- Course
Microsoft Azure Security - Getting Started
Your business may depend on avoiding data breaches in your Microsoft Azure deployments. In this course, you'll learn how to secure your Azure Resource Manager (ARM) deployments according to Microsoft's best practices and architectural patterns.
- Course
Microsoft Azure Security - Getting Started
Your business may depend on avoiding data breaches in your Microsoft Azure deployments. In this course, you'll learn how to secure your Azure Resource Manager (ARM) deployments according to Microsoft's best practices and architectural patterns.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Cloud
What you'll learn
Security in the Microsoft Azure cloud can be complex, and the stakes are high. This course, Microsoft Azure Security - Getting Started, will provide you with the skills you need to deploy Azure solutions competently and confidently according to Microsoft security best practices and patterns. First, you'll cover security terminology and develop a thorough grounding of general cloud computing security principles. Next, you'll explore configuring both host-level and deployment-level security. Finally, you'll learn the ins and outs of how to utilize Azure Security Center, the automated intelligence engine. By the end of this course, you'll be able to apply what you've learned immediately to current and future Azure Resource Manager deployments.
Microsoft Azure Security - Getting Started
-
Overview | 1m 23s
-
Security Terminology Review | 4m 18s
-
Storage Account Security Basics | 2m 42s
-
Data Plane Security | 1m 57s
-
Encryption in Transit | 1m 52s
-
Encryption at Rest | 1m 12s
-
Storage Analytics | 1m 51s
-
Demo: Introducing Azure Storage Explorer | 4m 51s
-
Demo: Configuring Azure Storage Account Security | 3m
-
Protect the VM Operating System Environment | 4m 29s
-
Demo: Secure a VM During Deployment | 6m 5s
-
Summary | 50s