Security is a key part of any well-architected design. In this book, you will gain both the knowledge and the practical skills to significantly reduce the attack surface of your Azure workloads and protect your organization from constantly evolving threats to public cloud environments such as Azure.
Beyond preparing you for the Azure Security Engineer certification exam (AZ-500), this book will help you gain a clear understanding of how to secure your Azure environments and workloads using native Azure security capabilities.
This book is a comprehensive security guide for those who are looking to take the AZ-500 exam and for those who are interested in securing their Azure infrastructure. Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide will take you beyond the foundations of Azure security. You will not only learn about security technologies in Azure but also how to configure and manage them.
By the end of this book, you will be well-versed in different Azure security technologies/ services and will also have learned how to protect your Azure infrastructure from modern threats.
Who this book is for
This book is for new and experienced security professionals, cloud administrators, architects, and developers with an interest in understanding Azure platform security and how to implement workload security in Azure.
Technical professionals who are preparing to take the Azure Security Engineer certification exam (AZ-500) will also benefit tremendously from reading this book.
What this book covers
Chapter 1, Introduction to Azure Security, helps you to understand how security works in Azure and set up a practice environment.
Chapter 2, Understanding Azure AD, helps you to understand what Azure Active Directory (AD) is and how to implement identity management.
Chapter 3, Azure AD Hybrid Identity, covers how to implement Azure AD hybrid identity and configure its status.
Chapter 4, Azure AD Identity Security, covers how to protect Azure AD identities with advanced identity security best practices.
Chapter 5, Azure AD Identity Governance, covers how to protect privileged access using Azure AD Privileged Identity Management.
Chapter 6, Implementing Perimeter Security, covers how to implement platform perimeter protection to secure Azure workloads.
Chapter 7, Implementing Network Security, covers how to configure network security best practices for IaaS and PaaS.
Chapter 8, Implementing Host Security, covers how to implement host security best practices in Azure.
Chapter 9, Implementing Container Security, covers how to implement container security best practices in Azure.
Chapter 10, Implementing Storage Security, covers how to protect data in Azure Storage using multilayered security.
Chapter 11, Implementing Database Security, covers how to protect Azure SQL databases against unauthorized access, data theft, and vulnerabilities.
Chapter 12, Implementing Secrets, Keys, and Certificates Management with Key Vault, covers how to secure privileged application configuration and credentials using Key Vault.
Chapter 13, Azure Cloud Governance and Security Operations, covers how to implement Azure cloud governance, address cloud security challenges with Security Center, and manage security operations with Azure Sentinel.
- 关于本书的内容介绍、目录、详情等请在 Amazon、Goolge Books 等售书网站搜索查看，本站仅展示封面作为参考。
- 如无特殊说明，本站提供的所有pdf均为文字版（aka True PDF or Digitally Created PDF）。
扫描下方二维码添加微信号 bookyage 回复本书编号 271609 即可，我们会尽快（一般24小时之内）将本书PDF文件以百度网盘链接的形式发送给您。