Microsoft Azure is a robust, feature-rich cloud platform used by a growing number of technology companies. With its vast array of services, a key challenge to administering an Azure environment is security. How can we ensure that our Azure infrastructure meets strict security standards? This course offers the answer.
In three concise units, the student will learn all about compliance and cloud security. The course delves into several key Azure components, including Azure DevOps, Azure Security Center, Desired State Configuration, and Azure Pipelines. After completing the lessons and watching the video demonstrations, the student will be equipped with the knowledge to automate critical security tasks to ensure a thoroughly hardened cloud architecture.
This skill set will serve infrastructure developers working with live environments or seeking to pass certification exams. Most importantly, it will help students understand cloud security in a comprehensive and thorough way.
For feedback, queries, or suggestions relating to this course, please contact us at email@example.com.
- Scan infrastructure using Azure tools to prevent drift leading to compliance violations
- Automate configuration using Azure Automation and Desired State Configuration
- Create secure and compliant software pipelines in Azure
This course is intended for:
- Those looking to learn more about the security and compliance features in Azure
- People studying for Microsoft's AZ-400 exam
To get the most from this course, you should already have a basic understanding of Microsoft Azure as well as some knowledge of programming and cloud infrastructure.
Congratulations, you've done it. You've really done it. You have made it to the end of Cloud Academy's course on Azure Infrastructure Compliance and Security. Nice job.
Before we pop the champagne though, let's take a moment to briefly review our learning objectives. There were three. First, we taught you how to scan infrastructure and prevent drift leading to compliance violations. That was in section one where we went over Azure Security Center in detail and showed off some other management tools. Secondly, we taught you how to automate configuration management. Tools are great, but even greater is getting them to work on their own. In section two, we showed you how to do that with Azure Automation State Configuration, DSC, and VM agents in custom scripts. Finally, we showed how to create secured software pipelines. This is really the end goal of our compliance work, getting to a point where end-to-end we have full assurance that our system is up to strict standards. Section three covered that.
You should now be more confident taking responsibility for compliance in an Azure cloud environment. With this skill set, you can help teams get peace of mind about whether or not their Azure infrastructure meets the highest standards for security. Where you go from here is up to you. We wish luck to those of you going on to take certification exams or continue their studies or pursue work on a software team.
Lastly, once again, I'd really like to invite folks to send us feedback about the course. We are always looking to improve any way we can. We thank all of our students, past, present, and future for helping us to get better. Thanks again, and good luck, and congratulations!
Course Introduction - Compliance & Security Scanning - Security Center Demo - Preventing Drift - ARM, Activity Log & Track Changes Demo - Desired State Configuration (DSC) - Azure Desired State Configuration Demo - Azure Automation State Configuration - VM Agents & Extensions - VM Agents & Extensions Demo - Security & Compliance Pipelines - Azure Pipelines & Gates Demo
Jonathan Bethune is a senior technical consultant working with several companies including TopTal, BCG, and Instaclustr. He is an experienced devops specialist, data engineer, and software developer. Jonathan has spent years mastering the art of system automation with a variety of different cloud providers and tools. Before he became an engineer, Jonathan was a musician and teacher in New York City. Jonathan is based in Tokyo where he continues to work in technology and write for various publications in his free time.