Course Outline
Module 1: Manage Identity and Access
This module addresses Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.
Lessons
- Azure Active Directory
- Azure Identity Protection
- Enterprise Governance
- Azure AD Privileged Identity Management
- Hybrid Identity
Lab : Role-Based Access Control
Lab : Azure Policy
Lab : Resource Manager Locks
Lab : MFA, Conditional Access and AAD Identity Protection
Lab : Azure AD Privileged Identity Management
Lab : Implement Directory Synchronization
After completing this module, students will be able to:
- Implement enterprise governance strategies, including role-based access control, Azure policies, and resource locks.
- Deploy an Azure AD infrastructure comprising users, groups, and multi-factor authentication.
- Configure Azure AD Identity Protection, including risk policies, conditional access, and access reviews.
- Set up Azure AD Privileged Identity Management for Azure AD roles and Azure resources.
- Implement Azure AD Connect, covering authentication methods and on-premises directory synchronization.
Module 2: Implement Platform Protection
This module covers perimeter, network, host, and container security.
Lessons
- Perimeter Security
- Network Security
- Host Security
- Container Security
Lab : Network Security Groups and Application Security Groups
Lab : Azure Firewall
Lab : Configuring and Securing ACR and AKS
After completing this module, students will be able to:
- Deploy perimeter security strategies, such as Azure Firewall.
- Establish network security strategies, including Network Security Groups and Application Security Groups.
- Enforce host security strategies, including endpoint protection, remote access management, update management, and disk encryption.
- Secure container environments, including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
Module 3: Secure Data and Applications
This module covers Azure Key Vault, application security, storage security, and SQL database security.
Lessons
- Azure Key Vault
- Application Security
- Storage Security
- SQL Database Security
Lab : Key Vault (Implementing Secure Data by setting up Always Encrypted)
Lab : Securing Azure SQL Database
Lab : Service Endpoints and Securing Storage
After completing this module, students will be able to:
- Utilize Azure Key Vault for managing certificates, keys, and secrets.
- Implement application security strategies, including app registration, managed identities, and service endpoints.
- Secure storage using shared access signatures, blob retention policies, and Azure Files authentication.
- Secure databases through authentication, data classification, dynamic data masking, and Always Encrypted.
Module 4: Manage Security Operations
This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.
Lessons
- Azure Monitor
- Azure Security Center
- Azure Sentinel
Lab : Azure Monitor
Lab : Azure Security Center
Lab : Azure Sentinel
After completing this module, students will be able to:
- Deploy Azure Monitor for connected sources, log analytics, and alerts.
- Configure Azure Security Center with policies, recommendations, and just-in-time virtual machine access.
- Set up Azure Sentinel, including workbooks, incidents, and playbooks.
Requirements
Successful learners should possess prior knowledge and understanding of:
- Security best practices and industry security requirements, such as defense in depth, least privilege access, role-based access control, multi-factor authentication, shared responsibility, and the zero trust model.
- Security protocols, including Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), and disk and data encryption methods.
- Some experience in deploying Azure workloads. This course does not cover the basics of Azure administration; rather, it builds upon that existing knowledge by adding security-specific information.
- Experience with Windows and Linux operating systems and scripting languages. Course labs may utilize PowerShell and the CLI.
Testimonials (1)
Everything, is a new platform for me and everything was interesting.