

Microsoft - Secure Your Data at Rest
- Offered byCoursera
- Public/Government Institute
Secure Your Data at Rest at Coursera Overview
Duration | 16 hours |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Secure Your Data at Rest at Coursera Highlights
- Earn a certificate of completion
- Add to your LinkedIn profile
Secure Your Data at Rest at Coursera Course details
- What you'll learn
- Deploy shared access signatures (SAS).
- Enable and monitor database auditing.
- Enable Defender for SQL for advanced threat protection.
- Deploy an Always Encrypted implementation.
- Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection. You must secure data at rest as this will safeguard sensitive information, prevent unauthorized access, meet regulatory compliance, and ensure data confidentiality and integrity. By the end of this course, you will be able to:
- - Deploy shared access signatures (SAS).
- - Generate SAS tokens.
- - Manage storage account access keys and key rollover.
- - Manage Azure Active Directory storage authentication.
- - Implement storage service encryption.
- - Configure blob data retention policies.
- - Configure Azure Files authentication.
- - Enable SQL database authentication with Azure Active Directory.
- - Monitor your database.
- - Enable and monitor database auditing.
- - Implement data discovery and classification.
- - Enable Defender for SQL for advanced threat protection.
- - Secure your data with dynamic data masking.
- - Implement transparent data encryption.
- - Deploy an Always Encrypted implementation.
Secure Your Data at Rest at Coursera Curriculum
Storage security
Course introduction
What is storage security?
Define data sovereignty
Overview of Azure Storage access
Shared access signatures
Deploy shared access signatures
What are shared keys?
Test key rollover
Overview of stored access policies
Create stored access policies
Module summary
How to be successful in this course
Generate shared access signature tokens
Exercise: Generate shared access signature tokens
Solution: Generate shared access signature tokens
Manage storage account access keys
Exercise: Test key rollover
Solution: Test key rollover
Exercise: Create stored access policies
Solution: Create stored access policies
Module quiz: Storage security
Knowledge check: Shared access signature tokens
Knowledge check: Shared keys
Knowledge check: Storage access policies
Meet and greet
Azure Storage and Azure Files
Manage Azure AD storage authentication
Implement Azure Storage service encryption
Configure blob data retention policies
Enable the Secure transfer required property
Module summary
Azure AD user account authentication
Exercise: Authenticate Azure AD user account for storage
Solution: Authenticate Azure AD user account for storage
Review the difference between blobs and files
Configure Azure Files authentication
Storage security configurations
Exercise: Secure a storage endpoint
Solution: Secure a storage endpoint
Module quiz: Azure Storage and Azure Files
Knowledge check: Azure AD Authentication for storage
Knowledge check: Azure Storage and Azure Files security
Database security and monitoring
Overview of database security
Control who can access your database
Enable SQL Database authentication
Configure SQL Database firewalls
Monitor your database
Enable and monitor database auditing
Advanced data security for Azure SQL Database
Explore vulnerability assessment
Module summary
Additional resources: Control who can access your database
Configure Azure AD authentication
Exercise: Configure Azure AD authentication
Solution: Configure Azure AD authentication
Auditing in practice
Implement data discovery and classification
Exercise: Secure an Azure SQL Database
Solution: Secure an Azure SQL Database
Module quiz: Database security and monitoring
Knowledge check: Authentication and firewalls
Knowledge check: Auditing and monitoring
Defender for Cloud and data masking and encryption
What is Defender for Cloud?
How Defender for Cloud works
When to use Defender for Cloud
Enable Defender for SQL
Secure your data in transit, at rest, and on display
Configure dynamic data masking
Implement transparent data encryption
Deploy Always Encrypted features
Deploy an Always Encrypted implementation
Module summary
Basic and enhanced features of Microsoft Defender for Cloud
Exercise: Enable Defender for SQL
Solution: Enable Defender for SQL
Exercise: Deploy an Always Encrypted Implementation
Solution: Deploy an Always Encrypted Implementation
Course 5 Glossary: Secure Your Data at Rest
Module quiz: Defender for Cloud and data masking and encryption
Knowledge check: Defender for Cloud
Knowledge check: Data masking and encryption
Project and graded assessment
Course summary
About the graded assessment
Congratulations
Next steps
About the course project
Graded assessment: Secure Your Data at Rest
Course project
Compare your work
Share helpful hints