Implementing Host Security
Configuring Container Security
The course is part of this learning path
This course focuses on implementing security controls, maintaining the security posture of an Azure environment, and protecting data, applications, and networks, showing you how to configure security for your containers and virtual machines.
The content of this course is ideally suited to those looking to become certified Azure security engineers.
For any feedback, queries, or suggestions relating to this course, please contact us at email@example.com.
- Understand how to configure VM security including VM endpoints and system updates
- Configure baselines
- Understand key Azure networking components
- Configure AKS security
- Obtain a basic understanding of Azure Container Registry and how to create registries in Azure
- Manage vulnerabilities in Azure
This course is intended for people who want to become Microsoft certified Azure security engineers, or those who are tasked with implementing security controls, maintaining the security posture of an Azure environment, or protecting data, applications, and networks.
To get the most from this course, you should have a moderate understanding of Microsoft Azure and of basic security principles.
Hi there. Welcome to Configuring Azure VM and Container Security. My name is Thomas Mitchell and I'll be leading you through this course.
I'm an Azure instructor at Cloud Academy and I have over 25 years of IT experience, several of those with cloud technologies. If you have any questions, feel free to connect with me on LinkedIn or send an email to firstname.lastname@example.org.
This course is intended for people who want to become Microsoft-certified Azure security engineers or those who are simply tasked with implementing security controls, maintaining the security posture of an Azure environment, or protecting data, applications, and networks. To get the most from this course, you should have a moderate understanding of Microsoft Azure and of basic security principles.
To kick things off, we're going to start with host security. We're going to dive into configuring endpoint security within VMs and how to harden VMs in Microsoft Azure. We'll also get into configuring system updates for VMs in Azure, as well as baseline configuration.
Next, we'll get into configuring container security. You'll learn how to configure networks, authentication, and container isolation. You'll also learn how to configure AKS security and how to configure container registry.
Lastly, you'll learn about vulnerability management tools and strategies.
By the time you finish this course, you should have a full understanding of how to configure Azure VM and container security.
We'd love to get your feedback on this course, so please give it a rating when you're finished.
If you're ready to learn how to configure Azure VM and container security, let's get started.
Configuring Endpoint Security within VMs - Configuring and Monitoring Antimalmare for VMs - Configuring Virtual Machine Security - Hardening Virtual Machines - Configuring System Updates for Virtual Machines - Starting a Runbook from the Azure Portal - Configuring Baselines - Azure Networking - Configuring Authentication - Container Isolation - AKS Security - Azure Container Registry - Creating a Container Registry - Implementing Vulnerability Management - Conclusion
About the Author
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.