Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Implement virtual machine host security in Azure

Microsoft via Microsoft Learn

Overview

  • Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
  • By the end of this module, you'll be able to:

    • Develop a defense-in-depth approach to securing your architecture
    • Choose the technologies to secure your Azure infrastructure
    • Develop a strategy for secure identity management
  • Module 2: Create security baselines
  • In this module, you will:

    • Learn Azure platform security baselines and how they were created
    • Create and validate a security baseline for the most commonly used Azure services
  • Module 3: This module guides you through options for virtual machines in Azure, creating and connecting a Linux virtual machine, and configuring your network settings.
  • In this module, you will:

    • Understand the options that are available for virtual machines in Azure
    • Create a Linux virtual machine using the Azure portal
    • Connect to a running Linux virtual machine using SSH
    • Install software and change the network configuration on a VM using the Azure portal
  • Module 4: Learn to create an Azure virtual machine in minutes that can be used like a local physical desktop or server.
  • In this module, you will:

    • Create a Windows virtual machine using the Azure portal
    • Connect to a running Windows virtual machine using Remote Desktop
    • Install software and change the network configuration on a VM using the Azure portal
  • Module 5: Explore the options for Azure disk encryption to encrypt OS and data disks on existing and new virtual machines.
  • In this module, you will:

    • Determine which encryption method is best for your VM
    • Encrypt existing virtual machine disks using the Azure portal
    • Encrypt existing virtual machine disks using PowerShell
    • Modify Azure Resource Manager templates to automate disk encryption on new VMs
  • Module 6: Stop hackers from getting into your Windows and Linux servers. In this module, you’ll discover how to protect VMs and servers with Microsoft Defender for Cloud
  • In this module, you will:

    • Learn how to protect VM-based resources and networks with Microsoft Defender for Cloud
    • Install and use malware protection to stop virus attacks on your exposed endpoints

Syllabus

  • Module 1: Microsoft Azure Well-Architected Framework - Security
    • Introduction
    • Defense in depth
    • Identity management
    • Infrastructure protection
    • Encryption
    • Network security
    • Application security
    • Summary
  • Module 2: Create security baselines
    • Create a platform security baseline
    • Understand the Azure platform security baseline
    • Create an Identity & Access Management (IAM) baseline
    • Create a Microsoft Defender for Cloud baseline
    • Create an Azure storage accounts baseline
    • Create an Azure SQL Database baseline
    • Create a logging and monitoring baseline
    • Create a Networking baseline
    • Create an Azure VM baseline
    • Other baseline security considerations
    • Summary
  • Module 3: Create a Linux virtual machine in Azure
    • Introduction
    • Create a Linux virtual Machine in Azure
    • Exercise - Decide an authentication method for SSH
    • Exercise - Create a Linux virtual machine with the Azure portal
    • Azure virtual machines IP addresses and SSH options
    • Exercise - Connect to a Linux virtual machine with SSH
    • Network and security settings
    • Exercise - Configure network settings
    • Summary
  • Module 4: Create a Windows virtual machine in Azure
    • Introduction
    • Create a Windows virtual machine in Azure
    • Exercise - Create a Windows virtual machine
    • Use RDP to connect to Windows Azure virtual machines
    • Exercise - Connect to a Windows virtual machine using RDP
    • Configure Azure virtual machine network settings
    • Summary
  • Module 5: Secure your Azure virtual machine disks
    • Introduction
    • Encryption options for protecting Windows and Linux VMs
    • Encrypt existing VM disks
    • Exercise - Encrypt existing VM disks
    • Automate secure VM deployments by adding encryption to Azure Resource Manager templates
    • Exercise - Use a Resource Manager template to decrypt the VM
    • Knowledge check
    • Summary
  • Module 6: Protect your servers and VMs from brute-force and malware attacks with Microsoft Defender for Cloud
    • Introduction
    • Protect virtual machines with JIT VM access
    • Exercise - Enable JIT VM access
    • Understand the malware threat
    • Exercise - Configure malware detection
    • Summary

Reviews

Start your review of Implement virtual machine host security in Azure

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.