Instructor

SC-5002: Secure Azure with Microsoft Defender Training

Curriculum

Learn to secure Azure services and workloads using Microsoft Defender for Cloud. Master regulatory compliance controls in SC-5002 training for better cloud security.

Ratings

( 4.7 Ratings )

Live Online Classes starting on 01 January, 1970

SC - 5002 : Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls

SC - 5002 : Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls certification pertains to the integration of Microsoft Defender for Cloud, which is designed to help organizations secure their Azure services and workloads. This certification indicates that the security tools and practices meet specific regulatory compliance standards, which vary across industries and regions. Organizations leverage this certification to ensure their use of Azure is in line with legal requirements for data protection and cybersecurity. It is used by industries to prevent, detect, and respond to threats while managing compliance effectively, demonstrating a commitment to securing cloud infrastructure and maintaining customer trust through adherence to prescribed regulatory frameworks.

 

Audience Profile:

  • Administrator

  • Security Engineer

  • Azure Professionals

 

Prerequisites:

  • None

 

Course Outline:

Module 1: Filter Network Traffic with a Network Security Group (NSG) Using the Azure Portal

  • Understand the purpose and benefits of Network Security Groups (NSGs) for filtering network traffic

  • Learn to create and configure NSGs to enforce access controls for Azure resources

  • Use NSGs to allow or deny specific traffic based on source, destination, and port

  • Prioritize NSG rules and leverage NSG flow logs for monitoring and troubleshooting

  • Implement network security best practices with NSGs in Azure

Module 2: Create a Log Analytics Workspace for Microsoft Defender for Cloud

  • Understand the role of a centralized logging solution with Azure Log Analytics workspace

  • Create and configure a Log Analytics workspace in Azure

  • Collect and analyze security data from Microsoft Defender for Cloud within the workspace

  • Create custom queries and alerts for proactive security threat detection

  • Integrate Log Analytics with other Azure services and tools for enhanced security management

Module 3: Set Up Microsoft Defender for Cloud

  • Explore the features and benefits of Microsoft Defender for Cloud, including the Microsoft Security Benchmark and Security Recommendations

  • Leverage Defender for Cloud Secure Score to monitor, protect, and improve cloud security

  • Use the MITRE Attack Matrix to identify attack techniques and prioritize security efforts

  • Understand Brute Force Attacks and implement preventive measures

  • Implement Just-in-Time Virtual Machine access controls for enhanced security

Module 4: Configure and Integrate a Log Analytics Agent and Workspace in Defender for Cloud

  • Learn the importance of centralized log collection and analysis in Microsoft Defender for Cloud

  • Configure and deploy the Log Analytics agent in Azure

  • Create and configure a Log Analytics workspace for Defender for Cloud

  • Integrate the Log Analytics workspace with Defender for Cloud to collect and analyze security logs

  • Leverage centralized log analytics for proactive security monitoring and threat detection

Module 5: Configure Azure Key Vault Networking Settings

  • Understand the importance of securing Azure Key Vault access through networking settings

  • Configure network access control using virtual network service endpoints and private endpoints

  • Set up firewall rules and virtual network service endpoints to restrict Key Vault access

  • Configure private endpoints for secure access from virtual networks

  • Enhance overall security with properly configured networking settings for Azure Key Vault

Module 6: Connect an Azure SQL Server Using an Azure Private Endpoint

  • Explore the benefits of using Azure Private Endpoint for secure connections to Azure SQL Server

  • Configure and create an Azure Private Endpoint for Azure SQL Server in the Azure portal

  • Understand the network architecture and components involved in setting up the Private Endpoint

  • Validate and test the connection between the Azure Private Endpoint and Azure SQL Server

  • Secure database connections and isolate network traffic with Azure Private Endpoint

(4.7 Ratings)

Download Course Contents

Still unsure?
We're just a click away


Course Outline PDF

SpireTec Unique Features

course-img
1-On-1 Training

Benefit from our 1-On-1 Training for personalized, focused, and effective learning experiences.

course-img
Customized Training

Experience our Customized Training service tailored to meet your specific learning needs and goals

course-img
4 - Hours / Weekend Session

Join our Class featuring 4 - Hours / Weekend Session for in-depth learning and expert training.

course-img
Free Demo Class

Join our Free Demo Class to experience top-notch training and expert guidance first hand!

Purchase This Course

Request More Information

CERTIFICATE

Get Ahead With SpireTec Solutions
Training Certificate

Earn your Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Differentiate yourself with Masters Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Share your achievement

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Need Customized Curriculum?

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Talk To Adviser
course-certificate

Top Certifications