Microsoft Azure – Architecting Solutions: Securing Resources

This course is designed for IT Professionals working in an administrative role who wish to learn about designing Microsoft Azure-based cloud solutions. Candidates should have a good understanding of core networking skills, security, server administration, and virtualization technologies before attending this course. It is recommended that candidates have already successfully completed the 70-533 and 70-532 certifications.

Prerequisite
None

Expected Duration
142 minutes

Description
One of the biggest concerns with organizations moving to the cloud is security. In this course, you will learn about securing resources in Microsoft Azure. You will look at securing resources by using managed identities, hybrid identities, and identity providers as well as examine how to implement data security solutions and role-based access control strategies.

Objective

Managed Identities

  • start the course
  • recognize the differences between an on-premises active directory implementation and an Azure Active Directory implementation
  • describe the Graph API and how it is used with Managed Identities in Azure
  • use the Graph Explorer with Managed Identities in Azure
  • recognize the features and differences between Azure Active Directory, OAuth, and OpenID Connect
  • configure OAuth to secure access to a resource
  • configure OpenID Connect to secure access to a resource

Hybrid Identities

  • recognize the features of SAML Claims
  • recognize the features of DirSync
  • configure directory synchronization using DirSync
  • recognize the features of Azure Access Control Services (ACS) to support hybrid identities in Azure
  • recognize the features of Active Directory Federated Services (ADFS)
  • configure Active Directory Federated Services to support a hybrid identity solution in Azure

Identity Providers

  • configure Azure Access Control Services (ACS) 2.0 as an identity provider
  • configure Azure Access Control Services to support Facebook authentication
  • configure Azure Access Control Services to support Yahoo! authentication

Data Security Solution Models

  • recognize approaches to data security in Azure
  • configure an Access Control List in Azure
  • recognize the features of Azure Rights Management Services (RMS)
  • configure Azure Rights Management Services

Role-based Access Control Strategy

  • recognize the features of Role-based Access Control (RBAC) in Azure
  • configure Azure Role-based Access Control
  • identify changes to Role Assignments when using Azure Role-based Access Control

Practice: Creating a Security Plan

  • design a plan to implement security for an Azure solution based on a set of requirements

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.