Implement Platform Protection

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Implement Platform Protection

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
Are you a security engineer who wants to learn how to lock down the infrastructure and network resources running in your Azure environment? Then, Implement Platform Protection is the right course for you! Throughout this course, you will explore perimeter security, network security, and host and containers security, along with various security components, tools, solutions, deployment methods, strategies, and services for protecting your Azure environment. You’ll examine connecting networks via peering, implementing hub-and-spoke topology and distributed denial of service (DDoS ) protection, securing solutions with VPNs, traffic control with network virtual appliances (NVAs), and using Azure Web Application Firewall (WAF) to prevent attacks. Within the course, you’ll discover the ins and outs of defense in depth, endpoint protection host security, network client and server technology, privileged access, serverless compute, and virtual machines (VMs). You’ll learn how to configure, deploy, enable, and manage various security solutions, including Azure App Service, Azure Application Gateway, Azure Bastion, Azure Container Instances, Azure Container Registry, Azure Defender, Azure Disk Encryption, Azure ExpressRoute, Azure Firewall and Firewall Manager, Azure Front Door, Azure Functions, Azure Kubernetes Service, Azure Private Link, Azure Security Benchmarks, and Azure Update Management. This is the third course in a series of seven courses that will prepare you to succeed in the AZ-500: Microsoft Azure Security Technologies exam.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop trusting your agent skills with vibes. Eliminate the context security risk.
Learn to eliminate context security risks by using specific tools to audit package installations, rather than relying on intuition
Dev.to · Tessl
Investigating a Command Injection Attack — SOC168: Whoami Command Detected in Request Body |…
Learn to investigate Command Injection attacks using a real-world example on the LetsDefend SOC platform
Medium · Cybersecurity
pwning Facts
Learn to analyze nmap scan results to identify open ports and potential vulnerabilities in a system
Medium · Cybersecurity
Detecting Dangerous Shell Commands in Rust — Building a Safety Layer
Learn to detect dangerous shell commands in Rust and build a safety layer to prevent malicious activity
Dev.to · hiyoyo
Up next
Cryptography
Coursera
Watch →