May 28 2023 Azure Security Best Practices 2023 BaDshaH LEARNING / e-learning - Tutorials 06:27 0 Published 5/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 2.24 GB | Duration: 7h 18mMake your Azure environment as secure as possible using up-to-date best practices and services What you'll learnExtensive, practical knowledge about Software Security, from the basics to the advancedSpecific challenges with cloud securityIdentity security in the cloudNetwork security in the cloudStoring secrets in the cloudSecuring various cloud servicesUtilizing Azure Policy for setting security baselineApplying this knowledge on a case studyRequirementsFamiliarity with Azure and the Azure portalSome development knowledge is recommended but not requiredNo security background is required!DescriptionMake your Azure environment as secure as possible.Working in the cloud poses unique security challenges. The fact that the cloud is accessible through the internet, and that some services are open to the network by default, makes it an attractive target to attackers.And that means that you have to make sure your cloud environment is secure. Unsecure environment is an easy target for hackers, which can steal your data, crush your servers, and destroy your reputation.And this is exactly what this course is all about.In this course we'll learn everything there's to learn about security in Azure. We'll begin from the very basics, the foundations of software security, and go all the way to the most advanced security topics in Azure.We'll learn about the security services in Azure and see how, and when, to use them.We'll also learn how to set a security baseline in Azure and make sure all the resources follow it.Here are some of the topics we'll discuss in this course:- Basic security principles- Security challenges in the cloud- Identity security with Azure AD- Network security (NSG, Private Endpoints and more)- KeyVault- Securing Virtual Machines- Securing App Services- Securing Databases- FirewallsAnd lots more.But that's not all. I wanted to make this course as practical as possible, and therefore we're going to have a lot of hands-on work in Azure.We're going to deploy virtual machines and configure them for security, we're going to create KeyVault and store our secrets securely in it, We're going to connect our database to an app service using Private Endpoint, and lots more.And to make this course even better - it has the following two additional elements:1. Case study, where we're going to begin with a basic, unsecure cloud architecture, and go through all the elements in it and make them secure. You'll be surprised to see the difference between our starting point and the final architecture.2. Azure Security Handbook, summarizing what we learn in this course. This downloadable handbook is a great go-to-guide for security in Azure, and it will greatly help you when designing your next cloud architecture (the same way it helps me...) There is no other course like this! This is the most comprehensive, practical and easy-to-follow course about Azure security. And by the end of this course - you'll be a real Azure Security Expert!------------------------------------------------------------What do my students have to say about my Azure courses------------------------------------------------------------"This is the best Azure course I have encountered on Udemy or anywhere. And I say this after buying 8 different Udemy Azure before" - Arbaaz"One of the best Azure classes in the world" - Kkvi1357"One of the best courses I've done at Udemy - top among maybe 50-100" - Russ "Memi is a true architect willing to get his hands dirty!" - Kevon"Excellent" - Ashwani"Highly recommended" - Shashank"I am loving it <3 the best part is the project based learning !" - Juhi"The best course I have taken on Udemy" - EslamAnd lots more...------------------------------------------------------------Who is this course for?------------------------------------------------------------Any person who works with Azure will benefit from this course.Whether you are a cloud architect, developer or administrator - this course is for you.And in fact - anyone who's interested in cloud and security can take this course and benefit from it.If you're not sure if this course is for you - drop me a note!------------------------------------------------------------What are the prerequisites for this course?------------------------------------------------------------Some knowledge of Azure and familiarity with the Azure portal is required for this course.Note: This is not a beginner course in Azure, and I assume you already know how to work with Azure, create resources in it and work with them.------------------------------------------------------------About Me------------------------------------------------------------I've been working with Azure for more than 11 years, spanning dozens of customers from various fields - Fortune 100 enterprises, start-ups, govt. entities, defense, telco, banking, and lots more.In addition, I am a certified Azure Solutions Architect Expert and a certified Azure Security Engineer.I've been in the software industry for more than 20 years, and a Software Architect for more than 17 years, working with a variety of clients.I'm an avid speaker and trainer, having trained thousands of students in various courses.I love what I do, and my greatest passion (well, besides my family...) is designing modern, practical, and reliable systems for my clients, using the best possible architecture patterns and services.OverviewSection 1: WelcomeLecture 1 Course IntroductionLecture 2 Join the Software and Cloud Architects CommunityLecture 3 Get the course slidesLecture 4 Who Is This Course For?Lecture 5 What This Course Is NOTLecture 6 AgendaSection 2: Basic Security PrinciplesLecture 7 IntroductionLecture 8 What is Software Security?Lecture 9 Software Security TerminologyLecture 10 Who is Responsible for the Security?Section 3: Security in the CloudLecture 11 IntroductionLecture 12 Security Challenges in the CloudLecture 13 Cloud Services SecuritySection 4: Identity SecurityLecture 14 IntroductionLecture 15 Access to the Azure PortalLecture 16 DEMO - Activating the P2 License TrialLecture 17 MFA in Azure ADLecture 18 DEMO - Configuring MFA in Azure ADLecture 19 DEMO - Testing MFALecture 20 RolesLecture 21 DEMO - Using Azure AD RolesLecture 22 Azure RolesLecture 23 DEMO - Using Azure RolesLecture 24 Managed IdentityLecture 25 DEMO - Configuring System-Assigned Managed IdentityLecture 26 DEMO - Configuring User-Assigned Managed IdentitySection 5: Network SecurityLecture 27 IntroductionLecture 28 Hub-and-spoke DesignLecture 29 Network Security Group (NSG)Lecture 30 Configuring NSG for Inbound ConnectionsLecture 31 Configuring NSG for Outbound ConnectionsLecture 32 Using NSGs with SubnetsLecture 33 Private LinkSection 6: KeyVaultLecture 34 IntroductionLecture 35 DEMO - Using KeyVaultSection 7: Securing Virtual MachinesLecture 36 IntroductionLecture 37 Use Minimum PermissionsLecture 38 Keep the VM Up-to-dateLecture 39 Protect Against MalwareLecture 40 Enable Disk EncryptionLecture 41 Restrict Internet AccessLecture 42 DEMO - Securing Virtual MachinesLecture 43 DEMO - Using Azure BastionLecture 44 ResourcesSection 8: Securing App ServicesLecture 45 IntroductionLecture 46 Accept HTTPS Only RequestsLecture 47 Add Azure AD AuthenticationLecture 48 Protect Secrets Using KeyVaultLecture 49 Restrict Internet AccessLecture 50 DEMO - Securing App ServicesLecture 51 ResourcesSection 9: Securing DatabasesLecture 52 IntroductionLecture 53 Use Azure AD IdentitiesLecture 54 Encrypt DataLecture 55 Restrict Database AccessLecture 56 DEMO - Creating and Connecting to Azure SQLLecture 57 DEMO - Adding Users to Azure SQLLecture 58 Connecting from a VMLecture 59 DEMO - Preparing the ComputerLecture 60 DEMO - Connecting from VM using Connection StringLecture 61 DEMO - Storing Connection String in KeyVaultLecture 62 DEMO - Configuring KeyVault Private EndpointLecture 63 DEMO - Configuring Database Private EndpointLecture 64 DEMO - Connecting from VM using Managed IdentityLecture 65 Connecting from App ServiceLecture 66 DEMO - Connecting from App ServiceLecture 67 Database Security FAQLecture 68 ResourcesSection 10: Securing Storage AccountLecture 69 IntroductionLecture 70 Use Azure AD IdentitiesLecture 71 Encrypt DataLecture 72 Restrict AccessLecture 73 DEMO - Securing Storage AccountLecture 74 Connecting to the Storage Account from a VMLecture 75 DEMO - Connecting from VM using Connection StringLecture 76 DEMO - Configure Private EndpointLecture 77 DEMO - Connecting from VM using Managed IdentityLecture 78 Connecting from App ServiceLecture 79 SummarySection 11: FirewallsLecture 80 IntroductionLecture 81 Azure FirewallLecture 82 DEMO - Using Azure FirewallLecture 83 Application Gateway & WAFLecture 84 DEMO - Deploying WAFLecture 85 DEMO - Configuring WAF PolicyLecture 86 DEMO - Configuring Custom RulesLecture 87 DEMO - Configuring WAF LogsLecture 88 DEMO - Switching to Prevention ModeLecture 89 DEMO - Configuring App Service Private EndpointLecture 90 Firewall NotesSection 12: LoggingLecture 91 IntroductionLecture 92 DEMO - Configuring LoggingLecture 93 DEMO - Querying LogsLecture 94 ResourcesSection 13: Defender for CloudLecture 95 IntroductionLecture 96 DEMO - Using Defender for CloudSection 14: Azure PolicyLecture 97 IntroductionLecture 98 Azure Policy OverviewLecture 99 DEMO - Using Azure PolicySection 15: Case StudyLecture 100 IntroductionLecture 101 The SystemLecture 102 Initial ArchitectureLecture 103 Securing the Telemetry GatewayLecture 104 Securing the Telemetry ProcessorLecture 105 Securing the Operational DBLecture 106 Securing the Telemetry ViewerLecture 107 Complete ArchitectureSection 16: ConclusionLecture 108 Download the Azure Security HandbookLecture 109 ConclusionLecture 110 Bonus lectureAzure architects who want to integrate security into their cloud system,Azure developers who want to secure their code in the cloud,Azure administrators who want to make sure their cloud infrastructure is secure,Anyone who is interested in cloud securityHomepagehttps://www.udemy.com/course/azure-security-best-practices/Download From Rapidgatorhttps://rapidgator.net/file/6094dca463adc04e111acf1fd94d8c78https://rapidgator.net/file/21a60ba061a5b067a0dc0182d48f7c20https://rapidgator.net/file/28b191c4c552405d299767cd15c7ee7fDownload From FileRicehttps://filerice.com/j4h02cvwxlp5https://filerice.com/szbwnawn3o98https://filerice.com/2zu2ua08ce9cDownload From Nitroflarehttps://nitroflare.com/view/C7085AA117A1795https://nitroflare.com/view/E1F721856EB8B39https://nitroflare.com/view/EA5958F932F19AF Related News Be Professional With MetaSploit Framework Course MSF A To ZAz-900 Mastery: The Complete Microsoft Azure FundamentalsAzure Data Factory +Synapse Analytics End To End Etl ProjectPython & Data Science with R | Python & R ProgrammingBuild Data Engineering Pipelines With Azure Data Factory Comments (0)Add comment Submit NEWEST RELEASES 20.05: Wondershare Recoverit 2.5.15.16 macOS 20.05: PhotoFiltre Studio 11.6.1 (x64) Portable 20.05: Nitro PDF Pro 14.25.0.23 (x64) Enterprise Multilingual Portable 20.05: Boxy SVG 4.32.0 macOS 20.05: Aiseesoft iPhone Unlocker 2.0.58 macOS 20.05: Glary Malware Hunter Pro 1.184.0.805 Multilingual Portable 20.05: Cadence Fidelity Pointwise 2023.2.3 (x64) 20.05: Native Instruments Maschine 2.18.1 (x64) 20.05: 4K Downloader 5.9.6 20.05: AutoDWG PDF to DWG Converter Pro 2024 4.7 Recommended Filehosts Freinds Site