1. Home
  2. Training Library
  3. Microsoft Azure
  4. Courses
  5. Managing Azure Data Protection and Security Compliance

Creating and Importing Encryption Keys

play-arrow
Start course
Overview
DifficultyBeginner
Duration1h 12m
Students704

Description

Overview

As companies race toward the cloud, it’s imperative that IT professionals keep up with the times. Keeping up with the times means maintaining the ability to deploy and maintain cloud-based solutions – particularly those offered through Microsoft Azure.

In this course, you will learn how to create and manage encryption keys in Azure, prevent and respond to security threats to Azure resources, configure access to Azure applications via single sign-on, manage access to Azure applications, and configure federation with public consumer identity providers like Facebook and Google. 

Learning Objectives

  • Create and import keys in the Azure Key Vault
  • Define, configure, and assess security policies
  • Harden Azure resources against threats
  • Configure single sign-on for SaaS applications
  • Configure federation with public consumer identity providers like Facebook and Google

 Intended Audience

  • People interested in becoming Azure security engineers 

Prerequisites 

  • General knowledge of IT infrastructure
  • General knowledge of the Azure environment

 

 

 

 

Transcript

- The Azure Key Vault protects cryptographic keys and secrets that are used by cloud applications and cloud services. With the Key Vault, you can encrypt keys and secrets with HSM-protected keys. HSM, by the way, stands for hardware security modules. Keys and secrets that you can encrypt with the Key Vault include such items as storage account keys, data encryption keys, .PFX files, authentication keys, and even passwords. Leveraging Key Vault allows you to streamline the key management process, allowing you to maintain control of keys that are used to access and encrypt your data. Developers and resource owners can create specific keys for access to development environments within minutes. As a matter of fact, the keys created for development can then be seamlessly migrated to production keys, if necessary. Security administrators, of course, can control access to keys by granting and revoking permissions to them. Keys in the Azure Key Vault can be used for signing and verifying data, protecting other keys, and for encrypting and decrypting data.

About the Author

Students2136
Courses10

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.