Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Perform basic Azure Management Tasks (Security and Monitoring)

Microsoft via Microsoft Learn

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
  • Module 1: This module focuses on the essential techniques for configuring and managing threat protection exclusively with Microsoft Defender for Cloud, empowering cybersecurity specialists to strengthen the security posture of their cloud environments.

    By the end of this module, participants will be able to:

    • Master the configuration of Microsoft Defender for Cloud to effectively monitor and protect cloud resources.

    • Implement advanced threat detection strategies using Microsoft Defender for Cloud's built-in capabilities.

    • Utilize Microsoft Defender for Cloud's threat intelligence to proactively identify and mitigate security risks.

    • Configure and fine-tuning security policies within Microsoft Defender for Cloud to align with organizational security requirements.

    • Develop expertise in incident response and remediation using Microsoft Defender for Cloud's integrated tools and features.

  • Module 2: Configure and manage secrets in Azure Key Vault

    In this module, you will:

    • Explore proper usage of Azure Key Vault
    • Manage access to an Azure Key Vault
    • Explore certificate management with Azure Key Vault
    • Configure a Hardware Security Module Key-generation solution
  • Module 3: Describe how Azure Firewall protects Azure Virtual Network resources, including the Azure Firewall features, rules, deployment options, and administration with Azure Firewall Manager.

    After completing this module, you'll be able to:

    • Explain how Azure Firewall and Azure Firewall Manager work together to protect Azure virtual networks.
    • Evaluate whether Azure Firewall is the right solution to protect your Azure virtual networks from malicious incoming and outgoing traffic.
    • Evaluate whether Azure Firewall Premium is the right solution to protect your Azure virtual networks from malicious incoming and outgoing traffic.
    • Evaluate whether Azure Firewall Manager is the right solution for deploying policies across multiple firewalls.
    • Identify and describe use cases for Azure Firewall and Azure Firewall Manager.
  • Module 4: In this module, you learn how to create and configure access to a Log Analytics workspace. You also learn how to configure data retention and to enable health status alerts for a Log Analytics workspace.
    • Create a Log Analytics workspace
    • Configure access to a Log Analytics Workspace
    • Configure data retention for a Log Analytics workspace
    • Configure Health Status Alerts for a Log Analytics workspace

Syllabus

  • Module 1: Module 1: Configure and manage threat protection by using Microsoft Defender for Cloud
    • Introduction
    • Enable workload protection services in Microsoft Defender for Cloud
    • Defender for Servers
    • Defender for Storage
    • Malware scanning in Defender for Storage
    • Detect threats to sensitive data
    • Deploy Microsoft Defender for Storage
    • Enable configure Azure built-in policy
    • Configure Microsoft Defender plans for Servers, Databases, and Storage
    • Implement and manage Microsoft Defender Vulnerability Management
    • Log Analytics workspace
    • Manage data retention in a Log Analytics workspace
    • Deploy the Azure Monitor Agent
    • Collect data with Azure Monitor Agent
    • Data collection rules (DCRs) in Azure Monitor
    • Transformations in data collection rules (DCRs)
    • Monitor network security events and performance data by configuring data collection rules (DCRs) in Azure Monitor
    • Connect your Azure subscriptions
    • Just-in-time machine access
    • Enable just-in-time access
    • Container security in Microsoft Defender for Containers
    • Managed Kubernetes threat factors
    • Defender for Containers architecture
    • Configure Microsoft Defender for Containers components
    • Microsoft Defender for Cloud DevOps Security
    • DevOps Security support and prerequisites
    • DevOps environment security posture
    • Connect your GitHub lab environment to Microsoft Defender for Cloud
    • Configure the Microsoft Security DevOps GitHub action
    • Defender for Cloud AI threat protection
    • Enable threat protection for AI workloads in Defender for Cloud
    • Gain application and end-user context for AI alerts
    • Knowledge check
    • Summary
  • Module 2: Module 2: Configure and manage secrets in Azure Key Vault
    • Introduction
    • Guidelines for using Azure Key Vault
    • Manage access to secrets, certificates, and keys
    • Exercise - store secrets in Azure Key Vault
    • Manage certificates
    • Summary
  • Module 3: Module 3: Introduction to Azure Firewall
    • Introduction
    • What is Azure Firewall?
    • How Azure Firewall works
    • When to use Azure Firewall
    • When to use Azure Firewall Premium
    • Knowledge check
    • Summary
  • Module 4: Module 4: Create and configure a Log Analytics workspace
    • Introduction
    • Create a Log Analytics workspace
    • Configure access to Log Analytics workspaces
    • Configure Log Analytics data retention
    • Configure Log Analytics health status alerts
    • Knowledge check
    • Summary

Reviews

Start your review of Perform basic Azure Management Tasks (Security and Monitoring)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.