- Manage Entra Identities
- Users, groups, external identities
- Entra ID Protection: MFA, passwordless, Conditional Access
- Single sign-on (SSO), OAuth, and app registrations
- Privileged Identity Management (PIM), custom roles, and permissions
- Plan and Implement Storage Security
- Access control: Azure Blob, File, Table, Queue
- Protect data: soft delete, versioning, immutable storage
- Encryption: BYOK, double encryption, TDE (databases)
- Auditing and compliance: Purview and dynamic masking
- Plan and Implement Compute Security
- Azure Bastion, Just-in-Time (JIT) VM access
- AKS security: network isolation, monitoring, and authentication
- Disk encryption: ADE, encryption at host, confidential disk encryption
- Monitor and Secure Operations
- Microsoft Defender: Secure Score, compliance, and threat protection
- Azure Key Vault: manage secrets, certificates, and keys
- Azure Monitor: configure and evaluate alerts
- Microsoft Sentinel: analytics, incidents, and automation
- Q&A and Additional Topics
- Recap of key topics: identity, storage, compute, and monitoring
- Answer audience questions
- Explore real-world use cases and advanced scenarios