Data Engineering on Microsoft Azure: Securing Data Access

Azure    |    Intermediate
  • 12 videos | 1h 6m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 28 users Rating 4.7 of 28 users (28)
Securing access to data is a fundamental part of any security strategy. In this course, you'll explore how Azure Key Vault can be used to store and manage keys and secrets for accessing data. You'll discover how to connect to Azure resources through private and service endpoints and managed virtual networks and how to use Azure managed identities for connections between Azure resources. Next, you'll learn how to utilize access control lists and Azure role-based access control to provide only the necessary permissions to users to access your data. You'll also learn how token-based authentication works in Azure Databricks. Finally, you'll examine how to audit an Azure SQL Database to monitor for unauthorized access. This course is one in a collection that prepares learners for the Microsoft Data Engineering on Microsoft Azure (DP-203) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how azure key vault can be used to store and manage keys and secrets used by multiple sources
    Describe private endpoints used for ensuring data flows only within your private link and service endpoints used to provide secure direct connectivity
    Utilize managed virtual networks and managed private endpoints to secure traffic between azure synapse analytics and other azure resources
    Describe how resources and apps can utilize azure managed identities to securely connect to azure services
    Manage access control lists on azure data lake storage gen2
  • Manage access to resources using azure role-based access control
    Describe how token-based authentication can be utilized to manage authentication to azure databricks
    Manage access azure databricks workspaces using azure databricks token authentication
    Manage retention policies for temporal tables in azure sql database
    Enable auditing on an azure sql database
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 42s
    Meet your instructor and learn how Azure key vault can be used to store and manage keys and secrets for accessing data. You'll discover how to connect to Azure resources through private and service endpoints and manage virtual networks. Then you'll explore using Azure managed identities for connections between resources. FREE ACCESS
  • 6m 23s
    Take a look at the Azure Key Vault. The Azure Key Vault is a cloud service used for securely storing and accessing secrets. It stores API keys, passwords, certificates, and cryptographic keys. Key vault supports two types of containers. It supports vaults and HSM or managed hardware security module pools. FREE ACCESS
  • Locked
    3.  Private and Service Endpoints
    10m 45s
    Explore Azure private endpoint.  It is a network interface that connects privately and securely to a service provided by Azure private link. It ensures your data doesn't traverse the internet. It offers private and service endpoints to ensure data flows only within your private link. Multiple private endpoints can be created on different subnets within same VNet. FREE ACCESS
  • Locked
    4.  Using Managed Virtual Networks and Private Endpoints
    9m 23s
    Learn how to use a managed virtual network along with a private endpoint. First, you’ll connect your Azure Synapse Workspace to two other services in Azure using a data lake. Then, you’ll connect the Synapse Workspace to the Data Lake Storage Gen 2 account. You’ll look at the data over a private link. FREE ACCESS
  • Locked
    5.  Azure Managed Identities
    5m 36s
    Explore Azure-managed identities and services you can integrate. There are two types of managed identities; system-assigned and user-assigned. API Management, Azure App Configuration, the App Service, Automanage, are some services you can integrate with these. Most cross-service integrations are done via secret keys or a token exchange. Token Exchange is better approach because it's done using Azure Active Directory. FREE ACCESS
  • Locked
    6.  Managing Access Control Lists
    4m 57s
    Learn how to implement POSIX-style ACLs in your Azure data lake Gen 2. These POSIX-style ACLs give you more granular access control. Access can be applied down to filters and directories. Access can be granted to Active Directory objects like users, groups, service principles, and managed identities. FREE ACCESS
  • Locked
    7.  Using Azure Role-based Access Control
    6m 40s
    Discover how to implement role-based access control in your Azure Data Lake Storage Gen 2 account. Explore how to use role based access control. FREE ACCESS
  • Locked
    8.  Azure Databricks Token-based Authentication
    4m 38s
    Take a look at using REST API Authentication with Azure Databricks. You’ll learn how to authenticate to these Azure Databricks REST API. You’ll need to create a user-generated personal access token. You’ll include that personal access token into your API requests as a bearer header. FREE ACCESS
  • Locked
    9.  Implement Azure Databricks Token Authentication
    5m 38s
    Learn how to invoke Azure Databricks APIs using personal tokens. First, you’ll go into Azure Databricks. You’ll create a new workspace if you haven't already. You’ll copy the URL onscreen and put it into Notepad. FREE ACCESS
  • Locked
    10.  Managing Temporal Table Retention Policies
    4m 46s
    Discover how to create a retention period for temporal tables in Azure SQL databases. First, you’ll log into your SQL Server using SQL Server Management Studio from Microsoft. Then, you’ll head to the database called WebsiteDB. You’ll find temporal tables are easy to manage because you only need to add one parameter. FREE ACCESS
  • Locked
    11.  Auditing on an Azure SQL Database
    5m 6s
    Explore how to implement auditing on your SQL database in Microsoft Azure. Once you're in the Azure console, you’ll head to your SQL databases. Choose the WebsiteDB to enable auditing. It's hosted under your SQL server. Click on this to see your server, database, and all other attributes. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 8s
    Review what you’ve learned in this course. You’ve learned how to secure your data access. You learned how Azure Key Vault is used. You also discovered private and service endpoints. You discussed how to implement managed virtual networks and private endpoints. You learned how to use Azure managed identities. Finally, you learned how to manage access control lists. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 191 users Rating 4.5 of 191 users (191)
Rating 4.6 of 198 users Rating 4.6 of 198 users (198)
Rating 4.7 of 78 users Rating 4.7 of 78 users (78)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 63 users Rating 4.6 of 63 users (63)
Rating 4.4 of 186 users Rating 4.4 of 186 users (186)
Rating 4.8 of 30 users Rating 4.8 of 30 users (30)