Configuring and Managing Security Operations in Azure
3 H 15 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Overview
- Overview
- Administering governance for security
- Create, assign security policies in Azure Policy
- Configure Security Using Azure Blueprint & Landing Zones
- Create and Configure an Azure Key Vault
- Recommend when to use a Dedicated HSM
- Manage Certificates, Secrets, and Keys
- Managing security posture by using Microsoft Defender for Cloud
- Remediate Security Risks with Microsoft Defender for Cloud
- Assess Compliance with Microsoft Defender for Cloud
- Add Custom Initiatives to Microsoft Defender for Cloud
- Connect Hybrid Cloud and Multi-cloud Environments to Microsoft Defender for Cloud
- Identify and Monitor External Assets Using Microsoft Defender
- AZ-500d : Configuring and managing threat protection by using Microsoft Defender for Cloud
- Enable Workload Protection Services in Microsoft Defender for Cloud
- Configure Microsoft Defender for Servers and Azure SQL Databases
- Manage and Respond to Security Alerts in Microsoft Defender for Cloud
- Configure Workflow Automation by using Microsoft Defender for Cloud
- Evaluate Vulnerability Scans from Microsoft Defender for Server
- AZ-500d : Implementing security monitoring and automation solutions in Azure
- Monitor Security Events by Using Azure Monitor
- Configure Data Connectors in Microsoft Sentinel
- Create and Customize Analytics Rules in Microsoft Sentinel
- Evaluate Alerts, Incidents and Configure Automation in Microsoft Sentinel
Overview



- Episode Description
- Transcript