Security Governance in Azure-Azure Resource Management & Key Vualt Security
Course Outline
Security Governance in Azure - Overview
Lab - Azure Resource Locks
()
Lab - Azure Policies
()
Lab - Resource Security
()
Lab - Custom Roles
()
Lab - Azure Blueprints
()
Lab - Azure Key Vault Service
()
Lab - Azure Key Vault Permissions
()
Lab - Managing Secrets
()
Lab - Azure Key Vault - Storage Keys Rotation
()
Lab - Azure Key Vault - Backups
()
Lab - Azure Key Vault - Firewall and Network Security
()
Overview of Azure Dedicated HSM
()
Azure Dedicated HSM - Physical Security Measures and Networking Capabilities
()
Azure Dedicated HSM - Supportability and Monitoring
()
Azure landing zone - Resource Group Setup and Azure Blueprints Configuration
()
Azure landing zone - Assigning Blueprint and Exporting Activity Logs
()
Security Monitoring and Automation solutions-Secure with Microsoft Sentinel
Security Monitoring and Automation solutions - Overview
Lab - Azure Monitor
()
Lab - Azure Monitor - Virtual Machines
()
Lab - Update Management
()
Microsoft Sentinel Overview
()
Microsoft Sentinel: Monitoring Solutions
()
Demo: Analytics rules in Microsoft Sentinel
()
Demo: Creating analytics rules in Microsoft Sentinel
()
Demo: Customize analytics rules in Microsoft Sentinel
()
Microsoft Sentinel: Data Connectors & Playbooks Overview
()
Demo: Microsoft Sentinel Overview
()
Demo - Microsoft Sentinel Part 1
()
Demo - Microsoft Sentinel Part 2
()
Microsoft Senthil : Deployment Process of Data Connectors
()
Microsoft Senthil: Alert Rule Creation and Workspace Exploration
()
Microsoft Senthil: Creating a Playbook with Incident Trigger
()
Microsoft Sentinel - Managing Automation Rules
()
Microsoft Defender for Cloud: Security Posture & Threat Protection-Secure with Microsoft Defender for Cloud
Microsoft Defender for Cloud: Security Posture & Threat Protection - Overview
Microsoft Defender for Cloud: Options & Features
()
Microsoft Defender for Cloud: JIT, Security Alerts, Security Incidents
()
Microsoft Defender for Security, Protection, Storage, and Containers
()
Microsoft Defender for App Service, KeyVault, ARM
()
Microsoft Defender for Cloud: DNS & Workflow Automation
()
Microsoft Defender for Azure SQL Database & Servers
()
Demo - Microsoft Defender for Cloud: Just-in-time (VM Creation)
()
Demo - Microsoft Defender for Cloud: Just-in-time (Configuration)
()
Demo - Microsoft Defender for Cloud: Just-in-time (Working with options)
()
Demo - Microsoft Defender for Cloud: Workflow Automation Part 1
()
Demo - Microsoft Defender for Cloud: Workflow Automation Part 2
()
Microsoft Defender: Secure Code Tracking and Score Improvement
()
Microsoft Defender: Azure Policy Remediation and Alert Management
()
Key Takeaways of the course
Course Conclusion
What's Next?