Course Outline

Module 1: Manage Identity and Access for Government

This module covers Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD Privileged Identity Management, and Hybrid Identity for government.

Lessons

  • Azure Active Directory
  • Azure Identity Protection
  • Enterprise Governance
  • Azure AD Privileged Identity Management
  • Hybrid Identity

Lab : Role-Based Access Control for Government

Lab : Azure Policy for Government

Lab : Resource Manager Locks for Government

Lab : MFA, Conditional Access, and AAD Identity Protection for Government

Lab : Azure AD Privileged Identity Management for Government

Lab : Implement Directory Synchronization for Government

After completing this module, students will be able to:

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks for government.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication for government.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews for government.
  • Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources for government.
  • Implement Azure AD Connect including authentication methods and on-premises directory synchronization for government.

Module 2: Implement Platform Protection for Government

This module covers perimeter, network, host, and container security for government.

Lessons

  • Perimeter Security
  • Network Security
  • Host Security
  • Container Security

Lab : Network Security Groups and Application Security Groups for Government

Lab : Azure Firewall for Government

Lab : Configuring and Securing ACR and AKS for Government

After completing this module, students will be able to:

  • Implement perimeter security strategies including Azure Firewall for government.
  • Implement network security strategies including Network Security Groups and Application Security Groups for government.
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption for government.
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes for government.

Module 3: Secure Data and Applications for Government

This module covers Azure Key Vault, application security, storage security, and SQL database security for government.

Lessons

  • Azure Key Vault
  • Application Security
  • Storage Security
  • SQL Database Security

Lab : Key Vault (Implementing Secure Data by setting up Always Encrypted for Government)

Lab : Securing Azure SQL Database for Government

Lab : Service Endpoints and Securing Storage for Government

After completing this module, students will be able to:

  • Implement Azure Key Vault including certificates, keys, and secrets for government.
  • Implement application security strategies including app registration, managed identities, and service endpoints for government.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication for government.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted for government.

Module 4: Manage Security Operations for Government

This module covers Azure Monitor, Azure Security Center, and Azure Sentinel for government.

Lessons

  • Azure Monitor
  • Azure Security Center
  • Azure Sentinel

Lab : Azure Monitor for Government

Lab : Azure Security Center for Government

Lab : Azure Sentinel for Government

After completing this module, students will be able to:

  • Implement Azure Monitor including connected sources, log analytics, and alerts for government.
  • Implement Azure Security Center including policies, recommendations, and just-in-time virtual machine access for government.
  • Implement Azure Sentinel including workbooks, incidents, and playbooks for government.

Requirements

For government learners to succeed in this course, they should have prior knowledge and understanding of:

  • Security best practices and industry security requirements for government, including defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and the zero trust model.
  • Familiarity with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), and disk and data encryption methods.
  • Some experience deploying Azure workloads. This course does not cover the basics of Azure administration; instead, it builds on that knowledge by adding security-specific information for government use.
  • Experience with Windows and Linux operating systems and scripting languages. Course labs may utilize PowerShell and the Command-Line Interface (CLI).
 28 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories