Udacity Logo
Log InSign Up

Azure Cloud Security

Course

In this course, we will explore IAM to help protect organizations against breaches and achieve compliance. We'll see how AD Connect lets you sync and manage cloud and on-premises identities. Always use Least Privilege to control access by leveraging conditional access and MFA. We will see how infrastructure and network design can use the Zero Trust model through tools such as Firewalls, Azure Bastion, and Just in Time. Learn what steps to take to secure data with secured keys. We will dive deep into Security Center to detect and fix top layer security vulnerabilities. Then we will dive deep into the SOAR and SIEM capabilities of Sentinel to identify deep threat detection and protection tool.

In this course, we will explore IAM to help protect organizations against breaches and achieve compliance. We'll see how AD Connect lets you sync and manage cloud and on-premises identities. Always use Least Privilege to control access by leveraging conditional access and MFA. We will see how infrastructure and network design can use the Zero Trust model through tools such as Firewalls, Azure Bastion, and Just in Time. Learn what steps to take to secure data with secured keys. We will dive deep into Security Center to detect and fix top layer security vulnerabilities. Then we will dive deep into the SOAR and SIEM capabilities of Sentinel to identify deep threat detection and protection tool.

Skills

Azure security center

Azure key vault

Azure defender

Privileged identity management

Built in collaboration with

Microsoft

Advanced

4 weeks

Real-world Projects

Completion Certificate

Last Updated May 8, 2023

Prerequisites:

VPN

Computer networking basics

Course Lessons

Lesson 1

Introduction to Security in Azure

In this lesson, we will look at the history behind cloud computing and Azure, the major stakeholders you will interact with, as well as the workspaces we use to provide access to the Azure portal.

Lesson 2

Identity, Authentication and Access

In this lesson, we look at identities, roles and scopes within IAM to protect against breaches and achieve compliance. We will use Conditional Access Policy and Privileged Identity Management.

Lesson 3

Infrastructure and Network Security

Security starts with strong barriers and walls. We will see how logical segmentation, tenants and subscriptions, resource groups help provide that security

Lesson 4

Data Security and Protection

In this lesson, we discuss how we will protect the data itself. Key Vaults and encryption are two primary tools we have to help provide database protection.

Lesson 5

Protect and Monitor Cloud Resources

In this lesson, we will explore how Security Center and Sentinel are complementary pieces to the security solution.

Lesson 6 • Project

Secure the Enterprise

You are an Azure Cloud Architect for a business with a growing online presence and a desire to utilize the cloud for your IT enterprise. You have been asked to do ensure security for this transition.

Taught By The Best

Photo of Edward Clausen

Edward Clausen

Lead Security Engineer - Azure

Edward started working in the Azure cloud space in its early days at Microsoft as a member of the team working on what became Microsoft 365. He has held many roles from Support, manager of a support team and is currently a Multi Cloud Engineer whose focus is on Azure Active Directory.

Taught By The Best

Photo of Edward Clausen

Edward Clausen

Lead Security Engineer - Azure

Edward started working in the Azure cloud space in its early days at Microsoft as a member of the team working on what became Microsoft 365. He has held many roles from Support, manager of a support team and is currently a Multi Cloud Engineer whose focus is on Azure Active Directory.

Get Started Today

Azure Cloud Security