role-iq-logo
Rock [Azure]
See all Azure roles

Microsoft Azure Security - Getting Started

Your business may depend on avoiding data breaches in your Microsoft Azure deployments. In this course, you'll learn how to secure your Azure Resource Manager (ARM) deployments according to Microsoft's best practices and architectural patterns.
Course info
Rating
(33)
Level
Intermediate
Updated
Mar 28, 2018
Duration
1h 35m
Table of contents
Description
Course info
Rating
(33)
Level
Intermediate
Updated
Mar 28, 2018
Duration
1h 35m
Description

Security in the Microsoft Azure cloud can be complex, and the stakes are high. This course, Microsoft Azure Security - Getting Started, will provide you with the skills you need to deploy Azure solutions competently and confidently according to Microsoft security best practices and patterns. First, you'll cover security terminology and develop a thorough grounding of general cloud computing security principles. Next, you'll explore configuring both host-level and deployment-level security. Finally, you'll learn the ins and outs of how to utilize Azure Security Center, the automated intelligence engine. By the end of this course, you'll be able to apply what you've learned immediately to current and future Azure Resource Manager deployments.

About the author
About the author

Timothy Warner is a Microsoft Most Valuable Professional (MVP) in Cloud and Datacenter Management who is based in Nashville, TN.

More from the author
More courses by Tim Warner
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Tim Warner, and welcome to my course, Microsoft Azure Security - Getting Started. I'm a Microsoft MVP in Cloud and Data Center Management, as well as a staff author with Pluralsight. Security in the Microsoft Azure Cloud can become complex and the stakes are high. This course provides Azure IT operators, developers, and architects with the skills they need to deploy Azure Solutions competently and confidently according to Microsoft Security Best Practices and Patterns. By the end of the course, you'll be able to apply what you've learned immediately to current and future Azure Resource Manager deployments. I hope you'll join me on this journey to secure your Azure deployments with the Microsoft Azure Security - Getting Started course, at Pluralsight.

Configuring Host-level Security
Hello there, and welcome to Pluralsight. My name is Tim Warner, and this course is entitled Microsoft Azure Security - Getting Started. This is the first module in the course, and its title is Configuring Host-Level Security. Security needs for cloud workloads are constantly evolving, and the stakes are high to protect your resources. This course, Microsoft Azure Security - Getting Started, will provide you with the skills you need to deploy Azure solutions competently and confidently according to Microsoft security best practices and patterns. First, we'll cover security terminology and develop a thorough grounding of general cloud computing security principles. Next, we'll explore configuring both host-level and deployment-level security. Lastly, we'll learn how to monitor security state and protect your cloud workloads against threats using Azure Security Center. By the end of this course, you'll be able to apply what you've learned immediately to secure your resources in Azure. So that's the course. Let's take a look at the module overview, what we have for store for us in this particular lesson. As I said, we're going to refresh our knowledge of security vocabulary, we'll learn how to protect the storage subsystem environment for your VMs, and then we'll look at protecting the operating system environment. This again deals with host-level security. Let's get started.

Configuring Deployment-level Security
Hello there, and welcome to Pluralsight. My name is Tim Warner, and this module is entitled Configuring Deployment-level Security. We'll begin this module by reviewing what you need to keep in mind to be successful in securing your Azure IaaS deployments. Specifically, we'll get into protecting the network subsystem and how to control resource access. Let's get started.

Configuring Azure Security Center
Hello there, and welcome to Pluralsight. Tim Warner here welcoming you to the module entitled Configuring Azure Security Center. We have just two learning goals here, but we have a lot of content to cover. First is understanding what ASC is, what its use case is, and why I in my professional consulting practice always recommend my customers make use of it. By the end of this module, you'll also understand how to configure and use ASC. It's a wide and vast topic, but I'm committed to bringing you the skills, the knowledge, and the practical application you need to get a really good head start on the service. Let's begin.