Azure Application Cybersecurity Architecture for Architects and Threat Specialists
Master the art of securing applications on Azure with industry-leading practices in architecture, threat mitigation, and security controls.
...
Share
Introduction to Azure Application Security
Unit 1: Understanding the Azure Security Landscape
Azure's Security Foundation
Shared Responsibility Model
Azure Security Center Intro
Security Center: Secure Score
Security Center: Compliance
Unit 2: Common Threats and Vulnerabilities
Cloud Threat Landscape
OWASP Top 10 in Azure
Misconfigurations
Identity-Related Attacks
Data Exfiltration Risks
Unit 3: Azure Security Services and Features
Azure Active Directory
Azure Key Vault
Azure Monitor for Security
Azure Policy
Network Security Basics
Network Security Controls in Azure
Unit 1: Azure Firewall Fundamentals
Azure Firewall Intro
Firewall Rule Collections
Deploying Azure Firewall
Firewall Logging & Monitoring
Firewall Best Practices
Unit 2: Web Application Firewall (WAF)
WAF: What & Why?
WAF Deployment Options
WAF Rule Sets
Custom WAF Rules
WAF Monitoring & Tuning
Unit 3: Network Security Groups (NSGs)
NSG Fundamentals
Creating NSG Rules
NSG Service Tags
NSG Application Security
NSG Best Practices
Secure Deployment Pipelines with Azure DevOps
Unit 1: Introduction to Secure DevOps
DevSecOps Intro
Azure DevOps Overview
Pipeline Security Risks
Unit 2: Integrating Security Scanning Tools
SAST Tools Intro
DAST Tools Intro
SCA Tools Intro
Integrating SAST in Pipelines
Integrating DAST in Pipelines
Unit 3: Automating Security Testing
Automated Unit Tests
Fuzzing in Pipelines
Security Test Reporting
Unit 4: IaC Security Best Practices
IaC Security Basics
Scanning IaC Templates
Secure IaC Configuration
Unit 5: Securing the Pipeline
Pipeline Access Control
Secrets Management
Security Monitoring and Threat Detection
Unit 1: Azure Monitor for Application Security
Intro to Azure Monitor
Configuring Diagnostic Settings
Querying Logs with KQL
Analyzing Security Logs
Visualizing Data
Unit 2: Azure Security Center for Threat Detection
ASC: Intro and Features
ASC: Security Recommendations
ASC: Threat Alerts
ASC: Custom Alerts
ASC: Regulatory Compliance
Unit 3: Proactive Security Monitoring and SIEM Integration
Custom Dashboards
SIEM Integration
Azure Sentinel Overview
Connect to Azure Sentinel
Sentinel Analytics Rules
Identity and Access Management (IAM) with RBAC
Unit 1: RBAC Fundamentals
RBAC Intro
Azure RBAC Basics
Using Built-In Roles
Custom Roles: Overview
Creating Custom Roles
Unit 2: Azure AD Identity Management
Azure AD Overview
Managing Users & Groups
Conditional Access Intro
CA: Configuring Policies
Unit 3: Securing Service Principals and Managed Identities
Service Principals: Intro
Creating Service Principals
Managed Identities: Intro
Using Managed Identities
Securing Credentials
MFA for Admins
Data Protection Strategies
Unit 1: Encryption Fundamentals in Azure
Intro to Data Encryption
Encryption Options in Azure
Encryption at Rest
Encryption in Transit
Bring Your Own Keys
Unit 2: Azure Key Vault for Key Management
Key Vault Overview
Creating a Key Vault
Secrets Management
Key Management
Certificates Management
Unit 3: Data Loss Prevention (DLP) and Masking
DLP Fundamentals
Azure DLP Capabilities
Implementing DLP Policies
Data Masking Techniques
Tokenization Strategies
Advanced Security Topics and Best Practices
Unit 1: Microservices Security in Azure
Securing Microservices
Container Security
Secrets Management
Monitoring Microservices
Unit 2: Serverless Security in Azure
Serverless Security 101
Function Authentication
Secure Bindings
Statelessness is Key
Unit 3: Cloud-Native Application Security Risks
Supply Chain Attacks
Misconfigurations
Insecure APIs
Unit 4: Threat Modeling and Risk Assessments
Threat Modeling Intro
STRIDE Threat Model
Risk Assessment
Unit 5: Staying Updated with Azure Security
Azure Security Updates