinel to identify deep threat detection and protection tool.
Azure security center
Azure key vault
Azure defender
Privileged identity management
Built in collaboration with
Microsoft
Advanced
4 weeks
Real-world Projects
Completion Certificate
Last Updated May 8, 2023
VPN
Computer networking basics
Lesson 1
Introduction to Security in Azure
In this lesson, we will look at the history behind cloud computing and Azure, the major stakeholders you will interact with, as well as the workspaces we use to provide access to the Azure portal.
Lesson 2
Identity, Authentication and Access
In this lesson, we look at identities, roles and scopes within IAM to protect against breaches and achieve compliance. We will use Conditional Access Policy and Privileged Identity Management.
Lesson 3
Infrastructure and Network Security
Security starts with strong barriers and walls. We will see how logical segmentation, tenants and subscriptions, resource groups help provide that security
Lesson 4
Data Security and Protection
In this lesson, we discuss how we will protect the data itself. Key Vaults and encryption are two primary tools we have to help provide database protection.
Lesson 5
Protect and Monitor Cloud Resources
In this lesson, we will explore how Security Center and Sentinel are complementary pieces to the security solution.
Lesson 6 • Project
Secure the Enterprise
You are an Azure Cloud Architect for a business with a growing online presence and a desire to utilize the cloud for your IT enterprise. You have been asked to do ensure security for this transition.
Edward Clausen
Lead Security Engineer - Azure
Edward started working in the Azure cloud space in its early days at Microsoft as a member of the team working on what became Microsoft 365. He has held many roles from Support, manager of a support team and is currently a Multi Cloud Engineer whose focus is on Azure Active Directory.
Edward Clausen
Lead Security Engineer - Azure
Edward started working in the Azure cloud space in its early days at Microsoft as a member of the team working on what became Microsoft 365. He has held many roles from Support, manager of a support team and is currently a Multi Cloud Engineer whose focus is on Azure Active Directory.
Get Started Today