1. Home
  2. Training Library
  3. Microsoft Azure
  4. Courses
  5. Configuring Azure VM and Container Security

Conclusion

play-arrow
Start course
Overview
DifficultyIntermediate
Duration1h
Students524
Ratings
4.3/5
starstarstarstarstar-half

Description

This course focuses on implementing security controls, maintaining the security posture of an Azure environment, and protecting data, applications, and networks, showing you how to configure security for your containers and virtual machines.

The content of this course is ideally suited to those looking to become certified Azure security engineers.

For any feedback, queries, or suggestions relating to this course, please contact us at support@cloudacademy.com.

Learning Objectives

  • Understand how to configure VM security including VM endpoints and system updates
  • Configure baselines
  • Understand key Azure networking components
  • Configure AKS security
  • Obtain a basic understanding of Azure Container Registry and how to create registries in Azure
  • Manage vulnerabilities in Azure

Intended Audience

This course is intended for people who want to become Microsoft certified Azure security engineers, or those who are tasked with implementing security controls, maintaining the security posture of an Azure environment, or protecting data, applications, and networks.

Prerequisites

To get the most from this course, you should have a moderate understanding of Microsoft Azure and of basic security principles.

Transcript

Congratulations! You've reached the end of Configuring Azure VM and Container Security. Let's review what you've learned. We kicked things off with host security. Throughout the early part of this course, you learned about configuring endpoint security within VMs and how to harden VMs in Azure. You also learned how to configure system updates for VMs in Azure as well as how to configure baselines. As we moved through this course, you learned about container security. You learned how to configure networks, authentication and container isolation. You also learned how to configure AKS security and how to configure container registry. Rounding things out, you learned about vulnerability management tools and strategies.

So now that you've been through this course, you should have a full understanding of how to configure Azure VM and container security. We'd love to get your feedback on this course, so please give it a rating. As always, thanks for watching and happy learning.

Lectures

Introduction - Configuring Endpoint Security within VMs - Configuring and Monitoring Antimalmare for VMs - Configuring Virtual Machine Security - Hardening Virtual Machines - Configuring System Updates for Virtual Machines - Starting a Runbook from the Azure Portal - Configuring Baselines - Azure Networking - Configuring Authentication - Container Isolation - AKS Security - Azure Container Registry - Creating a Container Registry - Implementing Vulnerability Management

About the Author
Students21206
Courses37
Learning paths8

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.