Course Details

Previous Page


Designing an Azure Security Strategy


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number


Overview/Description
In this course, you'll learn how identity management is used to control access to Azure resources. Azure encryption options and role-based management will also be covered, as you prepare for exam 70-534.

Target Audience
IT professionals responsible for planning and deploying Azure virtual machines and applications in a secure manner

Prerequisites
None

Expected Duration (hours)
1.4

Lesson Objectives

Designing an Azure Security Strategy

  • start the course
  • list Azure security features
  • describe the role identity management plays in securing resources
  • describe the OAuth protocol
  • describe the OpenID Connect protocol
  • describe the purpose of ADFS
  • plan an Azure ADFS deployment
  • configure Azure to allow Google identity authentication
  • describe Azure encryption options
  • enable Azure storage encryption
  • enable Azure database encryption
  • identify how roles are used with Azure management
  • assign built-in roles for Azure management
  • build and assign custom roles for Azure management
  • review Azure risk mitigation tactics
  • view and configure policies in Azure Security Center
  • describe the purpose of ADFS and configure Azure roles
  • Course Number:
    cl_amaz_a08_it_enus