Manage security operations in Azure

Go to class
Write Review

Free Online Course: Manage security operations in Azure provided by Microsoft Learn is a comprehensive online course, which lasts for 6 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Learn how Azure can help you protect the workloads that you run both in the cloud and in your on-premises datacenter. Prepare for AZ-900.
    • After completing this module, you'll be able to:

      • Strengthen your security posture and protect against threats by using Azure Security Center.
      • Collect and act on security data from many different sources by using Azure Sentinel.
      • Store and access sensitive information such as passwords and encryption keys securely in Azure Key Vault.
      • Manage dedicated physical servers to host your Azure VMs for Windows and Linux by using Azure Dedicated Host.
    • Module 2: Create security baselines
    • In this module, you will:

      • Learn Azure platform security baselines and how they were created
      • Create and validate a security baseline for the most commonly used Azure services
    • Module 3: Master securing your Azure workloads with Microsoft Defender for Cloud. In this module, you’ll discover how to detect and respond to threats with Microsoft Defender for Cloud.
    • In this module, you will:

      • Configure Microsoft Defender for Cloud to monitor your Azure resources
      • Use the workload protection dashboard to identify potential security issues
      • Analyze the recommendations made by Defender for Cloud
    • Module 4: In this module, you’ll use the alert capabilities of Microsoft Defender for Cloud to watch for and respond to threats.
    • In this module, you will:

      • View security alerts in Microsoft Defender for Cloud
      • Define an incident response plan
      • Use a Workflow automation to automate a security response
    • Module 5: Stop hackers from getting into your Windows and Linux servers. In this module, you’ll discover how to protect VMs and servers with Microsoft Defender for Cloud
    • In this module, you will:

      • Learn how to protect VM-based resources and networks with Microsoft Defender for Cloud
      • Install and use malware protection to stop virus attacks on your exposed endpoints
    • Module 6: Use Azure Monitor logs to extract valuable information about your infrastructure from log data.
    • In this module, you will:

      • Identify the features and capabilities of Azure Monitor logs
      • Create basic Azure Monitor log queries to extract information from log data
    • Module 7: Respond to incidents and activities in your infrastructure through alerting capabilities in Azure Monitor.
    • In this module, you will:

      • Configure alerts on events in your Azure resources based on metrics, log events, and Activity log events
      • Learn how to use smart groups to identify and group related alerts to reduce alert noise
    • Module 8: Learn about how to capture trace output from your Azure web apps. View a live log stream and download logs files for offline analysis.
    • In this module, you will:

      • Enable application logging on an Azure Web App
      • View live application logging activity with the log streaming service
      • Retrieve application log files from an application with Kudu or the Azure CLI

Syllabus
    • Module 1: Protect against security threats on Azure
      • Introduction
      • Protect against security threats by using Azure Security Center
      • Detect and respond to security threats by using Azure Sentinel
      • Store and manage secrets by using Azure Key Vault
      • Exercise - Manage a password in Azure Key Vault
      • Host your Azure virtual machines on dedicated physical servers by using Azure Dedicated Host
      • Knowledge check
      • Summary
    • Module 2: Create security baselines
      • Create a platform security baseline
      • Understand the Azure platform security baseline
      • Create an Identity & Access Management (IAM) baseline
      • Create a Microsoft Defender for Cloud baseline
      • Create an Azure storage accounts baseline
      • Create an Azure SQL Database baseline
      • Create a logging and monitoring baseline
      • Create a Networking baseline
      • Create an Azure VM baseline
      • Other baseline security considerations
      • Summary
    • Module 3: Identify security threats with Microsoft Defender for Cloud
      • Introduction
      • Explore the Microsoft Defender for Cloud service tiers
      • Customize Microsoft Defender for Cloud options
      • Centralized policy management with Microsoft Defender for Cloud
      • Monitor your security status with Defender for Cloud recommendations
      • Knowledge check
      • Summary
    • Module 4: Resolve security threats with Microsoft Defender for Cloud
      • Introduction
      • View security alerts
      • Respond to alerts
      • Define a security incident response plan
      • Use a workflow automation to automate responses
      • Exercise - Configure a Playbook for a security event
      • Summary
    • Module 5: Protect your servers and VMs from brute-force and malware attacks with Microsoft Defender for Cloud
      • Introduction
      • Protect virtual machines with JIT VM access
      • Exercise - Enable JIT VM access
      • Understand the malware threat
      • Exercise - Configure malware detection
      • Summary
    • Module 6: Analyze your Azure infrastructure by using Azure Monitor logs
      • Introduction
      • Features of Azure Monitor logs
      • Create basic Azure Monitor log queries to extract information from log data
      • Exercise - Create basic Azure Monitor log queries to extract information from log data
      • Summary
    • Module 7: Improve incident response with alerting on Azure
      • Introduction
      • Explore the different alert types that Azure Monitor supports
      • Use metric alerts for alerts about performance issues in your Azure environment
      • Exercise - Use metric alerts to alert on performance issues in your Azure environment
      • Use log alerts to alert on events in your application
      • Use activity log alerts to alert on events within your Azure infrastructure
      • Exercise - Use activity log alerts to alert on events within your Azure infrastructure
      • Use smart groups to reduce alert noise in Azure Monitor
      • Summary
    • Module 8: Capture Web Application Logs with App Service Diagnostics Logging
      • Introduction
      • Enable and configure App Service application logging
      • Exercise - Enable and configure App Service application logging using the Azure portal
      • View live application logging with the log streaming service
      • Exercise - View live application logging with the log streaming service using Azure CLI
      • Retrieve application log files
      • Exercise - Retrieve Application Log Files using Azure CLI and Kudu
      • Summary