Agenda
- Azure resource group
- Azure Virtual Network
- How network security groups filter network traffic
- Application security groups
- Defender for Cloud monitoring components
- Implement Microsoft Defender for Cloud
- Security posture
- Workload protections
- Deploy Microsoft Defender for Cloud
- Azure Arc
- Azure Arc capabilities
- Microsoft cloud security benchmark
- Improve your regulatory compliance.
- Configure Microsoft Defender for Cloud policies
- View and edit security policies
- Manage and implement Microsoft Defender for Cloud recommendations
- Explore secure score
- MITRE Attack matrix
- Define brute force attacks
- Understand just-in-time VM access
- Implement just-in-time VM access
- Collect data from your workloads with the Log Analytics agent
- Configure the Log Analytics agent and workspace
- Azure Key Vault basic concepts
- Best practices for Azure Key Vault
- Azure Key Vault security
- Configure Azure Key Vault firewalls and virtual networks
- Azure Key Vault soft delete overview
- Virtual network service endpoints for Azure Key Vault
- Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal
FREE
Interested in course?
Course Type: Instructor Led