Learn how to protect Users, Devices and Services in the cloud with Microsoft Azure
The availability of the cloud services Azure offers comes with added risk, understanding how to properly secure users, devices and services in the cloud is a key part of a successful Azure deployment.Book Your Course
Start Date
Venue
Availability
Cost
Course confirmed - Guaranteed to run
Course Full/Limited availability
Price shown excluding VAT.
Book a Private Event
If you require the content of this event tailored or have around 7 or more people to train it maybe better for you to host a Private Event, please get in touch to discuss this.
Get in touchDescription
Who is this course for
- Azure Administrators
- Security Administrators
- IT Professionals
- Cloud Consultants
Purpose of the course
To explain security features in Azure and provide practical exercises of configuring the same.
You will learn how to
Create a secure Azure environmentSecure Data, Devices & Applications
Create different user groups with varying access rights
Prerequisites
Experience working with Azure for at least 12 months is recommended before attending this course.Benefits for you as an individual
Any organisation that adopts Microsoft products is going to be using Azure services now or in the future, being equipped to secure Azure is a vital part of IT Administration
Benefits for your organisation
Deploying sensitive business data through the cloud without proper security can lead to data loss or leave services vulnerable to attack.
Module 1 – Identity and Access Management
- Securing AZ AD
- Identity Management
- User Policies
- What is Zero Trust?
- Key Vault
Module 2 – Azure Platform Security
- Cloud Security Concepts
- Cloud Networks
- Securing containers
- Securing Azure Resources
Module 3 - Host & Device Secuirty
- MDM & MAM
- Implement & Monitor Host Security
- Securing non Windows Devices
- Endpoint Protection
- Remote Access
Module 4 – Securing Data
- Encryption methods
- Securing DAR
- Data Security policies
- Data Alerts
Module 5 – Application Security
- Concepts
- Application Registration
- Service Endpoints
- Managed Identities
Get Started
Forget trawling through endless course catalogues – Find the training that’s right for you
Learn MoreLatest from our blog
Kanban and Agile: Bridging the Gap
Kanban and Agile: Bridging the Gap Quanta’s Kanban University Certified Trainer Steve Church explores the way in which Agile and…
Read More
How a Ballerina could move into Cybersecurity
Jason Ford, Quanta Cybersecurity and IT Trainer talks about the limitations in Cybersecurity Training courses. Jason discusses a safe and…
Read More
Boost Team Performance and Productivity: Unlocking the Advantages of Emotionally Intelligent Leadership
Quanta People Development and Leadership Trainer, Giles Collins outlines the key elements of Emotionally Intelligent Leadership and how it impacts…
Read More