Summary

Completed

In this module, you explored how to design and evaluate network security solutions as a Microsoft cybersecurity architect. You learned how to assess network designs against Zero Trust principles and the Microsoft cloud security benchmark, segment workloads to limit lateral movement, filter traffic with network security groups and application security groups, manage network posture through Microsoft Defender for Cloud, and monitor network activity with Azure Network Watcher and Microsoft Sentinel. You also evaluated how Microsoft Entra Internet Access and Microsoft Entra Private Access replace legacy proxy and VPN infrastructure with identity-aware, cloud-delivered security controls.

Learning objectives

You learned how to:

  • Evaluate network designs to align with security requirements and best practices
  • Design solutions for network segmentation
  • Design solutions for filtering traffic with network security groups
  • Design solutions for network posture management
  • Design solutions for network monitoring
  • Evaluate solutions that use Microsoft Entra Internet Access
  • Evaluate solutions that use Microsoft Entra Private Access

Learn more

Network design and best practices

Network segmentation

Traffic filtering with network security groups

Network posture management

Network monitoring

Microsoft Entra Internet Access

Microsoft Entra Private Access