Microsoft Azure Security Technologies: Securing Azure with Defender & Sentinel

Azure    |    Intermediate
  • 12 videos | 1h 4m 44s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 8 users Rating 4.6 of 8 users (8)
Microsoft Defender offers security services for monitoring and mitigating malware for on-premises and cloud services. Azure Sentinel provides central data ingestion information and event management (SIEM) solution. In this course, you will use Azure Sentinel and Microsoft Defender for Cloud to protect Azure resources. First you will review Defender protection solutions. Next, you will configure Defender to protect Azure and AWS virtual machines. Then, you will evaluate security scanning results. Lastly, you will use the Sentinel services as a central cloud-based SIEM solution to detect security incidents and ensure Azure virtual machines (VMs) have updates applied. This course can be used to prepare for exam AZ-500, Microsoft Azure Security Technologies.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how microsoft defender for cloud protects on-premises and cloud services
    View microsoft defender for cloud server recommendations
    Configure defender to protect aws virtual machines (vms)
    Use defender to protect cloud databases
    Evaluate defender scan results
  • Recognize the importance of centralized security data ingestion
    Configure the sentinel service
    Manage connectors and alerts in sentinel
    Identify potential security issues using threat modeling
    Ensure updates are applied to azure vms
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 5s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 26s
    After completing this video, you will be able to outline how Microsoft Defender for Cloud protects on-premises and cloud services. FREE ACCESS
  • Locked
    3.  Managing Microsoft Defender for Cloud for Azure Servers
    7m 5s
    Learn how to configure Defender to protect Azure servers. FREE ACCESS
  • Locked
    4.  Managing Microsoft Defender for Cloud for AWS EC2 Instances
    7m 4s
    Find out how to configure Defender to protect AWS virtual machines (VMs). FREE ACCESS
  • Locked
    5.  Managing Microsoft Defender for Cloud for Databases
    5m 39s
    Discover how to use Defender to protect cloud databases. FREE ACCESS
  • Locked
    6.  Viewing Microsoft Cloud Vulnerability Scan Results
    5m 50s
    Find out how to evaluate Defender scan results. FREE ACCESS
  • Locked
    7.  Security Information and Event Management (SIEM) and Azure Sentinel
    5m 43s
    In this video, you will learn how to recognize the importance of centralized security data ingestion. FREE ACCESS
  • Locked
    8.  Configuring Azure Sentinel
    6m 45s
    During this video, discover how to configure the Sentinel service. FREE ACCESS
  • Locked
    9.  Managing Azure Sentinel Connectors and Alerts
    7m 26s
    Learn how to manage connectors and alerts in Sentinel. FREE ACCESS
  • Locked
    10.  Threat Modeling with the Microsoft Threat Modeling Tool
    5m 25s
    Find out how to identify potential security issues using threat modeling. FREE ACCESS
  • Locked
    11.  Managing Azure VM Updates
    6m 15s
    Learn how to ensure updates are applied to Azure VMs. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 1s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 214 users Rating 4.5 of 214 users (214)
Rating 3.7 of 3 users Rating 3.7 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 3 users Rating 4.3 of 3 users (3)
Rating 4.6 of 328 users Rating 4.6 of 328 users (328)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)