IT Microsoft Azure Security

Course Code: Q3ClaTech551



3 Day(s)

Course Type

Public or Private

Max Delegates


Delivery Style


Learn how to protect Users, Devices and Services in the cloud with Microsoft Azure

The availability of the cloud services Azure offers comes with added risk, understanding how to properly secure users, devices and services in the cloud is a key part of a successful Azure deployment. 

Book Your Course

Start Date





WR1 - Worcester, WR1 3EE




WR1 - Worcester, WR1 3EE








WR1 - Worcester, WR1 3EE







Course confirmed - Guaranteed to run
Course Full/Limited availability
Price shown excluding VAT.

Book a Private Event

If you require the content of this event tailored or have around 7 or more people to train it maybe better for you to host a Private Event, please get in touch to discuss this.

Get in touch


Who is this course for

  • Azure Administrators

  • Security Administrators

  • IT Professionals

  • Cloud Consultants

Purpose of the course

To explain security features in Azure and provide practical exercises of configuring the same.

You will learn how to

Create a secure Azure environment
Secure Data, Devices & Applications
Create different user groups with varying access rights


Experience working with Azure for at least 12 months is recommended before attending this course. 

Benefits for you as an individual

Any organisation that adopts Microsoft products is going to be using Azure services now or in the future, being equipped to secure Azure is a vital part of IT Administration

Benefits for your organisation

Deploying sensitive business data through the cloud without proper security can lead to data loss or leave services vulnerable to attack.

Module 1 – Identity and Access Management

  • Securing AZ AD
  • Identity Management
  • User Policies
  • What is Zero Trust?
  • Key Vault

Module 2 – Azure Platform Security

  • Cloud Security Concepts
  • Cloud Networks
  • Securing containers
  • Securing Azure Resources

Module 3 - Host & Device Secuirty

  • MDM & MAM
  • Implement & Monitor Host Security
  • Securing non Windows Devices
  • Endpoint Protection
  • Remote Access

Module 4 – Securing Data

  • Encryption methods
  • Securing DAR
  • Data Security policies
  • Data Alerts

Module 5 – Application Security

  • Concepts
  • Application Registration
  • Service Endpoints
  • Managed Identities

Get Started

Forget trawling through endless course catalogues – Find the training that’s right for you

Learn More

Latest from our blog

Kanban and Agile: Bridging the Gap

Kanban and Agile: Bridging the Gap Quanta’s Kanban University Certified Trainer Steve Church explores the way in which Agile and…
Read More

How a Ballerina could move into Cybersecurity

Jason Ford, Quanta Cybersecurity and IT Trainer talks about the limitations in Cybersecurity Training courses. Jason discusses a safe and…
Read More

Boost Team Performance and Productivity: Unlocking the Advantages of Emotionally Intelligent Leadership

Quanta People Development and Leadership Trainer, Giles Collins outlines the key elements of Emotionally Intelligent Leadership and how it impacts…
Read More