Home Microsoft Security Training CoursesSC-5002 Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls
SC-5002 Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls
Guaranteed to Run
Price
$695.00
Duration
1 Day
Delivery Methods
Virtual Instructor Led Private Group
Delivery
Virtual
ESTDescription
Prerequisites
Content
Course Description
This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.
Course Prerequisites
There are no prerequisites for the Microsoft SC-5002 course, "Secure Azure Services and Workloads with Microsoft Defender for Cloud". However, to earn the Microsoft Applied Skills credential, candidates should be familiar with the following: Azure infrastructure as a service (IaaS) and platform as a service (PaaS). Security capabilities in Azure. Regulatory compliance standards
Course Content
Module 1: Regulatory Compliance and Defender for Cloud Overview
- Examine regulatory compliance standards in Microsoft Defender for Cloud
- Understand the Microsoft Cloud Security Benchmark
- Improve and monitor compliance posture within Defender for Cloud
- Enable and connect Azure subscriptions to Defender for Cloud
Module 2: Network Security and Traffic Filtering
- Understand Azure resource groups and virtual networks
- Configure and manage Network Security Groups (NSGs)
- Filter inbound and outbound network traffic
- Implement Application Security Groups (ASGs) for simplified management
Module 3: Monitoring and Log Analytics in Azure
- Create and configure a Log Analytics workspace
- Deploy and manage the Azure Monitor Agent
- Collect guest OS monitoring data from Azure and hybrid virtual machines
- Use monitoring data for performance and security insights
Module 4: Secure Access to Virtual Machines
- Understand Just-In-Time (JIT) VM access in Defender for Cloud
- Enable and configure JIT access to reduce attack exposure
- Audit and manage access requests to virtual machines
Module 5: Secure Secrets and Keys with Azure Key Vault
- Review Azure Key Vault concepts and best practices
- Configure networking, firewalls, and virtual networks for Key Vault
- Understand and enable soft delete for Key Vault recovery
- Implement virtual network service endpoints for secure access
Module 6: Connect Azure SQL Server Using Private Endpoints
- Understand Azure Private Endpoints and Private Links
- Configure Private Endpoints to connect Azure SQL securely
- Validate connectivity and enforce data isolation through private access
Do You Need Help? Please Fill Out The Form Below