We may earn an affiliate commission when you visit our partners.
Course image
Microsoft

Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection. You must secure data at rest as this will safeguard sensitive information, prevent unauthorized access, meet regulatory compliance, and ensure data confidentiality and integrity.

By the end of this course, you will be able to:

- Deploy shared access signatures (SAS).

- Generate SAS tokens.

Read more

Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection. You must secure data at rest as this will safeguard sensitive information, prevent unauthorized access, meet regulatory compliance, and ensure data confidentiality and integrity.

By the end of this course, you will be able to:

- Deploy shared access signatures (SAS).

- Generate SAS tokens.

- Manage storage account access keys and key rollover.

- Manage Azure Active Directory storage authentication.

- Implement storage service encryption.

- Configure blob data retention policies.

- Configure Azure Files authentication.

- Enable SQL database authentication with Azure Active Directory.

- Monitor your database.

- Enable and monitor database auditing.

- Implement data discovery and classification.

- Enable Defender for SQL for advanced threat protection.

- Secure your data with dynamic data masking.

- Implement transparent data encryption.

- Deploy an Always Encrypted implementation.

Enroll now

What's inside

Syllabus

Storage security
In this module, you will gain an understanding about storage security and data sovereignty and how data sovereignty is achieved in Azure. You will learn how to deploy shared access signatures (SAS) and generate and test SAS tokens. You will also understand about storage access policies and how to create these policies. You will learn how to manage storage account access keys and key rollover.
Read more
Azure Storage and Azure Files
In this module, you will learn how to configure Azure AD user account authentication for storage. You will learn how to implement storage service encryption - while the data is at rest and in transit. You will explore the difference between blobs and files. You will also learn how to configure blob data retention policies, Azure files authentication, and a storage account to accept requests from secure connections only by enabling the secure transfer required property. You will also understand how to secure a storage endpoint.
Database security and monitoring
In this module, you will learn to configure which users and applications have access to your SQL databases. You will also learn how to block access to your servers using SQL database firewalls. You will learn how to discover, classify, and audit the use of your data. You will learn to encrypt and protect your data while is it stored in the database. You will gain an understanding about vulnerability assessments, data discovery and classification, and auditing. You will also learn to configure and lock down your SQL database on Azure to protect your corporate data while it is stored. Finally, you will learn how to secure your Azure SQL database to keep your data secure and diagnose potential security concerns as they happen.
Defender for Cloud and data masking and encryption
In this module, you will gain understanding of Defender for Cloud, how it works, its basic and enhanced features, and when to use Defender for Cloud. You will learn how to use data encryption, data masking, firewalls, and auditing to protect databases from attacks. You will also learn how to secure your data in transit, at rest, and on display. You will learn to configure dynamic data masking and implement transparent data encryption. You will also learn to deploy an always encrypted implementation.
Project and graded assessment
In this module, you will attempt a course-level ungraded project and graded assessment.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud
Taught by instructors from Microsoft, a pioneer in cloud computing
Teaches skills, knowledge, and tools that are highly relevant to industry
Uses a multi-modal approach with videos, readings, discussions, and hands-on labs
Suitable for learners looking to develop professional skills or deep expertise in cloud security

Save this course

Save Secure Your Data at Rest to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Secure Your Data at Rest with these activities:
Review Data Encryption Technologies
Begin preparing for your Azure Security Engineer certification by familiarizing yourself with fundamental data encryption technologies.
Browse courses on Encryption
Show steps
  • Review symmetric and asymmetric encryption techniques
  • Explore key management principles and best practices
  • Examine encryption algorithms and their applications
Form a Study Group
Form a study group with your peers to discuss course concepts, share knowledge, and support each other. This collaborative learning experience will reinforce your understanding and enhance your ability to apply what you've learned.
Browse courses on Collaboration
Show steps
  • Identify peers who are interested in forming a study group.
  • Establish regular meeting times and a meeting format.
  • Prepare for each meeting by reviewing the course materials and identifying topics for discussion.
  • Actively participate in the study group discussions, sharing your insights and asking questions.
Setting up Azure Storage Account
Review the detailed steps on how to set up an Azure Storage Account. This will help you master the basics of setting up an Azure Storage Account.
Browse courses on Azure Storage Account
Show steps
  • Go to the Azure portal and sign in.
  • Create a new resource group.
  • Create a new storage account.
  • Configure the storage account settings.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Attend Azure Security Webinars
Attend Azure Security webinars to stay updated on the latest best practices and industry trends in Azure security. This will broaden your knowledge and enhance your ability to secure your data.
Browse courses on Azure Security
Show steps
  • Find upcoming Azure Security webinars.
  • Register for the webinars.
  • Attend the webinars and actively participate.
Configure Blob Storage
Follow a guided tutorial to configure Blob Storage. This will provide a hands-on experience and help you understand the practical implementation of Blob Storage.
Browse courses on Blob Storage
Show steps
  • Find a tutorial on how to configure Blob Storage.
  • Follow the steps in the tutorial.
  • Test your configuration.
Attend an Azure Security Workshop
Participate in an Azure Security workshop to gain practical experience in implementing Azure security features. This hands-on approach will deepen your understanding and enhance your skills.
Browse courses on Azure Security
Show steps
  • Find an Azure Security workshop that aligns with your interests.
  • Register for the workshop.
  • Attend the workshop and actively participate in the hands-on exercises.
Practice Data Encryption
Engage in practice drills to enhance your understanding of data encryption techniques. This will improve your ability to secure data effectively.
Browse courses on Data Encryption
Show steps
  • Find practice drills or exercises on data encryption.
  • Practice encrypting data using different methods.
  • Test your encrypted data to ensure its security.
Contribute to Open-Source Security Projects
Participate in open-source security projects to gain real-world experience and contribute to the Azure security community. This practical involvement will enhance your understanding of security best practices and foster your problem-solving skills.
Show steps
  • Find open-source security projects that interest you.
  • Review the project documentation and identify areas where you can contribute.
  • Submit your contributions to the project.
  • Collaborate with other contributors to improve the security of the project.

Career center

Learners who complete Secure Your Data at Rest will develop knowledge and skills that may be useful to these careers:
Security Architect
Security Architects design and implement security measures to protect an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Security Architects. You will learn about how to implement these measures in Azure, which is a valuable skill for Security Architects.
Privacy Manager
Privacy Managers are responsible for protecting an organization's privacy and data protection policies. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Privacy Managers. You will learn about how to implement these measures in Azure, which is a valuable skill for Privacy Managers.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Information Security Analysts. You will learn about how to implement these measures in Azure, which is a valuable skill for Information Security Analysts.
Security Engineer
Security Engineers are responsible for the security of an organization's information systems. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Security Engineers. You will learn about how to implement these measures in Azure, which is a valuable skill for Security Engineers.
Data Protection Officer
Data Protection Officers are responsible for protecting an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Data Protection Officers. You will learn about how to implement these measures in Azure, which is a valuable skill for Data Protection Officers.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Cybersecurity Analysts. You will learn about how to implement these measures in Azure, which is a valuable skill for Cybersecurity Analysts.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Security Consultants. You will learn about how to implement these measures in Azure, which is a valuable skill for Security Consultants.
Cloud Security Engineer
Cloud Security Engineers are responsible for the security of cloud-based systems and data. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Cloud Security Engineers. You will learn about how to implement these measures in Azure, which is a valuable skill for Cloud Security Engineers.
Data Security Analyst
Data Security Analysts are responsible for protecting data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Data Security Analysts. You will learn about how to implement these measures in Azure, which is a valuable skill for Data Security Analysts.
Data Architect
Data Architects design and build data systems, including security measures to protect data at rest. This course teaches you about storage security, data sovereignty, encryption, and data masking, all of which are essential for Data Architects. You will learn about how to implement these measures in Azure, which is a valuable skill for Data Architects.
Storage Administrator
Storage Administrators are responsible for the management and maintenance of storage systems, including security measures to protect data at rest. This course teaches you about storage security, data sovereignty, encryption, and data masking, all of which are essential for Storage Administrators. You will learn about how to implement these measures in Azure, which is a valuable skill for Storage Administrators.
Penetration Tester
Penetration Testers are responsible for identifying and exploiting vulnerabilities in an organization's information systems. This course teaches you about data discovery and classification, auditing, and threat protection, all of which are essential for Penetration Testers. You will learn about how to implement these measures in Azure, which is a valuable skill for Penetration Testers.
Vulnerability Analyst
Vulnerability Analysts are responsible for identifying and assessing vulnerabilities in an organization's information systems. This course teaches you about data discovery and classification, auditing, and threat protection, all of which are essential for Vulnerability Analysts. You will learn about how to implement these measures in Azure, which is a valuable skill for Vulnerability Analysts.
Database Administrator
Database Administrators are responsible for the maintenance and security of databases, including security measures like encryption and data masking. This course teaches you how to implement these measures in Azure, which is a valuable skill for Database Administrators. You will learn about data discovery and classification, auditing, and threat protection, all of which are essential for keeping databases secure.
Security Compliance Auditor
Security Compliance Auditors are responsible for ensuring that an organization's information systems comply with applicable laws and regulations. This course teaches you about data discovery and classification, auditing, and threat protection, all of which are essential for Security Compliance Auditors. You will learn about how to implement these measures in Azure, which is a valuable skill for Security Compliance Auditors.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Secure Your Data at Rest.
Provides a comprehensive overview of cloud security, including topics covered in the course such as storage security and data encryption.
Comprehensive guide to Azure data services, including topics such as data storage, data analysis, and data protection. It can serve as a valuable resource for understanding the different data services offered by Azure.
Offers practical guidance on securing data in Microsoft Azure, covering topics such as encryption, key management, and data governance.
Provides a structured approach to threat modeling, helping readers identify and mitigate security risks in their systems.
Covers fundamental concepts of cryptography and network security, providing a solid foundation for understanding secure data management.
Provides a comprehensive overview of cloud computing, covering topics such as cloud architectures, cloud services, and cloud security. It can serve as a valuable resource for anyone who wants to understand the fundamentals of cloud computing.
Provides a comprehensive guide to information security risk management, covering topics such as risk assessment, mitigation, and compliance. It can serve as a valuable resource for understanding the principles of risk management in the context of information security.
Provides a comprehensive guide to software architecture, covering topics such as modularity, dependency injection, and testability. It can serve as a valuable resource for software architects and developers who want to design and build high-quality applications.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Secure Your Data at Rest.
Capstone and Practice Exam (AZ-500)
Most relevant
Implement Data Auditing with Azure Data Lake
Most relevant
Data Management with Azure: Implement Compliance Controls
Most relevant
SQL Server Security Fundamentals
Most relevant
Manage Security Operations
Most relevant
Windows Server 2022 Administration
Most relevant
Microsoft 365 Administration: Implementing and Managing...
Most relevant
Secure Access with Azure Active Directory
Most relevant
Configuring Encryption for Data at Rest in Microsoft Azure
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser