Microsoft Cloud Security Training–Security in a Cloud Enabled World


imageKnowledge is power. That’s definitely the case when it comes to security. Maybe even more so with the introduction and integration of public cloud assets into your overall IT portfolio.

All that you know about on-premises security still applies, and much of it is also relevant in the cloud – but there new issues, and new perspectives on established issues, that can help be more effective at protecting your data.

To help you get that knowledge, we’ve put together a great course: Security in a Cloud Enabled World.

In it you’ll learn what Microsoft has learned from responding to customer cybersecurity incidents and from helping customers to defend their cloud assets and to manage the shared security responsibility for cloud services.

Mark Simos from Microsoft Consulting Services and Tim Rains, Chief Security Advisor, Microsoft Worldwide Cybersecurity & Data Protection, lead you through the customer responsibility roadmap in the Microsoft Cloud Security for Enterprise Architects poster and provide recommendations for modernizing each part of your security posture, including governance, containment strategies, security operations, high-value asset protection, information protection, and user and device security, with a particular emphases on protecting administrative control.

Learn from the same framework that the Microsoft cybersecurity team uses to assess customers’ cloud security and to build them a security roadmap.

The course include the following sections:

1 | Introduction and Overview

Hear how the increase in cybersecurity threats and cloud technology has upended a lot of conventional wisdom around computer security.

2 | Trustworthy Cloud Provider

Tim Rains and Mark Simos for a look at the Microsoft commitment to earn customer and partner trust in its cloud services, with a focus on privacy controls, compliance, and certification.

3 | Roadmap 1: Security Strategy, Governance, and Operationalization

Learn about attacker methods, strategic imperatives, hallmarks of good security policy, managing continuous innovative threats, and modernizing a modern security zone and containment strategy.

4 | Roadmap 2: Administrative Control

Take a look at the challenges, strategies, and technologies for administrative control and to help prevent your cloud assets from being compromised.

5 | Roadmap 3: Information and Data Security

Learn about the challenges with protecting information in a modern enterprise and the strategies and technologies to protect your most important business information.

6 | Roadmap 4: User Identity and Device Security

Since user accounts and devices are on the front line of attacks and, in aggregate, have access to most of your corporate assets, learn about strategies and technologies to bolster their protections

7 | Roadmaps 5-8: Application, Network, OS, and Fabric Security

Since many enterprises operate a hybrid of cloud and on-premises assets, explore aspects of security for these layers of the stack and a simple threat model approach to discover and prioritize risks.

8 | Summary

Wrap up with a summary of the most important concepts and recommendations in the course.

Enjoy!

Tom
Tom Shinder
Program Manager, Azure Security Engineering
@tshinder | Facebook | LinkedIn | Email | Web | Bing me! | GOOG me!

image

Comments (0)

Skip to main content