We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Implementing Microsoft Azure Subscription Security

Michael Teske

This course identifies the resources, tools, and methods needed to maintain the security across your Azure subscriptions.

Read more

This course identifies the resources, tools, and methods needed to maintain the security across your Azure subscriptions.

Shifting to the cloud requires quite a bit of thought and analysis. It's critical to think about how you can govern what your users have the rights to do within your company’s subscriptions. In this course, Implementing Microsoft Azure Subscription Security, you will learn what controls and features you can use to ensure you’re able to control who can deploy those resources, what they can deploy, and what they can do after deployment. First, you will make management groups to better organize and manage your subscription resources. Next, you will create policies to ensure your Azure assets remain in compliance and remediated if not. Finally, you will enforce the practice of least privilege by locking down resources through access control and resource locks. When you’re finished with this course, you will have the skills and knowledge to set guardrails and manage the governance over your entire Azure environment.

Enroll now

What's inside

Syllabus

Course Overview
Identifying Azure Subscription Management Resources
Configuring Microsoft Azure Subscription Security
Securing Azure Resources
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches the essential concepts of Azure security governance
Provides practical guidance on implementing and managing Azure subscription security
Taught by experienced Microsoft expert Michael Teske
Covers a broad range of topics, from management groups to access control
Suitable for IT professionals, cloud architects, and security engineers
Requires Azure experience and basic understanding of cloud security principles

Save this course

Save Implementing Microsoft Azure Subscription Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Implementing Microsoft Azure Subscription Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Implementing Microsoft Azure Subscription Security will develop knowledge and skills that may be useful to these careers:
IT Security Manager
As an IT Security Manager, you will be responsible for overseeing the security of your organization's IT systems and networks. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any IT Security Manager.
Cloud Security Architect
As a Cloud Security Architect, you will be responsible for designing and implementing security measures for your organization's cloud computing environment. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Cloud Security Architect.
Security Engineer
In your role as a Security Engineer, you will be responsible for protecting your organization's computer systems and networks from cyberattacks. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Security Engineer.
Azure Administrator
As an Azure Administrator, you will be responsible for managing your organization's Azure environment. This course will help you to understand how to secure your Azure environment, including how to create and manage security policies and how to monitor for security threats.
Security Operations Center Analyst
As a Security Operations Center Analyst, you will be responsible for monitoring your organization's IT systems and networks for security threats. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Security Operations Center Analyst.
Network Security Engineer
As a Network Security Engineer, you will be responsible for designing and implementing security measures for your organization's computer networks. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Network Security Engineer.
Penetration Tester
As a Penetration Tester, you will be responsible for testing your organization's IT systems and networks for security vulnerabilities. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Penetration Tester.
DevOps Engineer
As a DevOps Engineer, you will be responsible for developing and maintaining your organization's software applications. This course will help you to understand how to secure your Azure environment, which is essential for protecting your organization's data and applications.
Incident Responder
In your role as an Incident Responder, you will be responsible for responding to cybersecurity incidents. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Incident Responder.
Cybersecurity Analyst
In your role as a Cybersecurity Analyst, you will be responsible for investigating and responding to cybersecurity incidents. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Cybersecurity Analyst.
Information Security Analyst
As an Information Security Analyst, you will be responsible for identifying and mitigating security risks to your organization. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Information Security Analyst.
Information Technology Auditor
As an Information Technology Auditor, you will be responsible for auditing your organization's IT systems and networks for security vulnerabilities. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Information Technology Auditor.
Security Consultant
As a Security Consultant, you will be responsible for providing security advice and guidance to organizations. This course will help you to understand how to secure your Azure environment and protect your organization's data, which are essential skills for any Security Consultant.
Cloud Architect
As a Cloud Architect, you will design, build, and manage cloud computing solutions. This course will help you to understand how to secure your Azure environment and protect your organization's data, which is an essential skill for any Cloud Architect.
Chief Information Security Officer
In your role as Chief Information Security Officer, you will be responsible for protecting your organization from cyberattacks. This course, Implementing Microsoft Azure Subscription Security, may be useful in helping you to understand how to secure your Azure environment and protect your organization's data.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Implementing Microsoft Azure Subscription Security.
Provides a comprehensive overview of cloud computing security. It good reference for readers who want to understand the fundamentals of cloud computing security and related topics in depth.
Provides a comprehensive overview of security engineering principles and practices. It good reference for readers who want to understand the fundamentals of security engineering.
Azure comprehensive cloud platform that you can use to build, deploy, and manage applications in a variety of ways. will help you learn the basics of Azure quickly and easily.
Offers readers best practices and practical guidance for building secure and reliable Azure infrastructure.
Details best practices and architectural guidance for implementing robust identity and access management solutions for Azure.
Provides readers with practical recipes for implementing identity and access management solutions in Azure.
Provides a practical overview of cloud computing concepts, technologies, and services. It good reference for readers who want to understand the basics of cloud computing.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Implementing Microsoft Azure Subscription Security.
Configure Secure Workloads Access using Azure Networking
Most relevant
Securing the Application Lifecycle in Microsoft Azure
Most relevant
Mastering Microsoft Azure Governance
Most relevant
Microsoft Azure DevOps Engineer: Implementing...
Most relevant
Deploy Machine Learning Models in Azure
Most relevant
Azure Virtual Desktop: Plan and Implement Identity and...
Most relevant
Microsoft Azure Security - Getting Started
Most relevant
Azure Security Engineer Associate (AZ-500): Manage...
Manage Resources in Azure
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser