Using Network Isolation to Secure Azure Data looks at how to network components like firewalls, network security groups, and endpoints to enhance the protection of Azure data sources. This course focuses on the special case of Azure data resources delivered as platform-as-a-service, such as Azure SQL, storage accounts, Azure Cosmos DB, and the like. Unlike data sources hosted on a virtual machine or an Azure SQL Managed Instance, which are deployed within a virtual network, PaaS data sources appear to transcend network topology by not operating within a network.
- Overview of Azure networking elements
- Learn how network traffic flows to Azure data services
- Secure Azure data services with endpoints
- Students who want to learn how to use Azure networking elements to further secure Azure data resources
- Students preparing for the AZ-500: Microsoft Azure Security Technologies exam
- Be familiar with Active networking concepts such as virtual networks, subnets, firewalls, network security groups, and endpoints
- It is recommended to have viewed Implementing Azure Network Security prior to taking this course
Hi, and welcome to this Using Network Isolation to Secure Azure Data course. My Name is Hallam Webber, and I'm an Azure instructor with 25-plus years of experience in the IT industry, and since 2014 I've focused on Microsoft Azure cloud technologies.
This course has been designed for students who want to learn how to use Azure networking elements to further secure Azure data resources. The information presented in this course will be helpful to students preparing for the AZ-500: Microsoft Azure Security Technologies exam.
This course will begin with an overview of Azure networking elements, with special attention paid to security components. We then see how these components can be used to secure Azure data services. This course focuses on platform-as-a-service data, which involves added complexity compared with, say, SQL Server running on a virtual machine.
This is an intermediate-level course where we’ll be extensively referencing Azure networking components. While we start with an overview and refresher of networking, it’s assumed that you’re familiar with these components. If you haven’t already viewed Implementing Azure Network Security, I recommend watching it first.
When I created this course, all information was current. If you have any feedback, positive or negative, or if you notice anything that needs to be updated or corrected, please reach out to us at firstname.lastname@example.org.
Let’s jump into securing Azure data with network isolation.
Hallam is a software architect with over 20 years experience across a wide range of industries. He began his software career as a Delphi/Interbase disciple but changed his allegiance to Microsoft with its deep and broad ecosystem. While Hallam has designed and crafted custom software utilizing web, mobile and desktop technologies, good quality reliable data is the key to a successful solution. The challenge of quickly turning data into useful information for digestion by humans and machines has led Hallam to specialize in database design and process automation. Showing customers how leverage new technology to change and improve their business processes is one of the key drivers keeping Hallam coming back to the keyboard.