Implement virtual machine host security in Azure

Go to class
Write Review

Free Online Course: Implement virtual machine host security in Azure provided by Microsoft Learn is a comprehensive online course, which lasts for 6-7 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
    • By the end of this module, you'll be able to:

      • Develop a defense-in-depth approach to securing your architecture
      • Choose the technologies to secure your Azure infrastructure
      • Develop a strategy for secure identity management
    • Module 2: Create security baselines
    • In this module, you will:

      • Learn Azure platform security baselines and how they were created
      • Create and validate a security baseline for the most commonly used Azure services
    • Module 3: This module guides you through options for virtual machines in Azure, creating and connecting a Linux virtual machine, and configuring your network settings.
    • In this module, you will:

      • Understand the options that are available for virtual machines in Azure
      • Create a Linux virtual machine using the Azure portal
      • Connect to a running Linux virtual machine using SSH
      • Install software and change the network configuration on a VM using the Azure portal
    • Module 4: Learn to create an Azure virtual machine in minutes that can be used like a local physical desktop or server.
    • In this module, you will:

      • Create a Windows virtual machine using the Azure portal
      • Connect to a running Windows virtual machine using Remote Desktop
      • Install software and change the network configuration on a VM using the Azure portal
    • Module 5: Explore the options for Azure disk encryption to encrypt OS and data disks on existing and new virtual machines.
    • In this module, you will:

      • Determine which encryption method is best for your VM
      • Encrypt existing virtual machine disks using the Azure portal
      • Encrypt existing virtual machine disks using PowerShell
      • Modify Azure Resource Manager templates to automate disk encryption on new VMs
    • Module 6: Stop hackers from getting into your Windows and Linux servers. In this module, you’ll discover how to protect VMs and servers with Microsoft Defender for Cloud
    • In this module, you will:

      • Learn how to protect VM-based resources and networks with Microsoft Defender for Cloud
      • Install and use malware protection to stop virus attacks on your exposed endpoints

Syllabus
    • Module 1: Microsoft Azure Well-Architected Framework - Security
      • Introduction
      • Defense in depth
      • Identity management
      • Infrastructure protection
      • Encryption
      • Network security
      • Application security
      • Summary
    • Module 2: Create security baselines
      • Create a platform security baseline
      • Understand the Azure platform security baseline
      • Create an Identity & Access Management (IAM) baseline
      • Create a Microsoft Defender for Cloud baseline
      • Create an Azure storage accounts baseline
      • Create an Azure SQL Database baseline
      • Create a logging and monitoring baseline
      • Create a Networking baseline
      • Create an Azure VM baseline
      • Other baseline security considerations
      • Summary
    • Module 3: Create a Linux virtual machine in Azure
      • Introduction
      • Create a Linux virtual Machine in Azure
      • Exercise - Decide an authentication method for SSH
      • Exercise - Create a Linux virtual machine with the Azure portal
      • Azure virtual machines IP addresses and SSH options
      • Exercise - Connect to a Linux virtual machine with SSH
      • Network and security settings
      • Exercise - Configure network settings
      • Summary
    • Module 4: Create a Windows virtual machine in Azure
      • Introduction
      • Create a Windows virtual machine in Azure
      • Exercise - Create a Windows virtual machine
      • Use RDP to connect to Windows Azure virtual machines
      • Exercise - Connect to a Windows virtual machine using RDP
      • Configure Azure virtual machine network settings
      • Summary
    • Module 5: Secure your Azure virtual machine disks
      • Introduction
      • Encryption options for protecting Windows and Linux VMs
      • Encrypt existing VM disks
      • Exercise - Encrypt existing VM disks
      • Automate secure VM deployments by adding encryption to Azure Resource Manager templates
      • Exercise - Use a Resource Manager template to decrypt the VM
      • Knowledge check
      • Summary
    • Module 6: Protect your servers and VMs from brute-force and malware attacks with Microsoft Defender for Cloud
      • Introduction
      • Protect virtual machines with JIT VM access
      • Exercise - Enable JIT VM access
      • Understand the malware threat
      • Exercise - Configure malware detection
      • Summary