Defence in Depth – Securing your Platform in Azure SQL Database by Martin Cairney

Defence in Depth – Securing your Platform in Azure SQL Database by Martin Cairney

$339.00

Defence in Depth – Securing your Platform in Azure SQL Database by Martin Cairney

Abstract: With more data security regulations coming into force globally, are we ensuring that our end-to-end data security is up to scratch? Security can be applied to our databases at various levels – from the infrastructure through the transport to the actual data itself.

This workshop will focus on Azure SQL Database and the security that can be applied both in the service itself and at the database level to reduce your risk of exposure.

Attendees will see how features such as Data Classification and Auditing can be combined to promote a defense in depth approach and implement an early warning system for unusual or inappropriate activities.

PS: This class will be recorded and the registered attendee will get 12 months streaming access to the recorded class. The recordings will be available within 30 days of class completion.

Date & Time:
View in your own time zone
Go to Training Class Page

Discount Code:
Get your 50% Discount Code – Click Here

Description

Defence in Depth – Securing your Platform in Azure SQL Database by Martin Cairney

Abstract: With more data security regulations coming into force globally, are we ensuring that our end-to-end data security is up to scratch? Security can be applied to our databases at various levels – from the infrastructure through the transport to the actual data itself.

This workshop will focus on Azure SQL Database and the security that can be applied both in the service itself and at the database level to reduce your risk of exposure.

Attendees will see how features such as Data Classification and Auditing can be combined to promote a defense in depth approach and implement an early warning system for unusual or inappropriate activities.

Modules:
Topics covered:

  1. Azure Policies
  2. ARM Templates
  3. Firewalls and Connectivity
  4. Advanced Threat Protection
  5. Auditing
  6. Monitoring
  7. Authentication
  8. Encryption
  9. Data Classification
  10. Database Permissions

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.