Book Image

Microsoft Azure Security Technologies Certification and Beyond

By : David Okeyode
Book Image

Microsoft Azure Security Technologies Certification and Beyond

By: David Okeyode

Overview of this book

Exam preparation for the AZ-500 means you’ll need to master all aspects of the Azure cloud platform and know how to implement them. With the help of this book, you'll gain both the knowledge and the practical skills to significantly reduce the attack surface of your Azure workloads and protect your organization from constantly evolving threats to public cloud environments like Azure. While exam preparation is one of its focuses, this book isn't just a comprehensive security guide for those looking to take the Azure Security Engineer certification exam, but also a valuable resource for those interested in securing their Azure infrastructure and keeping up with the latest updates. Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide builds a solid foundation of Azure security. You’ll not only learn about security technologies in Azure but also be able to configure and manage them. Moreover, you’ll develop a clear understanding of how to identify different attack vectors and mitigate risks. By the end of this book, you'll be well-versed with implementing multi-layered security to protect identities, networks, hosts, containers, databases, and storage in Azure – and more than ready to tackle the AZ-500.
Table of Contents (19 chapters)
1
Section 1: Implement Identity and Access Security for Azure
7
Section 2: Implement Azure Platform Protection
12
Section 3: Secure Storage, Applications, and Data

What this book covers

Chapter 1, Introduction to Azure Security, helps you to understand how security works in Azure and set up a practice environment.

Chapter 2, Understanding Azure AD, helps you to understand what Azure Active Directory (AD) is and how to implement identity management.

Chapter 3, Azure AD Hybrid Identity, covers how to implement Azure AD hybrid identity and configure its status.

Chapter 4, Azure AD Identity Security, covers how to protect Azure AD identities with advanced identity security best practices.

Chapter 5, Azure AD Identity Governance, covers how to protect privileged access using Azure AD Privileged Identity Management.

Chapter 6, Implementing Perimeter Security, covers how to implement platform perimeter protection to secure Azure workloads.

Chapter 7, Implementing Network Security, covers how to configure network security best practices for IaaS and PaaS.

Chapter 8, Implementing Host Security, covers how to implement host security best practices in Azure.

Chapter 9, Implementing Container Security, covers how to implement container security best practices in Azure.

Chapter 10, Implementing Storage Security, covers how to protect data in Azure Storage using multilayered security.

Chapter 11, Implementing Database Security, covers how to protect Azure SQL databases against unauthorized access, data theft, and vulnerabilities.

Chapter 12, Implementing Secrets, Keys, and Certificates Management with Key Vault, covers how to secure privileged application configuration and credentials using Key Vault.

Chapter 13, Azure Cloud Governance and Security Operations, covers how to implement Azure cloud governance, address cloud security challenges with Security Center, and manage security operations with Azure Sentinel.