Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls - Applied Skills workshop Training in Saudi Arabia

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 1 Day
  • Level: Intermediate
  • Price: Please contact for booking options
  • Upcoming Date:
  • UK & Türkiye Based Global Training Provider

This workshop guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.

We can organize this training at your preferred date and location. Contact Us!

Prerequisites

  • Practical experience in administration of Microsoft Azure and hybrid environments.
  • Strong familiarity with compute, network, and security in Azure, as well as Microsoft Entra ID.
  • Familiarity with security management and vulnerability remediation techniques.
  • Knowledge of threat modeling and implementation of threat protection measures.

Training Outline

Module 1: Filter network traffic with a network security group using the Azure portal

In this module, we will focus on filtering network traffic using Network Security Groups (NSGs) in the Azure portal. Learn how to create, configure, and apply NSGs for improved network security.

  • Introduction
  • Azure resource group
  • Azure Virtual Network
  • How network security groups filter network traffic
  • Application security groups
  • Exercise - Create a virtual network infrastructure
  • Knowledge check
  • Summary

Module 2: Create a Log Analytics workspace for Microsoft Defender for Cloud

In this module, you'll discover how to create a Log Analytics workspace in the Azure portal for Microsoft Defender for Cloud, improving data collection and security analysis.

  • Introduction
  • Defender for Cloud monitoring components
  • Exercise - Create a workspace
  • Knowledge check
  • Summary

Module 3: Set up Microsoft Defender for Cloud

In this module, you'll learn how to implement Microsoft Defender for Cloud using the Azure portal, to strengthen security and threat detection in your Azure environment.

  • Introduction
  • Implement Microsoft Defender for Cloud
  • Security posture
  • Workload protections
  • Deploy Microsoft Defender for Cloud
  • Exercise - Enable Defender for Cloud on your Azure subscription
  • Azure Arc
  • Azure Arc capabilities
  • Microsoft cloud security benchmark
  • Improve your regulatory compliance.
  • Configure Microsoft Defender for Cloud policies
  • View and edit security policies
  • Manage and implement Microsoft Defender for Cloud recommendations
  • Explore secure score
  • MITRE Attack matrix
  • Define brute force attacks
  • Understand just-in-time VM access
  • Implement just-in-time VM access
  • Exercise - Enable just-in-time access on Virtual Machines
  • Knowledge check
  • Summary

Module 4: Configure and integrate a Log Analytics agent and workspace in Defender for Cloud

This module will guide you to configure and integrate a Log Analytics agent with a workspace in Defender for Cloud via the Azure portal, boosting security analysis.

  • Introduction
  • Collect data from your workloads with the Log Analytics agent
  • Configure the Log Analytics agent and workspace
  • Exercise - Collect data from your workloads with the Log Analytics agent
  • Knowledge check
  • Summary

Module 5: Configure Azure Key Vault networking settings

In this module, you'll learn to configure Azure Key Vault networking settings via the Azure portal, ensuring secure and controlled access to your stored secrets.

  • Introduction
  • Azure Key Vault basic concepts
  • Best practices for Azure Key Vault
  • Azure Key Vault security
  • Configure Azure Key Vault firewalls and virtual networks
  • Exercise - Configure Key Vault firewall and virtual networks
  • Azure Key Vault soft delete overview
  • Virtual network service endpoints for Azure Key Vault
  • Exercise - Configure Azure Key Vault recovery management with soft delete and purge protection
  • Knowledge check
  • Summary

Module 6: Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal

This module will guide you on securely connecting an Azure SQL server via Azure Private Endpoint in the Azure portal, enhancing data communication security.

  • Introduction
  • Azure Private Endpoint
  • Azure Private Link1
  • Exercise - Deploy a virtual machine to test connectivity privately and securely to the SQL server across the private endpoint
  • Knowledge check
  • Summary

Why Choose Bilginç IT Academy

At Bilginç IT Academy, we combine our strong presence in both the UK and Türkiye to deliver high-quality, practical training solutions for organizations worldwide.

International Presence with Local Expertise
With operations in the United Kingdom and Türkiye, we bring together global standards and local market understanding to deliver effective training experiences across regions.

Expert Instructors with Real-World Experience
Our courses are delivered by certified trainers with extensive industry experience, ensuring you gain practical knowledge that can be applied immediately.

Corporate-Focused Training Approach
We specialize in training corporate teams, tailoring our programs to meet your organization’s goals, technologies, and project requirements.

Flexible Training Delivery Worldwide
We offer classroom, virtual classroom, and onsite training options globally, tailored to your organization’s needs.

Hands-On, Practical Learning
Our training sessions include real-world scenarios, case studies, and interactive exercises to ensure lasting understanding and skill development.

Proven Track Record
With over 10 years of experience, we have successfully trained professionals from leading organizations across different industries and regions.


Contact us for more detail about our trainings and for all other enquiries!

Avaible Training Dates

Join our public courses in our Saudi Arabia facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
13 Dhuʻl-Qiʻdah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
21 Dhuʻl-Qiʻdah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
22 Dhuʻl-Qiʻdah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
18 Dhuʻl-Hijjah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
21 Dhuʻl-Hijjah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
07 Muharram 1448 (1 Day)
Riyadh, Jeddah, Dammam, Neom
02 Safar 1448 (1 Day)
Riyadh, Jeddah, Dammam, Neom
05 Safar 1448 (1 Day)
Riyadh, Jeddah, Dammam, Neom

Saudi Arabia is currently undergoing one of the most significant digital transformations in modern history under the umbrella of Vision 2030. Riyadh, Jeddah, and the revolutionary smart-city project NEOM are at the forefront of this technological leap, focusing on non-oil economic growth through digital innovation. The Kingdom is investing billions into cloud infrastructure, AI research, and cybersecurity to protect its national interests and support a burgeoning private tech sector. Our educational frameworks in Saudi Arabia are aligned with this national transformation, providing the workforce with essential skills to manage mega-scale digital projects. We empower Saudi professionals to take the lead in building a tech-driven future that honors the Kingdom's heritage while embracing the possibilities of the Fourth Industrial Revolution.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.