Advanced Security for Compute Resources-Secure Azure Compute Services
Welcome to the Course
Course Outline
Advanced Security for Compute Resources - Overview
Azure Kubernetes Service
()
Lab - Azure Kubernetes Service
()
Lab - Azure Container registry
()
Lab - Azure Kubernetes and Container Registry
()
Container Networking
()
Lab - Image Security
()
Lab - Virtual Machine Security
()
Lab - Virtual Machine disk encryption
()
Lab - Azure Bastion Host
()
Lab - Remote Access management
()
AKS Infrastructure Management and App Deployment
()
AKS - Cluster Management and Security
()
Demo: AKS - Ensuring Secure Access Control
()
Demo: AKS - Troubleshooting and Performance Evaluation
()
Demo: AKS - Enabling and Customizing Recommended Alerts
()
Implement Security for Storage Services-Storage Accounts: Access Control and Encryption
Implement Security for Storage Services - Overview
Lab - Azure Storage accounts - Access control
()
Lab - Azure Storage Accounts - Key Management
()
Lab - Azure files - Azure AD Domain Services Authentication
()
Lab - Shared Access Signatures
()
Lab - Azure Storage Accounts - Stored Access policies
()
Azure Storage Encryption
()
Configuring Disk Encryption
()
Encryption as Host
()
Confidential Disk Encryption
()
Demo: Configuring Disk Encryption Part 1
()
Demo: Configuring Disk Encryption Part 2
()
Data Security Threats with Soft Deletion Protection(Enabling and Disabling)
()
Data Security Threats with backups, versioning, and immutable storage
()
Demo: Bring Your Own Key (BYOK)
()
Implement Security for Database Services-Secure Azure Databases
Implement Security for Storage Services - Overview
Lab - Azure SQL Database - Diagnostics
()
Lab - Azure SQL Database - Auditing
()
Lab - Azure SQL Database - Advanced Data Security
()
Lab - Azure SQL Database - Dynamic Data Masking
()
Lab - Azure SQL Database - Encryption
()
Lab - Azure SQL Database - Firewall and Network Security
()
Microsoft Purview Governance Portal
()
Azure Data Lake Gen2 Security
()
Azure HDInsight Security
()
Azure Cosmos DB Security.
()
Key Takeaways of the course
Course Conclusion