Microsoft Azure Security Essentials

Microsoft Azure Security Essentials

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 8h 38m | 2.44 GB

This course is designed to help you gain the high-level knowledge on some of the important capabilities when it comes to securing the Azure platform with an emphasis and overall goal to achieve confidentiality, integrity, and availability on these various cloud systems. The course is also designed to provide insight into the trustworthy foundation provided by Azure with many configurable security options to best suit your organizational needs and to fulfill those requirements.

Table of Contents

Course.Introduction
1 What to Expect

Security.in.the.Cloud
2 Introduction into Azure Security
3 Shared Responsibilities

Transparency
4 Securing Customer Data in Azure Services
5 Managing Data Location in Azure Services
6 Who Can Access Your Data and on What Terms
7 Review Certification for Azure Services, Transparency Hub
8 Conclusion

Identity.and.Access.Management
9 Secure Identity
10 Secure Apps and Data
11 Role-Based Access Control (RBAC)
12 Conclusion

Operations
13 Security and the Audit Dashboard
14 Application Insights
15 Azure Monitor
16 Azure Monitor Logs
17 Azure Advisor
18 Azure Security Center
19 Conclusion

Storage
20 Shared Access Signature
21 Encryption in Transit
22 Encryption at Rest
23 Storage Analytics
24 Enabling Browser-Based Clients Using CORS
25 Conclusion

Networking
26 Network Layer Controls
27 Network Security Groups (NSG)
28 Route Control and Forced Tunneling
29 Application Gateway
30 Web Application Firewall
31 Security Center
32 Conclusion

Compute
33 Antimalware and Antivirus
34 Hardware Security Module
35 SQL VM TDE
36 VM Disk Encryption
37 Patch Updates
38 Security Policy and Management and Reporting
39 Conclusion

Secure.Platform
40 Security Development Cycle and Internal Audits
41 Mandatory Security Training and Background Checks
42 Penetration Testing, Intrusion Detection, DDoS, Audits, and Logging
43 State of the Art Data Centers, Physical Security, and Secure Networks
44 Security Incident Response and Shared Responsibility
45 Conclusion

Course.Conclusion
46 Additional Resources
47 What’s Next