Successful learners will have prior knowledge and understanding of:
• Security best practices and industry security requirements such as defense indepth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
• Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
• Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
• Have experience with Windows and Linux operating systems and scripting languages.
1. Manage identities in Azure AD.
2. Manage authentication by using Azure AD.
3. Manage authorization by using Azure AD.
4. Manage application access in Azure AD.
5. Secure networking (20–25%).
6. Plan and implement security for virtual networks.
7. Plan and implement security for private access to Azure resources.
8. Plan and implement security for public access to Azure resources.
9. Secure compute, storage, and databases (20–25%).
10. Plan and implement advanced security for compute.
11. Plan and implement security for storage.
12. Plan and implement security for Azure SQL Database and Azure SQL ManagedInstance.
13. Manage security operations (25–30%).
14. Manage security posture by using Microsoft Defender for Cloud.
15. Configure and manage threat protection by using Microsoft Defender forCloud.
16. Configure and manage security monitoring and automation solutions.