Course Details

Previous Page


Microsoft Azure – Architecting Solutions: Securing Resources


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
One of the biggest concerns with organizations moving to the cloud is security. In this course, you will learn about securing resources in Microsoft Azure. You will look at securing resources by using managed identities, hybrid identities, and identity providers as well as examine how to implement data security solutions and role-based access control strategies.

Target Audience
This course is designed for IT Professionals working in an administrative role who wish to learn about designing Microsoft Azure-based cloud solutions. Candidates should have a good understanding of core networking skills, security, server administration, and virtualization technologies before attending this course. It is recommended that candidates have already successfully completed the 70-533 and 70-532 certifications.

Prerequisites
None

Expected Duration (hours)
2.4

Lesson Objectives

Microsoft Azure – Architecting Solutions: Securing Resources

  • start the course
  • recognize the differences between an on-premises active directory implementation and an Azure Active Directory implementation
  • describe the Graph API and how it is used with Managed Identities in Azure
  • use the Graph Explorer with Managed Identities in Azure
  • recognize the features and differences between Azure Active Directory, OAuth, and OpenID Connect
  • configure OAuth to secure access to a resource
  • configure OpenID Connect to secure access to a resource
  • recognize the features of SAML Claims
  • recognize the features of DirSync
  • configure directory synchronization using DirSync
  • recognize the features of Azure Access Control Services (ACS) to support hybrid identities in Azure
  • recognize the features of Active Directory Federated Services (ADFS)
  • configure Active Directory Federated Services to support a hybrid identity solution in Azure
  • configure Azure Access Control Services (ACS) 2.0 as an identity provider
  • configure Azure Access Control Services to support Facebook authentication
  • configure Azure Access Control Services to support Yahoo! authentication
  • recognize approaches to data security in Azure
  • configure an Access Control List in Azure
  • recognize the features of Azure Rights Management Services (RMS)
  • configure Azure Rights Management Services
  • recognize the features of Role-based Access Control (RBAC) in Azure
  • configure Azure Role-based Access Control
  • identify changes to Role Assignments when using Azure Role-based Access Control
  • design a plan to implement security for an Azure solution based on a set of requirements
  • Course Number:
    cl_amas_a02_it_enus