We may earn an affiliate commission when you visit our partners.
Microsoft

Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection. You must secure data at rest as this will safeguard sensitive information, prevent unauthorized access, meet regulatory compliance, and ensure data confidentiality and integrity.

By the end of this course, you will be able to:

- Deploy shared access signatures (SAS).

- Generate SAS tokens.

Read more

Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection. You must secure data at rest as this will safeguard sensitive information, prevent unauthorized access, meet regulatory compliance, and ensure data confidentiality and integrity.

By the end of this course, you will be able to:

- Deploy shared access signatures (SAS).

- Generate SAS tokens.

- Manage storage account access keys and key rollover.

- Manage Azure Active Directory storage authentication.

- Implement storage service encryption.

- Configure blob data retention policies.

- Configure Azure Files authentication.

- Enable SQL database authentication with Azure Active Directory.

- Monitor your database.

- Enable and monitor database auditing.

- Implement data discovery and classification.

- Enable Defender for SQL for advanced threat protection.

- Secure your data with dynamic data masking.

- Implement transparent data encryption.

- Deploy an Always Encrypted implementation.

Enroll now

What's inside

Syllabus

Storage security
In this module, you will gain an understanding about storage security and data sovereignty and how data sovereignty is achieved in Azure. You will learn how to deploy shared access signatures (SAS) and generate and test SAS tokens. You will also understand about storage access policies and how to create these policies. You will learn how to manage storage account access keys and key rollover.
Read more

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Explores storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud
Taught by instructors from Microsoft, a pioneer in cloud computing
Teaches skills, knowledge, and tools that are highly relevant to industry
Uses a multi-modal approach with videos, readings, discussions, and hands-on labs
Suitable for learners looking to develop professional skills or deep expertise in cloud security

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Secure Your Data at Rest with these activities:
Review Data Encryption Technologies
Begin preparing for your Azure Security Engineer certification by familiarizing yourself with fundamental data encryption technologies.
Browse courses on Encryption
Show steps
  • Review symmetric and asymmetric encryption techniques
  • Explore key management principles and best practices
  • Examine encryption algorithms and their applications
Form a Study Group
Form a study group with your peers to discuss course concepts, share knowledge, and support each other. This collaborative learning experience will reinforce your understanding and enhance your ability to apply what you've learned.
Browse courses on Collaboration
Show steps
  • Identify peers who are interested in forming a study group.
  • Establish regular meeting times and a meeting format.
  • Prepare for each meeting by reviewing the course materials and identifying topics for discussion.
  • Actively participate in the study group discussions, sharing your insights and asking questions.
Setting up Azure Storage Account
Review the detailed steps on how to set up an Azure Storage Account. This will help you master the basics of setting up an Azure Storage Account.
Browse courses on Azure Storage Account
Show steps
  • Go to the Azure portal and sign in.
  • Create a new resource group.
  • Create a new storage account.
  • Configure the storage account settings.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Attend Azure Security Webinars
Attend Azure Security webinars to stay updated on the latest best practices and industry trends in Azure security. This will broaden your knowledge and enhance your ability to secure your data.
Browse courses on Azure Security
Show steps
  • Find upcoming Azure Security webinars.
  • Register for the webinars.
  • Attend the webinars and actively participate.
Configure Blob Storage
Follow a guided tutorial to configure Blob Storage. This will provide a hands-on experience and help you understand the practical implementation of Blob Storage.
Browse courses on Blob Storage
Show steps
  • Find a tutorial on how to configure Blob Storage.
  • Follow the steps in the tutorial.
  • Test your configuration.
Attend an Azure Security Workshop
Participate in an Azure Security workshop to gain practical experience in implementing Azure security features. This hands-on approach will deepen your understanding and enhance your skills.
Browse courses on Azure Security
Show steps
  • Find an Azure Security workshop that aligns with your interests.
  • Register for the workshop.
  • Attend the workshop and actively participate in the hands-on exercises.
Practice Data Encryption
Engage in practice drills to enhance your understanding of data encryption techniques. This will improve your ability to secure data effectively.
Browse courses on Data Encryption
Show steps
  • Find practice drills or exercises on data encryption.
  • Practice encrypting data using different methods.
  • Test your encrypted data to ensure its security.
Contribute to Open-Source Security Projects
Participate in open-source security projects to gain real-world experience and contribute to the Azure security community. This practical involvement will enhance your understanding of security best practices and foster your problem-solving skills.
Show steps
  • Find open-source security projects that interest you.
  • Review the project documentation and identify areas where you can contribute.
  • Submit your contributions to the project.
  • Collaborate with other contributors to improve the security of the project.

Career center

Learners who complete Secure Your Data at Rest will develop knowledge and skills that may be useful to these careers:
Privacy Manager
Privacy Managers are responsible for protecting an organization's privacy and data protection policies. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Privacy Managers. You will learn about how to implement these measures in Azure, which is a valuable skill for Privacy Managers.
Security Architect
Security Architects design and implement security measures to protect an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Security Architects. You will learn about how to implement these measures in Azure, which is a valuable skill for Security Architects.
Cloud Security Engineer
Cloud Security Engineers are responsible for the security of cloud-based systems and data. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Cloud Security Engineers. You will learn about how to implement these measures in Azure, which is a valuable skill for Cloud Security Engineers.
Security Engineer
Security Engineers are responsible for the security of an organization's information systems. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Security Engineers. You will learn about how to implement these measures in Azure, which is a valuable skill for Security Engineers.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Cybersecurity Analysts. You will learn about how to implement these measures in Azure, which is a valuable skill for Cybersecurity Analysts.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Security Consultants. You will learn about how to implement these measures in Azure, which is a valuable skill for Security Consultants.
Data Protection Officer
Data Protection Officers are responsible for protecting an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Data Protection Officers. You will learn about how to implement these measures in Azure, which is a valuable skill for Data Protection Officers.
Data Security Analyst
Data Security Analysts are responsible for protecting data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Data Security Analysts. You will learn about how to implement these measures in Azure, which is a valuable skill for Data Security Analysts.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course teaches you about storage security, data sovereignty, encryption, data masking, and threat protection, all of which are essential for Information Security Analysts. You will learn about how to implement these measures in Azure, which is a valuable skill for Information Security Analysts.
Data Architect
Data Architects design and build data systems, including security measures to protect data at rest. This course teaches you about storage security, data sovereignty, encryption, and data masking, all of which are essential for Data Architects. You will learn about how to implement these measures in Azure, which is a valuable skill for Data Architects.
Storage Administrator
Storage Administrators are responsible for the management and maintenance of storage systems, including security measures to protect data at rest. This course teaches you about storage security, data sovereignty, encryption, and data masking, all of which are essential for Storage Administrators. You will learn about how to implement these measures in Azure, which is a valuable skill for Storage Administrators.
Database Administrator
Database Administrators are responsible for the maintenance and security of databases, including security measures like encryption and data masking. This course teaches you how to implement these measures in Azure, which is a valuable skill for Database Administrators. You will learn about data discovery and classification, auditing, and threat protection, all of which are essential for keeping databases secure.
Penetration Tester
Penetration Testers are responsible for identifying and exploiting vulnerabilities in an organization's information systems. This course teaches you about data discovery and classification, auditing, and threat protection, all of which are essential for Penetration Testers. You will learn about how to implement these measures in Azure, which is a valuable skill for Penetration Testers.
Security Compliance Auditor
Security Compliance Auditors are responsible for ensuring that an organization's information systems comply with applicable laws and regulations. This course teaches you about data discovery and classification, auditing, and threat protection, all of which are essential for Security Compliance Auditors. You will learn about how to implement these measures in Azure, which is a valuable skill for Security Compliance Auditors.
Vulnerability Analyst
Vulnerability Analysts are responsible for identifying and assessing vulnerabilities in an organization's information systems. This course teaches you about data discovery and classification, auditing, and threat protection, all of which are essential for Vulnerability Analysts. You will learn about how to implement these measures in Azure, which is a valuable skill for Vulnerability Analysts.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Secure Your Data at Rest.
Provides a comprehensive overview of cloud security, including topics covered in the course such as storage security and data encryption.
Comprehensive guide to Azure data services, including topics such as data storage, data analysis, and data protection. It can serve as a valuable resource for understanding the different data services offered by Azure.
Offers practical guidance on securing data in Microsoft Azure, covering topics such as encryption, key management, and data governance.
Provides a structured approach to threat modeling, helping readers identify and mitigate security risks in their systems.
Covers fundamental concepts of cryptography and network security, providing a solid foundation for understanding secure data management.
Provides a comprehensive overview of cloud computing, covering topics such as cloud architectures, cloud services, and cloud security. It can serve as a valuable resource for anyone who wants to understand the fundamentals of cloud computing.
Provides a comprehensive guide to information security risk management, covering topics such as risk assessment, mitigation, and compliance. It can serve as a valuable resource for understanding the principles of risk management in the context of information security.
Provides a comprehensive guide to software architecture, covering topics such as modularity, dependency injection, and testability. It can serve as a valuable resource for software architects and developers who want to design and build high-quality applications.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser