Implementing Host Security
Configuring Container Security
The course is part of these learning paths
This course focuses on implementing security controls, maintaining the security posture of an Azure environment, and protecting data, applications, and networks, showing you how to configure security for your containers and virtual machines.
The content of this course is ideally suited to those looking to become certified Azure security engineers.
For any feedback, queries, or suggestions relating to this course, please contact us at firstname.lastname@example.org.
- Understand how to configure VM security including VM endpoints and system updates
- Configure baselines
- Understand key Azure networking components
- Configure AKS security
- Obtain a basic understanding of Azure Container Registry and how to create registries in Azure
- Manage vulnerabilities in Azure
This course is intended for people who want to become Microsoft certified Azure security engineers, or those who are tasked with implementing security controls, maintaining the security posture of an Azure environment, or protecting data, applications, and networks.
To get the most from this course, you should have a moderate understanding of Microsoft Azure and of basic security principles.
Welcome to Container Registry. This is going to be a rather brief lecture because all I want to do here is introduce you to Container Registry.
So what is an Azure Container Registry? Well, an Azure container registry is really just a managed, private Docker registry in Azure. It's based on the open-source Docker Registry 2.0. You use Azure container registries to store and manage private Docker container images along with related artifacts.
You can use Azure container registries with existing container development and deployment pipelines, or you can use Azure Container Registry Tasks to build container images in Azure.
You can pull images from an Azure container registry to various deployment targets, including orchestration systems like Kubernetes and Docker Swarm, and you can also pull images from the container registry to Azure services that help you build and run apps at scale. These services include Azure Kubernetes Service, App Service, Service Fabric, and several others.
In the upcoming demonstration, we'll create a container registry with the Azure portal.
Introduction - Configuring Endpoint Security within VMs - Configuring and Monitoring Antimalmare for VMs - Configuring Virtual Machine Security - Hardening Virtual Machines - Configuring System Updates for Virtual Machines - Starting a Runbook from the Azure Portal - Configuring Baselines - Azure Networking - Configuring Authentication - Container Isolation - AKS Security - Creating a Container Registry - Implementing Vulnerability Management - Conclusion
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.