
- Use Microsoft Entra ID to you secure your internal, external, and customer identities.
In this module, you'll:
- Describe the core terminology of Microsoft Entra ID.
- Describe the core features of Microsoft Entra ID.
- Describe the licensing models for Microsoft Entra ID.
- Manage users and groups in Microsoft Entra ID
In this module, you will:
- Learn the difference between Microsoft Entra ID and Windows Server Active Directory.
- Understand tenants, subscriptions, and users.
- Create a new Microsoft Entra ID.
- Add users and groups to a Microsoft Entra ID.
- Manage roles in a Microsoft Entra ID.
- Learn how to create a hybrid identity solution with Microsoft Entra Connect.
- Configure and manage secrets in Azure Key Vault
In this module, you will:
- Explore proper usage of Azure Key Vault.
- Manage access to an Azure Key Vault.
- Explore certificate management with Azure Key Vault.
- Configure a Hardware Security Module Key-generation solution.
- Discover how to protect your APIs from unauthorized use with API keys and client certificate authentication.
In this module, you will:
- Use API keys to authorize access to your APIs.
- Use client certificate authentication to secure your APIs.
- Monitor Microsoft Entra security events with built-in reporting and monitoring capabilities to prevent unauthorized access and potential data loss.
In this module, you will:
- Store Azure audit logs and sign-in activity logs in a Log Analytics workspace.
- Create alerts for security events in a Log Analytics workspace.
- Create and view dashboards to support improved monitoring.
- Learn best practices for building, hosting, and maintaining a secure repository on GitHub.
In this module, you will:
- Identify the tools and GitHub features to establish a secure development strategy.
- Enable vulnerable dependency detection for private repositories.
- Detect and fix outdated dependencies with security vulnerabilities.
- Automate the detection of vulnerable dependencies with Dependabot.
- Add a security policy with a SECURITY.md file.
- Remove a commit exposing sensitive data in a pull request.
- Remove historical commits exposing sensitive data deep in your repository.
- Learn about post-incident reviews, a practice necessary to help you sustainably achieve the appropriate level of reliability in your systems, services, and products.
In this module, you will:
- Discover the importance of learning from incidents.
- Understand the aspects of complex systems that make learning from failure important.
- Learn when and how to conduct a post-incident review.
- Understand the purpose and goals of a post-incident review.
- Learn the components that go into a good post-incident review.
- Explore the Azure tools that can assist with getting started with post-incident reviews.
- Become aware of common traps to avoid.
- Identify helpful practices to conduct a better review.
- Learn the incident response fundamentals necessary to help you sustainably achieve the appropriate level of reliability in your systems, services, and products.
In this module, you will:
- Learn the importance of effective incident response.
- Gain an understanding of the lifecycle of an incident so we know just how to apply our efforts.
- Learn the building blocks for constructing an incident response process that allows us to respond with urgency.
- Begin to track your incidents effectively using Azure DevOps tools.
- Explore ways to automate your incident tracking for a speedy and consistent response.
- Understand the guidelines around communication that allow incident response to be more efficient.
- Visit some Azure tools that can significantly speed up your remediation times during an incident.