- Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
By the end of this module, you'll be more familiar with the five principles of the Security pillar and learn three approaches for each principle. You'll learn how to:
- Create a security readiness plan that matches your business priorities.
- Handle confidentiality requirements properly.
- Strengthen your workload's integrity against security risks.
- Ensure that your workload stays available during security incidents.
- Maintain and improve your workload's security posture continuously.
- Learn to use key GitHub features, including issues, notifications, branches, commits, and pull requests.
In this module, you'll:
- Identify the fundamental features of GitHub.
- Learn about repository management.
- Gain an understanding of the GitHub flow, which includes branches, commits, and pull requests.
- Explore the collaborative features of GitHub by reviewing issues and discussions.
- Recognize how to manage your GitHub notifications and subscriptions.
- Learn best practices for building, hosting, and maintaining a secure repository on GitHub.
In this module, you will:
- Identify the tools and GitHub features to establish a secure development strategy.
- Enable vulnerable dependency detection for private repositories.
- Detect and fix outdated dependencies with security vulnerabilities.
- Automate the detection of vulnerable dependencies with Dependabot.
- Add a security policy with a SECURITY.md file.
- Remove a commit exposing sensitive data in a pull request.
- Remove historical commits exposing sensitive data deep in your repository.
Free courses from frontend to fullstack and AI
Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Syllabus
- Microsoft Azure Well-Architected Framework - Security
- Introduction
- Plan your security readiness
- Design to protect confidentiality
- Design to protect integrity
- Design to protect availability
- Sustain and evolve your security posture
- Summary
- Introduction to GitHub
- Introduction
- What is GitHub?
- Components of the GitHub flow
- GitHub is a collaborative platform
- GitHub platform management
- Exercise - A guided tour of GitHub
- Module assessment
- Summary
- Maintain a secure repository by using GitHub best practices
- Introduction
- How to maintain a secure GitHub repository
- Automated security
- Exercise - Secure your repository's supply chain
- Module assessment
- Summary