Start course

This course introduces you to container security, Azure Container Registry authentication, Kubernetes clusters, and Microsoft Defender for Containers.

Learning Objectives

  • A solid understanding of what options are available for securing your containerized applications in Azure and how to protect them from emerging threats

Intended Audience

  • Developers, IT professionals, and security experts who are looking to understand the different ways to secure their containerized applications in Azure


  • Basic understanding of Containerized computing in Azure

Congratulations! You’ve come to the end of the course! Let’s review what you’ve learned. Throughout this course, we delved into the different aspects of container security, starting with configuring security for Azure Container Instances. 

We also covered enabling Azure Container Registry authentication, where we discussed the different authentication options available. We then discussed how to secure Kubernetes clusters. We also covered how to integrate authentication to AKS with Azure AD, how to integrate Azure Active Directory with AKS clusters, and how to use role-based access control to secure access to your Kubernetes resources. 

Finally, we explored Microsoft Defender for Containers. At this point, you should have a solid understanding of how to secure your containerized applications in Azure and how to protect them from emerging threats. 

To learn more about securing containers in Azure, you can, and should, read Microsoft’s published documentation. You should also keep an eye out for new courses on Cloud Academy because we’re always publishing new ones. 

Be sure to give this course a rating, and if you have any questions or comments, please let us know. As always, thanks for watching, and happy learning!

About the Author
Learning Paths

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.

Covered Topics