The course is part of these learning paths
This course introduces you to container security, Azure Container Registry authentication, Kubernetes clusters, and Microsoft Defender for Containers.
Learning Objectives
- A solid understanding of what options are available for securing your containerized applications in Azure and how to protect them from emerging threats
Intended Audience
- Developers, IT professionals, and security experts who are looking to understand the different ways to secure their containerized applications in Azure
Prerequisites
- Basic understanding of Containerized computing in Azure
Welcome to Container Security in Azure.
My name is Thomas Mitchell and I’ll be taking you through this course.
I’m an Azure instructor at Cloud Academy and I have over 25 years of IT experience, several of those with cloud technologies. If you have any questions about this course, feel free to connect with me on LinkedIn, or send an email to support@cloudacademy.com.
This course is designed for developers, IT professionals, and security experts who are looking to understand the different ways to secure their containerized applications in Azure. Throughout this course, you’ll be introduced to the different ways you can secure containers, starting with configuring security for Azure Container Instances.
We will also cover enabling Azure Container Registry authentication, where we will discuss the different authentication options available. We will then move on to securing Kubernetes clusters.
In addition, we will cover integrating authentication to AKS with Azure AD, and how to use role-based access controls to secure access to your Kubernetes resources. Finally, we will explore Microsoft Defender for Containers, which is a security solution that helps you protect your containerized applications from emerging threats by providing continuous security, vulnerability management, and threat protection.
By the end of this course, you will have a solid understanding what options are available for securing your containerized applications in Azure and how to protect them from emerging threats. We’d love to get your feedback on this course, so please give it a rating when you’re finished.
If you’re ready to learn about Container Security in Azure, let’s get started!
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.