Book Image

Microsoft Azure Fundamentals Certification and Beyond

By : Steve Miles
Book Image

Microsoft Azure Fundamentals Certification and Beyond

By: Steve Miles

Overview of this book

This is the digital and cloud era, and Microsoft Azure is one of the top cloud computing platforms. It’s now more important than ever to understand how the cloud functions and the different services that can be leveraged across the cloud. This book will give you a solid understanding of cloud concepts and Microsoft Azure, starting by taking you through cloud concepts in depth, then focusing on the core Azure architectural components, solutions, and management tools. Next, you will understand security concepts, defense-in-depth, and key security services such as Network Security Groups and Azure Firewall, as well as security operations tooling such as Azure Security Center and Azure Sentinel. As you progress, you will understand how identity, governance, privacy, and compliance are managed in Azure. Finally, you will get to grips with cost management, service-level agreements, and service life cycles. Throughout, the book features a number of hands-on exercises to support the concepts, services, and solutions discussed. This provides you with a glimpse of real-world scenarios, before finally concluding with practice questions for AZ-900 exam preparation. By the end of this Azure book, you will have a thorough understanding of cloud concepts and Azure fundamentals, enabling you to pass the AZ-900 certification exam easily.
Table of Contents (21 chapters)
1
Section 1: Cloud Concepts
4
Section 2: Core Azure Services
7
Section 3: Core Solutions and Management Tools
10
Section 4: Security
12
Section 5: Identity, Governance, Privacy, and Compliance
16
Section 6: Cost Management and Service-Level Agreements

Threat modeling

Attackers can take many forms, such as criminal hackers, hacktivists, competitors, and foreign nations. Don't forget either that attackers are not only external; they can be internal to an organization—for example, ex-employees—these often being the hardest to detect and prevent. For further reading, you should enter Sly Dog gang into your favorite search engine to read about a real-world insider espionage attack on one of the highest-profile manufacturers of electric vehicles.

You must put in measures so that you don't become an easy target for opportunists as well as the crafted, pre-meditated, military-style operation of some sophisticated attacks; these measures are designed to raise the attacker's costs significantly, so they divert their resources and activities to an easier attack target that has a higher return on their attack investment.

The approach that should be taken is to adopt a threat priority model; this can then aid...