Coursera
Coursera Logo

Microsoft - Secure Your Data at Rest 

  • Offered byCoursera
  • Public/Government Institute

Secure Your Data at Rest
 at 
Coursera 
Overview

Duration

16 hours

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Secure Your Data at Rest
Table of content
Accordion Icon V3
  • Overview
  • Highlights
  • Course Details
  • Curriculum

Secure Your Data at Rest
 at 
Coursera 
Highlights

  • Earn a certificate of completion
  • Add to your LinkedIn profile
Details Icon

Secure Your Data at Rest
 at 
Coursera 
Course details

What are the course deliverables?
  • What you'll learn
  • Deploy shared access signatures (SAS).
  • Enable and monitor database auditing.
  • Enable Defender for SQL for advanced threat protection.
  • Deploy an Always Encrypted implementation.
More about this course
  • Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection. You must secure data at rest as this will safeguard sensitive information, prevent unauthorized access, meet regulatory compliance, and ensure data confidentiality and integrity. By the end of this course, you will be able to:
  • - Deploy shared access signatures (SAS).
  • - Generate SAS tokens.
  • - Manage storage account access keys and key rollover.
  • - Manage Azure Active Directory storage authentication.
  • - Implement storage service encryption.
  • - Configure blob data retention policies.
  • - Configure Azure Files authentication.
  • - Enable SQL database authentication with Azure Active Directory.
  • - Monitor your database.
  • - Enable and monitor database auditing.
  • - Implement data discovery and classification.
  • - Enable Defender for SQL for advanced threat protection.
  • - Secure your data with dynamic data masking.
  • - Implement transparent data encryption.
  • - Deploy an Always Encrypted implementation.
Read more

Secure Your Data at Rest
 at 
Coursera 
Curriculum

Storage security

Course introduction

What is storage security?

Define data sovereignty

Overview of Azure Storage access

Shared access signatures

Deploy shared access signatures

What are shared keys?

Test key rollover

Overview of stored access policies

Create stored access policies

Module summary

How to be successful in this course

Generate shared access signature tokens

Exercise: Generate shared access signature tokens

Solution: Generate shared access signature tokens

Manage storage account access keys

Exercise: Test key rollover

Solution: Test key rollover

Exercise: Create stored access policies

Solution: Create stored access policies

Module quiz: Storage security

Knowledge check: Shared access signature tokens

Knowledge check: Shared keys

Knowledge check: Storage access policies

Meet and greet

Azure Storage and Azure Files

Manage Azure AD storage authentication

Implement Azure Storage service encryption

Configure blob data retention policies

Enable the Secure transfer required​ property

Module summary

Azure AD user account authentication

Exercise: Authenticate Azure AD user account for storage

Solution: Authenticate Azure AD user account for storage

Review the difference between blobs and files

Configure Azure Files authentication​

Storage security configurations

Exercise: Secure a storage endpoint

Solution: Secure a storage endpoint

Module quiz: Azure Storage and Azure Files

Knowledge check: Azure AD Authentication for storage

Knowledge check: Azure Storage and Azure Files security

Database security and monitoring

Overview of database security

Control who can access your database

Enable SQL Database authentication

Configure SQL Database firewalls

Monitor your database

Enable and monitor database auditing

Advanced data security for Azure SQL Database

Explore vulnerability assessment​

Module summary

Additional resources: Control who can access your database

Configure Azure AD authentication

Exercise: Configure Azure AD authentication

Solution: Configure Azure AD authentication

Auditing in practice

Implement data discovery and classification

Exercise: Secure an Azure SQL Database

Solution: Secure an Azure SQL Database

Module quiz: Database security and monitoring

Knowledge check: Authentication and firewalls

Knowledge check: Auditing and monitoring

Defender for Cloud and data masking and encryption

What is Defender for Cloud?

How Defender for Cloud works

When to use Defender for Cloud

Enable Defender for SQL

Secure your data in transit, at rest, and on display

Configure dynamic data masking

Implement transparent data encryption​

Deploy Always Encrypted features

Deploy an Always Encrypted implementation

Module summary

Basic and enhanced features of Microsoft Defender for Cloud

Exercise: Enable Defender for SQL

Solution: Enable Defender for SQL

Exercise: Deploy an Always Encrypted Implementation

Solution: Deploy an Always Encrypted Implementation

Course 5 Glossary: Secure Your Data at Rest

Module quiz: Defender for Cloud and data masking and encryption

Knowledge check: Defender for Cloud

Knowledge check: Data masking and encryption

Project and graded assessment

Course summary

About the graded assessment

Congratulations

Next steps

About the course project

Graded assessment: Secure Your Data at Rest

Course project

Compare your work

Share helpful hints

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6726 CoursesRight Arrow Icon
qna

Secure Your Data at Rest
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...