Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Implement virtual machine host security in Azure

Microsoft via Microsoft Learn

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
  • Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.

    By the end of this module, you'll be more familiar with the five principles of the Security pillar and learn three approaches for each principle. You'll learn how to:

    • Create a security readiness plan that matches your business priorities.
    • Handle confidentiality requirements properly.
    • Strengthen your workload's integrity against security risks.
    • Ensure that your workload stays available during security incidents.
    • Maintain and improve your workload's security posture continuously.
  • In this module, you learn how to create security baselines for your Azure services by ensuring that your settings meet the minimum requirements described in CIS Benchmarks for Azure v. 1.3.0.

    In this module, you will:

    • Learn about Azure platform security baselines and how they were created.
    • Create and validate a security baseline for the most commonly used Azure services.
  • Learn about standards and practices for planning, deploying, managing, and optimizing Linux VMs in Azure.
    • Plan the network environment and sizing of Microsoft Azure virtual machines (VMs) running Linux.
    • Apply established best practices for deploying and configuring Linux on Azure VMs.
    • Optimize your Linux environment on Azure VMs for performance and functionality.
  • Learn about different methods of provisioning Linux virtual machines in Microsoft Azure.

    After completing this module, you'll be able to:

    • Provision a Linux virtual machine (VM) by using the Azure portal.
    • Provision an Azure VM running Linux by using the Azure CLI.
    • Provision an Azure VM running Linux by using Hashicorp Terraform.
    • Provision an Azure VM running Linux by using Bicep.
  • Learn to create an Azure virtual machine in minutes that can be used like a local physical desktop or server.

    In this module, you will:

    • Create a Windows virtual machine using the Azure portal.
    • Connect to a running Windows virtual machine using Remote Desktop.
    • Install software and change the network configuration on a VM using the Azure portal.

Syllabus

  • Microsoft Azure Well-Architected Framework - Security
    • Introduction
    • Plan your security readiness
    • Design to protect confidentiality
    • Design to protect integrity
    • Design to protect availability
    • Sustain and evolve your security posture
    • Summary
  • Create security baselines
    • Introduction
    • Understand the Azure platform security baseline
    • Create an Identity & Access Management baseline
    • Create a Microsoft Defender for Cloud baseline
    • Create an Azure storage accounts baseline
    • Create an Azure SQL Database baseline
    • Create a logging and monitoring baseline
    • Create a Networking baseline
    • Create an Azure VM baseline
    • Other baseline security considerations
    • Summary
  • Plan your Linux environment in Azure
    • Introduction
    • Plan for sizing and networking
    • Manage Azure Linux VMs
    • Optimize performance and functionality
    • Module assessment
    • Summary
  • Provisioning a Linux virtual machine in Microsoft Azure
    • Introduction
    • Provision a Linux virtual machine by using the Azure portal
    • Provision a Linux virtual machine by using Azure CLI
    • Provision a Linux virtual machine by using Terraform
    • Provision a Linux virtual machine by using Bicep
    • Module assessment
    • Summary
  • Create a Windows virtual machine in Azure
    • Introduction
    • Create a Windows virtual machine in Azure
    • Exercise - Create a Windows virtual machine
    • Use RDP to connect to Windows Azure virtual machines
    • Exercise - Connect to a Windows virtual machine using RDP
    • Configure Azure virtual machine network settings
    • Summary

Reviews

Start your review of Implement virtual machine host security in Azure

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.