<p/><br></br><p><b> Book Synopsis </b></p></br></br><p><b>Chapter 1: Understanding the Importance of Data/Application Security</b><b></b></p> <p><b>Chapter Goal: </b>Give general overview on importance of data security </p> <p><b>No of pages</b>: 5</p> <p><b>Sub -Topics</b> </p> <p>1. Introduction to security</p> <p>2. Introduction to Azure security fundamentals</p> <p> </p> <p><b>Chapter 2: Overview of Basic Azure Security Components</b><b></b></p> <p><b>Chapter Goal: </b>Introduction to various security components in Azure and how to utilize them. </p> <p><b>No of pages</b>: 15</p> <p><b>Sub - Topics</b> </p> 1. Introduction to Azure Management groups and subscriptions<p></p> <p>2. Azure Management locks</p> <p>3. Introduction to Azure policies</p> <p><b>Chapter 3: Introduction to Azure Active Directory</b><b></b></p> <p><b>Chapter Goal: </b>Lessons to provide hand-on guidance on user access control of the organization using Azure Active Directory.</p> <p><b>No of pages</b> 30 </p> <p><b>Sub - Topics: </b> </p> <p>1. Adding users and groups to the AD</p> <p>2. Manage External Identities</p> <p>3. Enable two factor authentications</p> <p>4. Roles and Administrative units in Azure AD</p> <p>5. Managing Enterprise applications</p> <p>6. Introduction to AD devices</p> <p>7. Azure AD app registration</p> <p>8. Adding custom domains</p> <p></p> <p><b>Chapter 4: Working with Azure Key vault </b><b></b></p> <p><b>Chapter Goal: </b>Step by step guidance to setting up and using azure key vault to achieve several security requirements in the organization.</p> <p><b>No of pages</b>: 15</p> <p> </p> <p><b>Sub - Topics: </b> </p> <p>1. Setting up Key vault</p> <p>2. Key vault access control</p> <p>3. Using KV to save Keys</p> <p>4. Using KV to secure Secrets</p> <p>5. Using KV to keep certificates</p> <p>6. Key vault access policies</p> <p>7. KV networking and security</p> <p> </p> <p><b>Chapter 5: Ensure Azure Application security </b><b></b></p> <p><b>Chapter Goal: </b>Step by step guidance to setting up various security components which helps to secure application hosted in Azure</p> <p><b>No of pages</b>: 40 </p> <p><b>Sub - Topics: </b> </p> <p>1. Keep configurations in central location using Azure Configuration</p> <p>2. Authentication and authorization in Azure App Service</p> <p>3. How to secure application with web application firewall in Azure</p> <p>4. Application Security groups</p> <p></p> <p><b>Chapter 6: Ensure Data Security with Azure Storages</b><b></b></p> <p><b>Chapter Goal: </b>Overview on how data storage security works in Azure</p> <p><b>No of pages</b>: 30 </p> <p><b>Sub - Topics: </b> </p> 1. Setting up azure storage<p></p> 2. Azure storage encryption<p></p> 3. Azure defender for azure storage<p></p> <p> </p> <p> </p> <p><b>Chapter 7: Ensure Security using Azure Virtual Networks</b><b></b></p> <p><b>Chapter Goal: </b>Step by step guide on how to setup virtual networks to enhance the security of the data and infrastructure.</p> <p><b>No of pages</b>: 40
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messages communication@pricearchive.us