1. Home
  2. Training Library
  3. Microsoft Azure
  4. Courses
  5. Configuring Azure VM and Container Security

Container Isolation

play-arrow
Start course
Overview
DifficultyIntermediate
Duration1h
Students536
Ratings
4.3/5
starstarstarstarstar-half

Description

This course focuses on implementing security controls, maintaining the security posture of an Azure environment, and protecting data, applications, and networks, showing you how to configure security for your containers and virtual machines.

The content of this course is ideally suited to those looking to become certified Azure security engineers.

For any feedback, queries, or suggestions relating to this course, please contact us at support@cloudacademy.com.

Learning Objectives

  • Understand how to configure VM security including VM endpoints and system updates
  • Configure baselines
  • Understand key Azure networking components
  • Configure AKS security
  • Obtain a basic understanding of Azure Container Registry and how to create registries in Azure
  • Manage vulnerabilities in Azure

Intended Audience

This course is intended for people who want to become Microsoft certified Azure security engineers, or those who are tasked with implementing security controls, maintaining the security posture of an Azure environment, or protecting data, applications, and networks.

Prerequisites

To get the most from this course, you should have a moderate understanding of Microsoft Azure and of basic security principles.

Transcript

Hi, everyone, welcome to container isolation. Azure Container Instances, also known as ACI, provide the easiest way to deploy containers in Azure without worrying about any higher level service overhead. This is because you can deploy independent containers without the need to manage any backend virtual machines.

Container instances are, inherently, deployed securely. This ensures that a deployed application runs in isolation, much like it would if it was run on an Azure virtual machine.

Because the Azure Container Instances service is a deep security model, each individual container that's deployed is isolated at the hypervisor level. This offers a much stronger security boundary for multi-tenant scenarios. The ability to enable this type of isolation without the need for a separate hosting cluster makes Azure Container Instances a true cloud-native model.

Lectures

Introduction - Configuring Endpoint Security within VMs - Configuring and Monitoring Antimalmare for VMs - Configuring Virtual Machine Security - Hardening Virtual Machines - Configuring System Updates for Virtual Machines - Starting a Runbook from the Azure Portal - Configuring Baselines - Azure Networking - Configuring Authentication - AKS Security - Azure Container Registry - Creating a Container Registry - Implementing Vulnerability Management - Conclusion

About the Author
Students21474
Courses37
Learning paths8

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.