Understand and secure identities, authentication, and authorization in Azure.
Lessons / Topics:
Azure Active Directory (Azure AD) fundamentals
Implement and manage users, groups, and apps
Conditional Access policies and identity protection
Privileged Identity Management (PIM)
Hybrid identity and external users
Labs / Practical Exercises:
Configure Azure AD, users, groups, roles
Implement Conditional Access rules
Enable PIM and test role elevation
Outcomes:
Secure identity and access control in Azure
Apply conditional access and risk-based policies
Manage privileged accounts and enforce least privilege
Protect network and compute resources in Azure.
Lessons / Topics:
Network security: NSGs, Azure Firewall, DDoS Protection
Virtual network architecture and segmentation
Secure connectivity: VPN, ExpressRoute
Host & VM security: endpoint protection, patching, Just-in-Time (JIT)
Container and serverless security
Labs / Practical Exercises:
Deploy and configure NSGs, firewall, network isolation
Secure VMs with JIT, endpoint agents
Implement secure networking routes and connectivity
Outcomes:
Harden network architecture and infrastructure
Deploy security controls for compute resources
Mitigate network and perimeter threats
Control access and protect data, applications, and secrets.
Lessons / Topics:
Data security: encryption at rest, in transit
Azure Key Vault: secrets, keys, managed HSM
Secure storage and database services
Application security: API protection, managed identities, service principals
Web app and function security
Labs / Practical Exercises:
Use Key Vault to store secrets and keys
Secure databases and storage accounts
Integrate apps with managed identities
Test encryption and access controls in app services
Outcomes:
Safeguard data using encryption and access policies
Secure key and secret management
Build secure application access with identity-based controls
Monitor, detect, and respond to threats in Azure.
Lessons / Topics:
Azure Monitor, Log Analytics, and Alerts
Azure Sentinel and SIEM integration
Threat detection: Microsoft Defender, vulnerability scanning
Incident response workflows and playbooks
Automation and remediation
Labs / Practical Exercises:
Create alerts and dashboards in Monitor
Configure Sentinel playbooks
Simulate threat events and response
Automate remediation tasks
Outcomes:
Monitor security posture and generate alerts
Detect and investigate threats using analytics
Automate incident response and remediation