- Duration: 10 weeks
1. Secure Azure solutions with Azure Active Directory
Explore how to securely configure and administer your Azure Active Directory instance.
Click here to know more
2. Implement Hybrid identity
Explore how to deploy and configure Azure AD Connect to create a hybrid identity solution for your company.
Click here to know more
3. Deploy Azure AD identity protection
Protect identities in Azure AD using Conditional Access, MFA, access reviews, and other capabilities.
Click here to know more
4. Configure Azure AD privileged identity management
Ensure that your privileged identities have extra protection and are accessed only with the least amount of access needed to do the job.
Click here to know more
5. Design an enterprise governance strategy
Learn to use RBAC and Azure Policy to limit access to your Azure solutions, and determine which method is right for your security goals.
Click here to know more
6. Implement perimeter security
Prevent attacks before they get to your Azure solutions. Use the concepts of defense in depth and zero trust to secure Azure perimeter.
Click here to know more
7. Configure network security
Use Azure network capabilities to secure your network and applications from external and internal attacks.
Click here to know more
8. Configure and manage host security
Learn to lock down the devices, virtual machines, and other components that run your applications in Azure.
Click here to know more
9. Enable Containers security
Explore how to secure your applications running within containers and how to securely connect to them.
Click here to know more
10. Deploy and secure Azure Key Vault
Protect your keys, certificates, and secrets in Azure Key Vault. Learn to configure key vault for the most secure deployment.
Click here to know more
11. Configure application security features
Register your company applications then use Azure security features to configure and monitor secure access to the application.
Click here to know more
12. Implement storage security
Ensure your data is stored, transferred, and accessed in a secure way using Azure storage and file security features.
Click here to know more
13. Configure and manage SQL database security
Configure and lock down your SQL database on Azure to protect your corporate data while it is stored.
Click here to know more
14. Configure and manage Azure Monitor
Use Azure Monitor, Log Analytics, and other Azure tools to monitor the secure operation of your Azure solutions.
Click here to know more
15. Enable and manage Microsoft Defender for Cloud
Use Azure Security Center, Azure Defender, and Secure Score to track and improve your security posture in Azure.
Click here to know more
16. Configure and monitor Microsoft Sentinel
Use Azure Sentinel to discover, track, and respond to security breaches within your Azure environment.
Click here to know more
Leave feedback about this
You must be logged in to post a comment.