- Level Professional
- المدة 17 ساعات hours
- الطبع بواسطة Microsoft
-
Offered by
عن
Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection. You must secure data at rest as this will safeguard sensitive information, prevent unauthorized access, meet regulatory compliance, and ensure data confidentiality and integrity. By the end of this course, you will be able to: - Deploy shared access signatures (SAS). - Generate SAS tokens. - Manage storage account access keys and key rollover. - Manage Azure Active Directory storage authentication. - Implement storage service encryption. - Configure blob data retention policies. - Configure Azure Files authentication. - Enable SQL database authentication with Azure Active Directory. - Monitor your database. - Enable and monitor database auditing. - Implement data discovery and classification. - Enable Defender for SQL for advanced threat protection. - Secure your data with dynamic data masking. - Implement transparent data encryption. - Deploy an Always Encrypted implementation.الوحدات
Welcome
1
Discussions
- Meet and greet
1
Videos
- Course introduction
1
Readings
- How to be successful in this course
Shared access signature tokens
1
Assignment
- Knowledge check: Shared access signature tokens
5
Videos
- What is storage security?
- Define data sovereignty
- Overview of Azure Storage access
- Shared access signatures
- Deploy shared access signatures
3
Readings
- Generate shared access signature tokens
- Exercise: Generate shared access signature tokens
- Solution: Generate shared access signature tokens
Shared keys
1
Assignment
- Knowledge check: Shared keys
2
Videos
- What are shared keys?
- Test key rollover
3
Readings
- Manage storage account access keys
- Exercise: Test key rollover
- Solution: Test key rollover
Stored access policies
1
Assignment
- Knowledge check: Storage access policies
2
Videos
- Overview of stored access policies
- Create stored access policies
2
Readings
- Exercise: Create stored access policies
- Solution: Create stored access policies
Graded assessment: Storage security
1
Assignment
- Module quiz: Storage security
1
Videos
- Module summary
Azure AD authentication for storage
1
Assignment
- Knowledge check: Azure AD Authentication for storage
1
Videos
- Manage Azure AD storage authentication
3
Readings
- Azure AD user account authentication
- Exercise: Authenticate Azure AD user account for storage
- Solution: Authenticate Azure AD user account for storage
Azure Storage and Azure Files security
1
Assignment
- Knowledge check: Azure Storage and Azure Files security
3
Videos
- Implement Azure Storage service encryption
- Configure blob data retention policies
- Enable the Secure transfer required property
5
Readings
- Review the difference between blobs and files
- Configure Azure Files authentication
- Storage security configurations
- Exercise: Secure a storage endpoint
- Solution: Secure a storage endpoint
Graded assessment: Azure Storage and Azure Files
1
Assignment
- Module quiz: Azure Storage and Azure Files
1
Videos
- Module summary
Authentication and firewalls
1
Assignment
- Knowledge check: Authentication and firewalls
4
Videos
- Overview of database security
- Control who can access your database
- Enable SQL Database authentication
- Configure SQL Database firewalls
4
Readings
- Additional resources: Control who can access your database
- Configure Azure AD authentication
- Exercise: Configure Azure AD authentication
- Solution: Configure Azure AD authentication
Auditing and monitoring
1
Assignment
- Knowledge check: Auditing and monitoring
4
Videos
- Monitor your database
- Enable and monitor database auditing
- Advanced data security for Azure SQL Database
- Explore vulnerability assessment
4
Readings
- Auditing in practice
- Implement data discovery and classification
- Exercise: Secure an Azure SQL Database
- Solution: Secure an Azure SQL Database
Graded assessment: Database security and monitoring
1
Assignment
- Module quiz: Database security and monitoring
1
Videos
- Module summary
Defender for Cloud
1
Assignment
- Knowledge check: Defender for Cloud
4
Videos
- What is Defender for Cloud?
- How Defender for Cloud works
- When to use Defender for Cloud
- Enable Defender for SQL
3
Readings
- Basic and enhanced features of Microsoft Defender for Cloud
- Exercise: Enable Defender for SQL
- Solution: Enable Defender for SQL
Data masking and encryption
1
Assignment
- Knowledge check: Data masking and encryption
5
Videos
- Secure your data in transit, at rest, and on display
- Configure dynamic data masking
- Implement transparent data encryption
- Deploy Always Encrypted features
- Deploy an Always Encrypted implementation
2
Readings
- Exercise: Deploy an Always Encrypted Implementation
- Solution: Deploy an Always Encrypted Implementation
Graded assessment: Defender for Cloud and data masking and encryption
1
Assignment
- Module quiz: Defender for Cloud and data masking and encryption
1
Videos
- Module summary
1
Readings
- Course 5 Glossary: Secure Your Data at Rest
Project
1
Peer Review
- Course project
1
Discussions
- Compare your work
1
Videos
- Course summary
1
Readings
- About the course project
Graded assessment: Secure Your Data at Rest
1
Assignment
- Graded assessment: Secure Your Data at Rest
1
Discussions
- Share helpful hints
1
Videos
- About the graded assessment
Course wrap-up
2
Videos
- Congratulations
- Next steps
Auto Summary
Secure Your Data at Rest, part of the Microsoft Azure Security Engineer Associate Professional Certificate, focuses on safeguarding sensitive information in storage. Taught by Coursera, this IT & Computer Science course covers storage security, data sovereignty, encryption, and advanced threat protection using Defender for Cloud. Ideal for professionals, it spans 1020 minutes and offers Starter subscriptions. Learn to deploy SAS, manage Azure AD storage authentication, enable database auditing, and implement robust encryption techniques.

Microsoft