Secure Azure services and workloads with Defender for Cloud compliance controls (SC-5002)
placeVeenendaal 23 feb. 2026Toon rooster event 23 februari 2026, 09:00-16:00, Veenendaal |
placeVeenendaal 16 mrt. 2026Toon rooster event 16 maart 2026, 09:00-16:00, Veenendaal |
placeVeenendaal 20 apr. 2026Toon rooster event 20 april 2026, 09:00-16:00, Veenendaal |
Meer weten over de onderwerpen die aan bod komen en de vereiste voorkennis? Neem vrijblijvend contact met ons op.
Deze cursus leert hoe je Azure-services en workloads kunt beveiligen met behulp van Microsoft Cloud Security Benchmark-controls.
Beschrijving
Je studeert in jouw eigen tempo in ons Open Leercentrum onder begeleiding van een gecertificeerde trainer
Deze leerweg helpt je bij het beveiligen van Azure-services en workloads met behulp van de Microsoft Cloud Security Benchmark-controls in Microsoft Defender for Cloud via het Azure-portal.
Vereisten Geen
Onderwerpen
Examine Defender for Cloud regulatory compliance standards- Understand how to use Microsoft Defender for Cloud’s compliance management dashboard.
- Identify and interpret key regulatory compliance standards applicable to your industry.
- Im…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Meer weten over de onderwerpen die aan bod komen en de vereiste voorkennis? Neem vrijblijvend contact met ons op.
Deze cursus leert hoe je Azure-services en workloads kunt beveiligen met behulp van Microsoft Cloud Security Benchmark-controls.
Beschrijving
Je studeert in jouw eigen tempo in ons Open Leercentrum onder begeleiding van een gecertificeerde trainer
Deze leerweg helpt je bij het beveiligen van Azure-services en workloads met behulp van de Microsoft Cloud Security Benchmark-controls in Microsoft Defender for Cloud via het Azure-portal.
Vereisten Geen
Onderwerpen
Examine Defender for Cloud regulatory compliance standards- Understand how to use Microsoft Defender for Cloud’s compliance management dashboard.
- Identify and interpret key regulatory compliance standards applicable to your industry.
- Implement and manage compliance controls within Microsoft Defender for Cloud.
- Conduct regular compliance assessments and generate comprehensive compliance reports.
- Learn how to connect your Azure subscriptions to Microsoft Defender for Cloud.
- Understand the benefits of integrating Azure subscriptions for enhanced security monitoring.
- Explore methods to manage and ensure compliance across connected Azure subscriptions.
- Gain skills to implement best practices for threat protection within your Azure environment.
- Understand the purpose and benefits of using Azure NSG to filter network traffic.
- Learn how to create and configure NSGs to enforce access controls for Azure resources.
- Gain insights into how NSGs can be used to allow or deny specific types of traffic based on source, destination, and port.
- Understand how to prioritize NSG rules and leverage Azure NSG flow logs for monitoring and troubleshooting.
- Recognize the role of NSGs in implementing network security best practices in Azure.
- Understand the importance of a centralized logging solution like Azure Log Analytics workspace for Microsoft Defender for Cloud.
- Learn how to create and configure a Log Analytics workspace in Azure.
- Gain insights into collecting and analyzing security data from Microsoft Defender for Cloud within the Log Analytics workspace.
- Understand how to create custom queries and alerts to proactively detect security threats and incidents.
- Recognize the benefits of integrating Log Analytics workspace with other Azure services and tools.
- Understand the importance of a centralized log collection and analysis solution in Microsoft Defender for Cloud.
- Learn how to configure and deploy the Log Analytics agent in Azure.
- Gain insights into creating and configuring a Log Analytics workspace for Defender for Cloud.
- Understand how to integrate the Log Analytics workspace with Defender for Cloud to collect and analyze security logs.
- Recognize the benefits of leveraging centralized log analytics for proactive security monitoring and threat detection.
- Understand the risks associated with open management ports on virtual machines.
- Learn how to implement JIT VM access using Microsoft Defender for Cloud.
- Explore how JIT VM access reduces attack surfaces in Azure and AWS environments.
- Gain skills to configure and manage temporary, controlled access to VMs for authorized users.
- Understand the importance of configuring networking settings for Azure Key Vault in ensuring secure access and communication.
- Learn how to configure network access control for Azure Key Vault using virtual network service endpoints and private endpoints.
- Gain insights into configuring firewall rules and virtual network service endpoints to restrict access to Key Vault.
- Understand the process of configuring private endpoints to securely access Key Vault from virtual networks.
- Recognize the benefits of properly configuring networking settings for Azure Key Vault in enhancing overall security.
- Understand the importance of using Azure Private Endpoint to establish secure connections to Azure SQL Server.
- Learn how to configure and create an Azure Private Endpoint for Azure SQL Server in the Azure portal.
- Gain insights into the network architecture and components involved in setting up an Azure Private Endpoint.
- Understand how to validate and test the connection between the Azure Private Endpoint and Azure SQL Server.
- Recognize the benefits of using Azure Private Endpoint for securing database connections and isolating network traffic.
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

