Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Implement virtual machine host security in Azure

Microsoft via Microsoft Learn

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
  • Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.

    By the end of this module, you'll be more familiar with the five principles of the Security pillar and learn three approaches for each principle. You'll learn how to:

    • Create a security readiness plan that matches your business priorities.
    • Handle confidentiality requirements properly.
    • Strengthen your workload's integrity against security risks.
    • Ensure that your workload stays available during security incidents.
    • Maintain and improve your workload's security posture continuously.
  • Learn about standards and practices for planning, deploying, managing, and optimizing Linux VMs in Azure.
    • Plan the network environment and sizing of Microsoft Azure virtual machines (VMs) running Linux.
    • Apply established best practices for deploying and configuring Linux on Azure VMs.
    • Optimize your Linux environment on Azure VMs for performance and functionality.
  • Learn about different methods of provisioning Linux virtual machines in Microsoft Azure.

    After completing this module, you'll be able to:

    • Provision a Linux virtual machine (VM) by using the Azure portal.
    • Provision an Azure VM running Linux by using the Azure CLI.
    • Provision an Azure VM running Linux by using Hashicorp Terraform.
    • Provision an Azure VM running Linux by using Bicep.
  • Learn to create an Azure virtual machine in minutes that can be used like a local physical desktop or server.

    In this module, you will:

    • Create a Windows virtual machine using the Azure portal.
    • Connect to a running Windows virtual machine using Remote Desktop.
    • Install software and change the network configuration on a VM using the Azure portal.

Syllabus

  • Microsoft Azure Well-Architected Framework - Security
    • Introduction
    • Plan your security readiness
    • Design to protect confidentiality
    • Design to protect integrity
    • Design to protect availability
    • Sustain and evolve your security posture
    • Summary
  • Plan your Linux environment in Azure
    • Introduction
    • Plan for sizing and networking
    • Manage Azure Linux VMs
    • Optimize performance and functionality
    • Module assessment
    • Summary
  • Provisioning a Linux virtual machine in Microsoft Azure
    • Introduction
    • Provision a Linux virtual machine by using the Azure portal
    • Provision a Linux virtual machine by using Azure CLI
    • Provision a Linux virtual machine by using Terraform
    • Provision a Linux virtual machine by using Bicep
    • Module assessment
    • Summary
  • Create a Windows virtual machine in Azure
    • Introduction
    • Create a Windows virtual machine in Azure
    • Exercise - Create a Windows virtual machine
    • Use RDP to connect to Windows Azure virtual machines
    • Exercise - Connect to a Windows virtual machine using RDP
    • Configure Azure virtual machine network settings
    • Summary

Reviews

Start your review of Implement virtual machine host security in Azure

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.