Lesson 1
Introduction to Security in Azure
In this lesson, we will look at the history behind cloud computing and Azure, the major stakeholders you will interact with, as well as the workspaces we use to provide access to the Azure portal.
Course
In this course, we will explore IAM to help protect organizations against breaches and achieve compliance. We'll see how AD Connect lets you sync and manage cloud and on-premises identities. Always use Least Privilege to control access by leveraging conditional access and MFA. We will see how infrastructure and network design can use the Zero Trust model through tools such as Firewalls, Azure Bastion, and Just in Time. Learn what steps to take to secure data with secured keys. We will dive deep into Security Center to detect and fix top layer security vulnerabilities. Then we will dive deep into the SOAR and SIEM capabilities of Sentinel to identify deep threat detection and protection tool.
In this course, we will explore IAM to help protect organizations against breaches and achieve compliance. We'll see how AD Connect lets you sync and manage cloud and on-premises identities. Always use Least Privilege to control access by leveraging conditional access and MFA. We will see how infrastructure and network design can use the Zero Trust model through tools such as Firewalls, Azure Bastion, and Just in Time. Learn what steps to take to secure data with secured keys. We will dive deep into Security Center to detect and fix top layer security vulnerabilities. Then we will dive deep into the SOAR and SIEM capabilities of Sentinel to identify deep threat detection and protection tool.
Built in collaboration with
Microsoft
Advanced
4 weeks
Real-world Projects
Completion Certificate
Last Updated November 6, 2023
Lesson 1
In this lesson, we will look at the history behind cloud computing and Azure, the major stakeholders you will interact with, as well as the workspaces we use to provide access to the Azure portal.
Lesson 2
In this lesson, we look at identities, roles and scopes within IAM to protect against breaches and achieve compliance. We will use Conditional Access Policy and Privileged Identity Management.
Lesson 3
Security starts with strong barriers and walls. We will see how logical segmentation, tenants and subscriptions, resource groups help provide that security
Lesson 4
In this lesson, we discuss how we will protect the data itself. Key Vaults and encryption are two primary tools we have to help provide database protection.
Lesson 5
In this lesson, we will explore how Security Center and Sentinel are complementary pieces to the security solution.
Lesson 6 • Project
You are an Azure Cloud Architect for a business with a growing online presence and a desire to utilize the cloud for your IT enterprise. You have been asked to do ensure security for this transition.
Lead Security Engineer - Azure
Edward started working in the Azure cloud space in its early days at Microsoft as a member of the team working on what became Microsoft 365. He has held many roles from Support, manager of a support team and is currently a Multi Cloud Engineer whose focus is on Azure Active Directory.
Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.
Demonstrate proficiency with practical projects
Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.
Gain proven experience
Retain knowledge longer
Apply new skills immediately
Top-tier services to ensure learner success
Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.
Get help from subject matter experts
Learn industry best practices
Gain valuable insights and improve your skills
Unlimited access to our top-rated courses
Real-world projects
Personalized project reviews
Program certificates
Proven career outcomes
Full Catalog Access
One subscription opens up this course and our entire catalog of projects and skills.
Average time to complete a Nanodegree program
4 weeks
, Intermediate
(4)
3 months
, Advanced
(34)
4 months
, Intermediate
(62)
3 months
, Intermediate
4 weeks
, Beginner
4 weeks
, Intermediate
4 weeks
, Beginner
4 weeks
, Intermediate
4 weeks
, Advanced
(2)
4 months
, Advanced
4 weeks
, Intermediate
1 week
, Advanced
(174)
2 months
, Advanced
(9)
4 months
, Intermediate
(67)
3 months
, Intermediate
4 weeks
, Intermediate
Azure Cloud Security
4 weeks
, Intermediate
(4)
3 months
, Advanced
(34)
4 months
, Intermediate
(62)
3 months
, Intermediate
4 weeks
, Beginner
4 weeks
, Intermediate
4 weeks
, Beginner
4 weeks
, Intermediate
4 weeks
, Advanced
(2)
4 months
, Advanced
4 weeks
, Intermediate
1 week
, Advanced
(174)
2 months
, Advanced
(9)
4 months
, Intermediate
(67)
3 months
, Intermediate
4 weeks
, Intermediate