We may earn an affiliate commission when you visit our partners.
Ned Bellavance

In this course, you will learn how to apply additional encryption protection for data at rest on Azure resources, including Azure storage, Azure Disk Encryption, Recovery Vaults, Transparent Data Encryption, and Always Encrypted databases.

Read more

In this course, you will learn how to apply additional encryption protection for data at rest on Azure resources, including Azure storage, Azure Disk Encryption, Recovery Vaults, Transparent Data Encryption, and Always Encrypted databases.

Data protection and security is a fundamental tenant of deploying resources in Microsoft Azure. As an administrator, you need to understand the shared responsibility model for Microsoft Azure, and how data security is impacted. In this course, Configuring Encryption for Data at Rest in Microsoft Azure, you will learn how to apply additional encryption protection for Azure resources. First, you will learn about encryption with Azure Storage and the Storage Encryption Service. Then, you will discover how to implement Azure Disk Encryption for Windows and Linux VMs. Finally, you will understand how to implement Transparent Data Encryption and Always Encrypted on Microsoft SQL Databases. When you are finished with this course, you will have the skills necessary to implement data encryption at rest for multiple services in your Azure environment.

Enroll now

What's inside

Syllabus

Course Overview
Introducing Data Protection and Encryption in Azure
Implementing Encryption for Azure Storage
Encrypting Azure Virtual Machines
Read more
Implementing Encryption for Azure Recovery Vaults
Implementing Azure SQL Transparent Data Encryption
Implementing Azure SQ L Database Always Encrypted

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for learners who are new to data security in Microsoft Azure
Helps learners develop skills to protect data in compliance with industry regulation standards
Taught by an experienced instructor in the field
Covers a comprehensive range of encryption technologies
Suitable for learners who want to enhance their data security skills
Provides practical, hands-on exercises in Azure

Save this course

Save Configuring Encryption for Data at Rest in Microsoft Azure to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Configuring Encryption for Data at Rest in Microsoft Azure with these activities:
Walkthrough on Azure Disk Encryption
Solidify learning about Azure Disk Encryption by reviewing a walkthrough on the process.
Show steps
  • Find a walkthrough on Azure Disk Encryption.
  • Follow the walkthrough step-by-step.
  • Take notes or summarize your findings.
Show all one activities

Career center

Learners who complete Configuring Encryption for Data at Rest in Microsoft Azure will develop knowledge and skills that may be useful to these careers:
Cloud Solutions Architect
The Cloud Solutions Architect role is responsible for the design and implementation of cloud computing solutions. This role requires a strong understanding of cloud computing concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Cloud Solutions Architect by providing you with a deep understanding of how to apply additional encryption protection for Azure resources.
Cloud Security Engineer
The Cloud Security Engineer role is responsible for the security of cloud computing environments. This role requires a strong understanding of cloud security concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Cloud Security Engineer by providing you with a deep understanding of how to apply additional encryption protection for Azure resources.
Data Security Analyst
The Data Security Analyst role is responsible for the security of data. This role requires a strong understanding of data security concepts, including encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Data Security Analyst by providing you with a deep understanding of how to apply additional encryption protection for data at rest on Azure resources.
Database Administrator
The Database Administrator role is responsible for the administration of databases. This role requires a strong understanding of database concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Database Administrator by providing you with a deep understanding of how to apply additional encryption protection for databases on Azure.
Information Security Analyst
The Information Security Analyst role is responsible for the security of information systems. This role requires a strong understanding of information security concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Information Security Analyst by providing you with a deep understanding of how to apply additional encryption protection for data at rest on Azure resources.
Security Architect
The Security Architect role is responsible for the design and implementation of security solutions. This role requires a strong understanding of security concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Security Architect by providing you with a deep understanding of how to apply additional encryption protection for data at rest on Azure resources.
Security Consultant
The Security Consultant role is responsible for providing security advice to clients. This role requires a strong understanding of security concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Security Consultant by providing you with a deep understanding of how to apply additional encryption protection for data at rest on Azure resources.
Storage Administrator
The Storage Administrator role is responsible for the administration of storage systems. This role requires a strong understanding of storage concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Storage Administrator by providing you with a deep understanding of how to apply additional encryption protection for storage systems on Azure.
Systems Administrator
The Systems Administrator role is responsible for the administration of computer systems. This role requires a strong understanding of system administration concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course can help you develop the skills needed to be a successful Systems Administrator by providing you with a deep understanding of how to apply additional encryption protection for systems on Azure.
Network Administrator
The Network Administrator role is responsible for the administration of computer networks. This role requires a strong understanding of network administration concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course may help you develop the skills needed to be a successful Network Administrator.
Software Engineer
The Software Engineer role is responsible for the design, development, and testing of software applications. This role requires a strong understanding of software engineering concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course may help you develop the skills needed to be a successful Software Engineer.
Data Analyst
The Data Analyst role is responsible for the analysis of data. This role requires a strong understanding of data analysis concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course may help you develop the skills needed to be a successful Data Analyst.
Business Analyst
The Business Analyst role is responsible for the analysis of business processes. This role requires a strong understanding of business analysis concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course may help you develop the skills needed to be a successful Business Analyst.
Project Manager
The Project Manager role is responsible for the planning and execution of projects. This role requires a strong understanding of project management concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course may help you develop the skills needed to be a successful Project Manager.
Technical Writer
The Technical Writer role is responsible for the creation of technical documentation. This role requires a strong understanding of technical writing concepts, including data security and encryption. The Configuring Encryption for Data at Rest in Microsoft Azure course may help you develop the skills needed to be a successful Technical Writer.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Configuring Encryption for Data at Rest in Microsoft Azure.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Configuring Encryption for Data at Rest in Microsoft Azure.
Secure Your Data at Rest
Most relevant
Design a Data Protection Strategy with Microsoft Azure
Most relevant
Authorization and Managing Identity in Azure
Most relevant
Logging and Monitoring Tools in Azure
Most relevant
Implement Platform Protection
Most relevant
Creating Security Baselines in Microsoft Azure
Most relevant
Designing a Data Archiving Strategy on Microsoft Azure
Most relevant
AWS: Data Protection and Security Governance
Most relevant
Implementing Blob Storage in Azure
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser