________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
SC-5002: Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls
To earn this Microsoft Applied Skills credential , students must demonstrate their ability to implement regulatory compliance controls as recommended by the Microsoft Cloud Security Benchmark.
This course guides you through securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.
Intermediate - Microsoft Defender for Cloud, Azure - Administrator - Security
SC-5002 Training Objectives
- Configuring Microsoft Defender for Cloud
- Implementing Just-In-Time (JIT) Virtual Machine Access
- Create a Log Analytics workspace
- Mitigating network security risks
- Mitigation of data protection risks
- Mitigating endpoint security risks
- Mitigation of position management risks and vulnerabilities
SC-5002 Course Content
Module 1: Examining Defender for Cloud Compliance Standards
- Regulatory compliance rules in Defender for Cloud
- Microsoft Cloud Security Benchmark on Defender for Cloud
- Improving regulatory compliance in Defender for Cloud
Module 2: Enabling Defender for Cloud in an Azure Subscription
- Connecting Azure Subscriptions
- Exercise: Configuring Microsoft Defender for Cloud for Enhanced Protection
Module 3: Filtering network traffic with a network security group using the Azure portal
- Azure Resource Group
- Azure Virtual Network
- How Network Security Groups Filter Network Traffic
- Application Security Groups
- Exercise: Creating a virtual network infrastructure
Module 4: Creating a Log Analytics Workspace
- Log Analytics Workspace
- Exercise: Creating a Log Analytics Workspace
Module 5: Collecting Azure Guest OS and Hybrid VM Monitoring Data Using the Azure Monitor Agent
- Deploying the Azure Monitor Agent
- Collecting data with the Azure Monitor agent
- Exercise: Creating a Data Collection Rule and Installing the Azure Monitor Agent
Module 6: Exploring JIT Access to the Virtual Machine
- Understanding Just-in-Time Virtual Machine Access
- Enabling Just-In-Time Access on Virtual Machines
- Exercise: Enabling Just-In-Time Access on Virtual Machines
Module 7: Configuring Azure Key Vault Networks
- Azure Key Vault Basics
- Best practices for Azure Key Vault
- Azure Key Vault Network Security
- Configuring Azure Key Vault firewalls and virtual networks
- Exercise: Configuring Key Vault Network Options
- Introduction to Azure Key Vault soft delete
- Virtual network service endpoints for Azure Key Vault
- Exercise: Enabling soft delete in Azure Key Vault
Module 8: Connecting to an Azure SQL Server using an Azure Private Endpoint via the Azure portal
- Azure Private Endpoint
- Azure Private Link
- Exercise: Connecting to an Azure SQL Server using an Azure Private Endpoint with the Azure portal
Prerequisites
Familiarity with Azure Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) is recommended. Experience with Azure security features, along with a working knowledge of regulatory compliance standards, is a must.
Language
- Course: English / Spanish
- Labs: English / Spanish
Microsoft Applied Skills
This course is part of the Microsoft Applied Skills Credentials.
To earn this Microsoft Applied Skills credential, students must demonstrate their ability to implement regulatory compliance controls as recommended by the Microsoft Cloud Security Benchmark.
Applied Skills: Explore all credentials in one guide