What Does MVP Stand For? It’s Not What You Think.
October 7, 2024
Article
This course is part of Microsoft Azure Security Engineer Associate (AZ-500) Professional Certificate
Instructor: Microsoft
Included with
Recommended experience
Intermediate level
Some experience of working with Azure technologies in an administrator-level role in both cloud and hybrid environments.
Recommended experience
Intermediate level
Some experience of working with Azure technologies in an administrator-level role in both cloud and hybrid environments.
Configure and monitor metrics and logs in Azure Monitor.
Manage applications by using Azure Monitor Application Insights.
Implement, configure, and deploy Microsoft Defender for Cloud.
Implement just-in-time VPN access to protect against brute-force attacks.
Add to your LinkedIn profile
13 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
Manage Security Operations, the sixth course in the Microsoft Azure Security Engineer Associate Professional Certificate program, equips you with vital skills to protect Azure resources and data, ensuring regulatory compliance. There are various tools available to manage security operations. You will learn to configure and manage Azure Monitor. You will also learn to enable and manage Microsoft Defender for Cloud. In addition, you will configure and monitor Microsoft Sentinel.
By the end of this course, you will be able to: - Configure and monitor metrics and logs in Azure Monitor. - Manage applications by using Azure Monitor Application Insights. - Create basic Azure Monitor log queries to extract information from log data. - Enable Azure Monitor alerts. - Configure properties for diagnostic logging. - Implement, configure, and deploy Microsoft Defender for Cloud. - Monitor your security status with Microsoft Defender for Cloud. - Implement just-in-time VPN access to protect against brute-force attacks.
In this module, you will learn how to use Azure monitor, Defender for Cloud, and Sentinel to monitor your organization's services. You will explore how to use features of Azure Monitor logs that contain records that show when resources are created or modified. You will also learn to use a full-stack monitoring strategy to improve learner’s ability to identify and mitigate issues across all the layers of their applications and infrastructure to improve the customer experience. In addition, you will learn to configure and monitor metrics and logs and integrate Azure Monitor Application Insights with your applications. You will explore how to use Azure Monitor Application Insights to check the health of applications and resolve issues faster. You will also learn how to enable Log Analytics that helps you monitors cloud and on-premises environments to maintain availability and performance.
10 videos15 readings4 assignments1 discussion prompt
In this module, you will learn how to implement and customize Microsoft Defender for Cloud and how to design and plan an effective Defender for Servers deployment. You will learn how to manage and implement security policies and recommendations to secure and harden your resources. You will explore the brute force attacks and how to implement Just-in-time VM access to protect from brute force attacks. You will also learn about malware threats and how to configure malware detection to protect computers and network from malware.
13 videos13 readings4 assignments
In this module, you will gain an understanding about Microsoft Sentinel and how it works. You will learn about how to enable Microsoft Sentinel for end-to-end security operations. You will learn how to transform or customize data at ingestion time in Microsoft Sentinel. You will learn to use Microsoft Sentinel for instant visualization and analysis of data. You will also learn to use Azure Monitor workbooks to visualize and monitor data. You will explore anomaly detection analytics rules in Microsoft Sentinel. You will learn how to enable rules to create incidents. In addition, you will learn to create custom analytics rules to detect threats. You will learn how to map data fields to entities in Microsoft Sentinel. You will also learn to use playbooks together with automation rules to automate incident response and remediate security threats detected by Microsoft Sentinel. You will explore about how to investigate incidents with Microsoft Sentinel as well as use it to understand the scope and find the root cause of a potential security threat. In addition, you will learn how to use the threat modeling tool develop threat models as a backbone of your security process.
12 videos24 readings4 assignments
In this module, you will attempt a course-level ungraded project and graded assessment.
4 videos1 reading1 assignment1 peer review2 discussion prompts
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more. In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
Microsoft
Course
Microsoft
Course
LearnQuest
Course
Palo Alto Networks
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.