- This module equips administrators with the skills to design, deploy, and oversee security governance in Azure, ensuring alignment with organizational policies and industry best practices.
By the end of this module, participants will be able to:
Enforce compliance using Azure Policy to create and manage security policies.
Streamline secure infrastructure deployment with Azure Blueprint.
Utilize landing zones for consistent Azure security and manage sensitive data with Azure Key Vault.
Enhance key security with HSM recommendations, effective access control, and regular key rotation and backup processes.
- This module focuses on equipping administrators with the knowledge and skills needed to manage and enhance the security posture of their cloud environment using Microsoft Defender for Cloud, ensuring proactive identification and remediation of security risks.
By the end of this module, you will be able to:
Utilize Microsoft Defender for Cloud Secure Score and Inventory to identify and mitigate security risks, enhancing overall security posture.
Assess and align with security frameworks using Microsoft Defender for Cloud to ensure adherence to security standards and best practices.
Integrate specific industry and regulatory standards into Microsoft Defender for Cloud for tailored compliance.
Connect hybrid and multicloud environments to Microsoft Defender for Cloud for centralized security management, and monitor external assets to safeguard against external threats.
- This module focuses on the essential techniques for configuring and managing threat protection exclusively with Microsoft Defender for Cloud, empowering cybersecurity specialists to strengthen the security posture of their cloud environments.
By the end of this module, participants will be able to:
Master the configuration of Microsoft Defender for Cloud to effectively monitor and protect cloud resources.
Implement advanced threat detection strategies using Microsoft Defender for Cloud's built-in capabilities.
Utilize Microsoft Defender for Cloud's threat intelligence to proactively identify and mitigate security risks.
Configure and fine-tuning security policies within Microsoft Defender for Cloud to align with organizational security requirements.
Develop expertise in incident response and remediation using Microsoft Defender for Cloud's integrated tools and features.
- Learn to set up Azure Monitor and Microsoft Sentinel for automatic security monitoring and response in cloud settings.
By the end of this module, participants are able to:
Use Azure Monitor for effective security event monitoring in cloud environments.
Implement data connectors in Microsoft Sentinel for comprehensive security data collection.
Develop customized analytics rules in Microsoft Sentinel for targeted threat detection.
Assess and automate responses to security incidents in Microsoft Sentinel to enhance workflow efficiency.
Strengthen security posture using Microsoft Defender for Cloud and Microsoft Sentinel
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Implement and manage enforcement of cloud governance policies
- Introduction
- Microsoft cloud security benchmark: Access, Data, Identity, Network, Endpoint, Governance, Recovery, Incident, and Vulnerability Management
- Azure governance
- Create, assign, and interpret security policies and initiatives in Azure Policy
- Deploy secure infrastructures by using a landing zone
- Azure Key Vault
- Azure Key Vault security
- Azure Key Vault authentication
- Create and configure an Azure Key Vault
- Recommend when to use a dedicated Hardware Security Module (HSM)
- Configure access to Key Vault, including vault access policies and Azure role-based access control
- Manage certificates, secrets, and keys
- Configure key rotation
- Configure backup and recovery of certificates, secrets, and keys
- Implement security controls to protect backups
- Implement security controls for asset management
- Module assessment
- Summary
- Manage security posture by using Microsoft Defender for Cloud
- Introduction
- Implement Microsoft Defender for Cloud
- Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory
- Assess compliance against security frameworks and Microsoft Defender for Cloud
- Add industry and regulatory standards to Microsoft Defender for Cloud
- Add custom initiatives to Microsoft Defender for Cloud
- Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud
- Implement and use Microsoft Defender External Attack Surface Management
- Module assessment
- Summary
- Configure and manage threat protection by using Microsoft Defender for Cloud
- Introduction
- Enable workload protection services in Microsoft Defender for Cloud
- Defender for Servers
- Defender for Storage
- Malware scanning in Defender for Storage
- Detect threats to sensitive data
- Deploy Microsoft Defender for Storage
- Enable configure Azure built-in policy
- Configure Microsoft Defender plans for Servers, Databases, and Storage
- Implement and manage Microsoft Defender Vulnerability Management
- Log Analytics workspace
- Manage data retention in a Log Analytics workspace
- Deploy the Azure Monitor Agent
- Collect data with Azure Monitor Agent
- Data collection rules (DCRs) in Azure Monitor
- Transformations in data collection rules (DCRs)
- Monitor network security events and performance data by configuring data collection rules (DCRs) in Azure Monitor
- Connect your Azure subscriptions
- Just-in-time machine access
- Enable just-in-time access
- Container security in Microsoft Defender for Containers
- Managed Kubernetes threat factors
- Defender for Containers architecture
- Configure Microsoft Defender for Containers components
- Microsoft Defender for Cloud DevOps Security
- DevOps Security support and prerequisites
- DevOps environment security posture
- Connect your GitHub lab environment to Microsoft Defender for Cloud
- Configure the Microsoft Security DevOps GitHub action
- Defender for Cloud AI threat protection
- Enable threat protection for AI workloads in Defender for Cloud
- Gain application and end-user context for AI alerts
- Exercise - Configuring Microsoft Defender for Cloud for Enhanced Protection
- Knowledge check
- Summary
- Configure and manage security monitoring and automation solutions
- Introduction
- Manage and respond to security alerts in Microsoft Defender for Cloud
- Configure workflow automation by using Microsoft Defender for Cloud
- Log retention plans in Microsoft Sentinel
- Alerts and Incidents from Microsoft Sentinel
- Configure data connectors in Microsoft Sentinel
- Enable analytics rules in Microsoft Sentinel
- Configure automation in Microsoft Sentinel
- Automating Threat Response with Microsoft Sentinel
- Module assessment
- Summary