CloudAcademy
  1. Home
  2. Content Library
  3. Microsoft Azure
  4. Courses
  5. Microsoft Azure Security Solutions

Introduction

The course is part of these learning paths

Architecting Microsoft Azure Solutions: 70-535 Exam Preparation

course-steps 10 certification 5 lab-steps 5

Azure Services for Security Engineers

course-steps 3 lab-steps 3 quiz-steps 3

Developing, Implementing and Managing Azure Infrastructure

course-steps 10 certification 1 lab-steps 2

Implementing Microsoft Azure Solutions–70-533 Certification Preparation

course-steps 14 certification 1 lab-steps 8 quiz-steps 10

Developing Microsoft Azure Solutions–70-532 Certification Preparation

course-steps 9 certification 1 lab-steps 2 quiz-steps 8

Contents

keyboard_tab
Course Introduction
1
Introduction3m 20s
Azure Security Solutions
2
Shared Responsibility4m 27s
3
Protecting Accounts11m 27s
4
Securing the Azure Portal7m 53s
5
Identity Management for Apps12m 10s
6
Network Systems16m 57s
7
Data Security10m 19s
8
Secrets Management14m 31s
9
Monitoring and Auditing8m 41s
Course Conclusion
10
Conclusion1m 52s
play-arrow
Start course
Overview
Transcript
DifficultyIntermediate
Duration1h 32m
Students1086

Description

About This Course

Security is a critical concern for anyone who uses the cloud. Microsoft takes this seriously and built and operates the Azure Platform with security as a key principle. Microsoft secures data centers, and management applications; and provides pay-as-you-go security services. Learn how to take advantage of these security features and services to enable strong security practices in your organization and to protect and secure your own cloud applications.

This course is for security engineers, chief security officers, solution architects, information technologists or anyone wanting to understand security options within the Azure platform.
Viewers should have a basic understanding of cyber security, authentication and authorization best practices, and encryption. Some familiarity with the Azure platform will also be helpful but is not required.

Learning Objectives:

Understand the shared responsibility model
Learn how to secure Azure resources such as virtual machines and storage accounts
Learn how to secure your Azure-based applications
Learn how to monitor your Azure resources with Azure Security Center

Lessons:

Welcome and Introduction: A brief introduction to the course and an overview of what Bill and Maura will be covering.

Shared Responsibility: In this lesson we'll cover Cyber Security, using CIA Principle: Confidentiality – Integrity. Availability; what security professionals do to ensure the parts of CIA: Prevent – Detect – Respond.
Microsoft’s responsibilities and their own security/compliance processes. What a customer is responsible for. And finally the tools that Azure provides, including AAD, Encryption, secure networking

Protecting Accounts: In this lesson we'll cover Azure Active Directory, and Mult-Factor Authorization.

Securing the Azure Portal: In this lesson we'll cover role-based access control.

Indentity Management for Apps: In this lesson we'll cover AAD protection and integration for business Apps.

Network Security: In this lesson we'll cover Virtual Private Networks and firewalls.

Data Security: In this lesson we'll cover Encryption and Masking.

Secrets Management: In this lesson we'll cover Key Vault and Shared Access Signatures.

Monitoring and Audting: In this lesson we'll discuss the Azure Security Center.

Course Conclusion: Course Wrap-Up

About the Author

Bill Wilder is a hands-on architect currently focused on building cloud-native solutions on the Microsoft Azure cloud platform. Bill is CTO at Finomial which provides SaaS solutions to the global hedge fund industry from the cloud, co-founded Development Partners Software in 1999, and has broad industry experience with companies of all sizes – from modest startups to giant enterprises. Bill has been leading the Boston Azure group since founding it in 2009, has been recognized as a Microsoft MVP for Azure since 2010, and is author of Cloud Architecture Patterns (O’Reilly Media, 2012). He speaks frequently at community events, and occasionally at conferences, usually on topics relating to cloud, cybersecurity, and software architecture.