001. Part 1. First steps
002. Chapter 1. About Azure security
003. Chapter 1. Shared responsibility model
004. Chapter 1. Azure security serices
005. Chapter 1. The threat landscape
006. Chapter 1. Cloud security challenges
007. Chapter 1. Digital mediealism
008. Chapter 1. The zero trust security model
009. Chapter 1. Defense in depth
010. Chapter 1. Summary
011. Chapter 2. Securing identities in Azure The four pillars of identity and Azure Actie Directory
012. Chapter 2. Authentication
013. Chapter 2. Authorization
014. Chapter 2. Custom roles
015. Chapter 2. Custom roles in action
016. Chapter 2. Identity goernance
017. Chapter 2. Answers to exercises
018. Chapter 2. Summary
019. Part 2. Securing Azure resources
020. Chapter 3. Implementing network security in Azure Firewall, WAF, and DDoS protection
021. Chapter 3. Azure Firewall
022. Chapter 3. Azure Web Application Firewall
023. Chapter 3. Mitigating DDoS attacks
024. Chapter 3. Answers to exercises
025. Chapter 3. Summary
026. Chapter 4. Securing compute resources in Azure Azure Bastion, Kubernetes, and Azure App Serice
027. Chapter 4. Azure Bastion
028. Chapter 4. Securing Kubernetes clusters
029. Chapter 4. What makes container security different
030. Chapter 4. Securing Azure App Serice
031. Chapter 4. Answers to exercises
032. Chapter 4. Summary
033. Chapter 5. Securing data in Azure Storage accounts Azure Key Vault
034. Chapter 5. Securing Azure Key Vault
035. Chapter 5. Summary
036. Chapter 6. Implementing good security hygiene Microsoft Defender for Cloud and Defender CSPM
037. Chapter 6. Cloud security posture management
038. Chapter 6. Cloud security graph
039. Chapter 6. Security goernance
040. Chapter 6. Regulatory compliance
041. Chapter 6. Answers to exercises
042. Chapter 6. Summary
043. Chapter 7. Security monitoring for Azure resources Microsoft Defender for Cloud plans
044. Chapter 7. Microsoft Defender for Cloud plans
045. Chapter 7. Security alerts
046. Chapter 7. Workflow automation
047. Chapter 7. Exporting data
048. Chapter 7. Workbooks
049. Chapter 7. Answers to exercises
050. Chapter 7. Summary
051. Part 3. Going further
052. Chapter 8. Security operations and response Microsoft Sentinel
053. Chapter 8. Microsoft Sentinel
054. Chapter 8. Data collection
055. Chapter 8. Analytics rules
056. Chapter 8. Incidents
057. Chapter 8. User and entity behaior analytics
058. Chapter 8. Security orchestration, automation, and response
059. Chapter 8. Automation rules
060. Chapter 8. Answers to Exercises
061. Chapter 8. Summary
062. Chapter 9. Audit and log data Azure Monitor
063. Chapter 9. Azure Monitor
064. Chapter 9. Diagnostic settings
065. Chapter 9. Data collection rules
066. Chapter 9. Alert rules
067. Chapter 9. Answers to exercises
068. Chapter 9. Summary
069. Chapter 10. Importance of goernance Azure Policy and Azure Blueprints
070. Chapter 10. Getting started with Azure Policy
071. Chapter 10. Custom policies
072. Chapter 10. Centralized security policy management
073. Chapter 10. Azure Blueprints
074. Chapter 10. Answers to exercises
075. Chapter 10. Summary
076. Chapter 11. DeSecOps Microsoft Defender for DeOps
077. Chapter 11. What is shifting security left
078. Chapter 11. Infrastructure as code
079. Chapter 11. Microsoft Defender for DeOps
080. Chapter 11. Cybersecurity as an infinite game
081. Chapter 11. Answers to exercises
082. Chapter 11. Summary
083. Appendix. Setting up Azure CLI on your machine
084. Appendix. Setting up Azure CLI on Linux
085. Appendix. Setting up Azure CLI on macOS