Microsoft Azure Security Essentials

By Tia Williams

Insight into the trustworthy foundation provided by Azure with many configurable security options to best suit your organizational needs

8 hours
  • 50 Lessons
  • 2 Hands-On Labs

About the course

This course is designed to help you gain high-level knowledge on some of the important capabilities when securing the Azure platform.

We will cover Azure security concepts, terminology, and architecture. We will also look at security as it relates to identity, compute, networking, and other Azure resources.

The course is designed to provide insight into the trustworthy foundation provided by Azure with many configurable security options to best suit your organizational needs.

  • Chapter 1 2 Lessons Course Introduction 4:43

    An Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    What to Expect

    3:24
  • Chapter 2 2 Lessons Security in the Cloud 14:23

    Introduction into Azure Security

    4:22

    Shared Responsibilities

    10:01
  • Chapter 3 5 Lessons Transparency 35:03

    Securing Customer Data in Azure Services

    8:23

    Managing Data Location in Azure Services

    7:44

    Who Can Access Your Data and on What Terms?

    6:14

    Review Certification for Azure Services, Transparency Hub

    7:50

    Conclusion

    4:52
  • Chapter 4 4 Lessons Identity and Access Management 32:40

    Secure Identity

    10:33

    Secure Apps and Data

    8:02

    Role-Based Access Control (RBAC)

    7:32

    Conclusion

    6:33
  • Chapter 5 7 Lessons Operations 40:58

    Security and the Audit Dashboard

    7:07

    Application Insights

    3:08

    Azure Monitor

    5:29

    Azure Monitor Logs

    5:47

    Azure Advisor

    8:00

    Azure Security Center

    4:45

    Conclusion

    6:42
  • Chapter 6 7 Lessons Storage 1:18:35

    Shared Access Signature

    9:55

    Encryption in Transit

    2:39

    Encryption at Rest

    3:01

    Storage Analytics

    6:21

    Enabling Browser-Based Clients Using CORS

    8:33

    Conclusion

    3:06

    Configure Application Level Rules within Azure Firewall

    45:00 Hands-On Lab
  • Chapter 7 8 Lessons Networking 1:35:37

    Network Layer Controls

    6:10

    Network Security Groups (NSG)

    7:24

    Route Control and Forced Tunneling

    7:06

    Application Gateway

    4:04

    Web Application Firewall

    3:43

    Security Center

    16:22

    Conclusion

    5:48

    Creating Service Endpoints Between Virtual Machines and Blob Storage

    45:00 Hands-On Lab
  • Chapter 8 7 Lessons Compute 46:48

    Antimalware and Antivirus

    6:33

    Hardware Security Module

    13:42

    SQL VM TDE

    8:19

    VM Disk Encryption

    3:14

    Patch Updates

    3:13

    Security Policy and Management and Reporting

    7:01

    Conclusion

    4:46
  • Chapter 9 6 Lessons Secure Platform 25:51

    Security Development Cycle and Internal Audits

    8:35

    Mandatory Security Training and Background Checks

    2:05

    Penetration Testing, Intrusion Detection, DDoS, Audits, and Logging

    3:20

    State of the Art Data Centers, Physical Security, and Secure Networks

    4:03

    Security Incident Response and Shared Responsibility

    4:07

    Conclusion

    3:41
  • Chapter 10 2 Lessons Wrapping Up 5:58

    Additional Resources

    4:26

    What's Next?

    1:32

What you will need

  • Basic understanding of system, networking, and security experience preferred

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!