Design for security in Azure
Defense in depth Knowledge Check
Identity management Knowledge Check
Infrastructure protection
Infrastructure protection Knowledge Check
Encryption Knowledge Check
Network security Knowledge Check
Top 5 security items to consider before pushing to production
Azure Security Center Knowledge Check
Inputs and Outputs Knowledge Check
Secure your Azure Storage account
Explore Azure Storage security features
Understand storage account keys
Understand shared access signatures
Control network access to your storage account
Understand Advanced Threat Protection for Azure Storage
Explore Azure Data Lake Storage security features
Manage secrets in your server apps with Azure Key Vault
Exercise – Create a key vault and store secrets
Vault authentication with managed identities for Azure resources
Vault authentication with managed identities for Azure resources Knowledge Check
Exercise – Access secrets stored in Azure Key Vault
Exercise – Access secrets stored in Azure Key Vault C#
Exercise – Access secrets stored in Azure Key Vault JavaScript
Exercise – Configure, deploy, and run in Azure
Exercise – Configure, deploy, and run in Azure C#
Exercise – Configure, deploy, and run in Azure JavaScript
Authenticate browser-based apps with Azure App Services
Application and authentication
Exercise – Create Azure Web App
Provider and endpoint of authentication
Exercise – Enable App Service Authentication
Exercise – Authentication token and Session cookies
Secure your Azure resources with conditional access
Exercise – Build your directory
Exercise – Secure access to resources
Exercise – Test access to resources
Secure your Azure resources with role-based access control (RBAC)
What is RBAC? Knowledge check
Exercise – List access using RBAC and the Azure portal
Exercise – Grant access using RBAC and the Azure portal
Exercise – View activity logs for RBAC changes
Using RBAC Knowledge check
Secure your Azure SQL Database
Exercise – Set up sandbox environment
Exercise – Restrict network access
Exercise – Control who can access your database
Exercise – Secure your data in transit, at rest, and on display
Exercise – Monitor your database