Learn to lock down the devices, virtual machines, and other components that run your applications in Azure.
By the end of this module, you will be able to:
- Configure and deploy Endpoint Protection
- Deploy a privileged access strategy for devices and privileged workstations
- Secure your virtual machines and access to them
- Deploy Windows Defender
- Practice layered security by reviewing and implementing Security Center and Security Benchmarks