As you approach Azure for the first time, security will be a concern. The good news is with the right awareness and usage of technologies, using the cloud can increase your security posture. In this course, Planning and Designing Microsoft Azure Security Solutions, you'll learn what the key Azure security solutions are and how best to utilize them. First, you'll delve into identity with Azure AD. Next, you'll discover how to store data securely in the cloud followed by key technologies to secure your Azure network resources. Finally, solutions to protect the overall security of your environment will be explored. By the end of this course, you'll be able to utilize Azure with total confidence in its security without sacrificing functionality.
John Savill is an 11-time MVP, and he holds many Microsoft certifications
including Azure Infrastructure and Azure Architecture specialist. John is
the author of the popular FAQ for Windows and a senior contributing editor
to Windows IT Pro. John has written eight books on Microsoft technologies
including Mastering Microsoft Azure Infrastructure Services and Mastering
Windows Server 2016 Hyper-V.
Course Overview Hi everyone, my name is John Savill and welcome to my course, Planning and Designing Microsoft Azure Security Solutions. I'm a principal technical architect at the Dallas Microsoft Technology Center. When using public cloud services, security is often top of mind for everyone. Security around network access, around protecting secrets, around identities and much more. In this course, we're going to look at the key Azure technologies and how they are best leverage. By the end of this course you'll know how to implement and leverage Azure security features for your Azure based solutions, and how to utilize them outside Azure to increase the overall security of your environment and your identities.
Common Solutions Welcome to the planning and designing Microsoft Azure security solutions course. My name is John Savill, I'm a principle technical architect at the Dallas Microsoft Technology Center, I'm an eleven-time Microsoft MVP, I just completed my eighth book on Microsoft technologies, mastering Windows Server 2016 Hyper-V, and I speak at a lot of the major industry conferences. You can follow me on Twitter @ntfaqguy. Now my goals for this course is to start off just reviewing the common security requirements, diving into identity solutions, specifically when I'm leveraging the Cloud. Then, looking at key storage solutions. I have sensitive data, how do I store this when I'm using Cloud services? Looking at architecting network security. Again, another critical component when I'm hosting in the Cloud, both, to protect what I offer out to the internet, but also, controlling communications within the Cloud network and back to on premises. Looking at access security, who can do what, and when can they do those things? And then looking at a few case studies to really try and cement home the key concepts. In this first module, we're going to review some of the key security requirements that are common across nearly every company.
Designing Identity Solutions Welcome to the Designing Identity Solutions module. In this module, we're going to look at the importance of identity. Why it matters how many identities I actually have. Some of the key Azure AD features and some of the problems with passwords.
Designing Key Storage Welcome to the Designing Key Storage module. In this module, I want to dive into the need for keys and secrets. I have private bits of information I need to store very securely. How do I do that? And then the solution, Azure Key Vault.
Designing Network Security This module looks at designing network security. Specifically, what are the requirements for network security? Looking again at defense in depth, virtual network fundamentals, just as a refresher. Looking at network security groups, and then the Azure Application Gateway with the Web Application Firewall.
Designing Access Security So welcome to the Designing Access Security module. In this module, we're going to quickly review the Azure Resource Manager and then dive into role-based access control to manage what users or groups have access to and the specific actions they can perform. Privileged access management will be explored as a way to remove standing privileges and only grant elevation of privileges when I actually need them. We're going to look at Identity Protection to get a view of the security state of our identities. And then look at Azure Security Center for an all out dashboard of everything that's security related in our Azure environment.
Azure Service Architecture Case Study Review Welcome to the Azure Service Architecture Case Study Review. And really the goal for this module is just to review two case studies to try and cement the understanding around some of the security concepts we've covered in this course.