Course Overview
This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.
Curriculum
- 1 Section
- 8 Lessons
- 1 Day
Expand all sectionsCollapse all sections
- Topics8
- 1.1A. Examine Defender for Cloud regulatory compliance standards Introduction Regulatory compliance standards in Defender for Cloud Microsoft cloud security benchmark in Defender for Cloud Improve your regulatory compliance in Defender for Cloud Knowledge check Summary
- 1.2B. Enable Defender for Cloud on your Azure subscription Introduction Connect your Azure subscriptions Exercise – Configuring Microsoft Defender for Cloud for Enhanced Protection Knowledge check Summary
- 1.3C. Filter network traffic with a network security group using the Azure portal Introduction Azure resource group Azure Virtual Network How network security groups filter network traffic Application security groups Exercise – Create a virtual network infrastructure Knowledge check Summary
- 1.4D. Create a Log Analytics workspace Introduction Log Analytics workspace Exercise – Create a Log Analytics workspace Knowledge check Summary
- 1.5E. Collect guest operating system monitoring data from Azure and hybrid virtual machines using Azure Monitor Agent Introduction Deploy the Azure Monitor Agent Collect data with Azure Monitor Agent Collect data from your workloads with the Log Analytics agent Configure the Log Analytics agent and workspace Exercise – Create and edit data collection rules and associations in Azure Monitor Exercise – Create a data collection rule and install the Azure Monitor Agent Knowledge check Summary
- 1.6F. Explore just-in-time virtual machine access Introduction Understand just-in-time virtual machine access Enable just-in-time access on virtual machines Exercise – Enable just-in-time access on virtual machines Knowledge check Summary
- 1.7G. Configure Azure Key Vault networking settings Introduction Azure Key Vault basic concepts Best practices for Azure Key Vault Azure Key Vault network security Configure Azure Key Vault firewalls and virtual networks Exercise – Configure Key Vault networking settings Azure Key Vault soft delete overview Virtual network service endpoints for Azure Key Vault Exercise – Enable soft delete in Azure Key Vault Knowledge check Summary
- 1.8H. Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal Introduction Azure Private Endpoint Azure Private Link Exercise – Connect to an Azure SQL server using an Azure Private Endpoint using the Azure portal Knowledge check Summary
