Auditing Your Azure Assets for Security and Best Practices

Auditing Your Azure Assets for Security and Best Practices
Auditing Your Azure Assets for Security and Best Practices
English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 2h 34m | 337 MB

Enterprise Azure environments are complex and the platform is changing quickly. This course will highlight the areas where mistakes are often made when building and auditing IaaS solutions in Azure.

Building enterprise solutions in Azure IaaS is complex. The platform is rapidly changing. In this course, Auditing Your Azure Assets for Security and Best Practices, you will be given real world advice and guidance to help you tackle the ever-changing Azure world. This course has been designed to highlight the areas where mistakes are often made. First, you will learn about the four pillars of good Azure design: Security, Performance, Support, and Cost. Next, you will explore the major pitfalls with Service Level Agreements, Network, Virtual Machines, Storage, and Backup. Finally, course moves on to cover Azure Advisor and the Security Centre and also perimeter device options. By the end of the course, you will have a different view of Azure and you will be armed with a better understanding of the platform.

Table of Contents

01 - Course Overview
02 - Course Introduction
03 - Main Topics
04 - Summary
05 - Introduction
06 - Why SLAs Are Important
07 - Understanding Virtual Machine SLAs
08 - Understanding Storage SLAs
09 - Understanding Network SLAs
10 - What Happens When SLAs Combine
11 - Summary
12 - Introduction
13 - Core Network Principles
14 - External Access to Azure
15 - Summary
16 - Introduction
17 - Choosing the Right Virtual Machines
18 - Storage Performance and VM Size
19 - Additional Security for Virtual Machines
20 - Summary
21 - Introduction
22 - Determine the Backup Approach
23 - Understanding RPO and RTO
24 - Common Backup and Recovery Mistakes
25 - Notes from the Field
26 - Summary
27 - Introduction
28 - Advisor - High Availability Recommendations
29 - Azure Security Center
30 - Summary
31 - Introduction
32 - Overview Options for Protecting Virtual Machines
33 - Summary
34 - Course Summary