WSQ , IBF, SkillsFuture, PEI Approved Training Provider

SC-5002 Secure Azure Services and Workloads with Microsoft Defender for Cloud Regulatory Compliance Controls

This course provides a comprehensive guide to securing Azure services and workloads using Microsoft Defender for Cloud. Learn to implement regulatory compliance controls, configure network security groups, enable just-in-time virtual machine access, and secure Azure Key Vault with best practices. Gain hands-on experience in deploying Azure Monitor Agent, collecting security data, and enhancing cloud security with Microsoft’s compliance benchmarks. Understand how to protect cloud resources, enforce security policies, and monitor virtual machines for potential threats.

Through practical exercises, you will configure Defender for Cloud, create Log Analytics workspaces, and apply advanced security measures to safeguard Azure environments. This course is designed for cloud security professionals, IT administrators, and compliance officers looking to enhance their skills in securing Azure workloads. By the end of this training, you will be equipped to strengthen cloud security, improve regulatory compliance, and mitigate risks using Microsoft Defender for Cloud.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant Applications

No funding is available for this course.

Course Code: C217

Fee

$350.00 (GST-exclusive)
$381.50 (GST-inclusive)

The course fee listed above is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

Course Date

Course Time

* Required Fields

Post-Course Support

  • We provide free consultation related to the subject matter after the course.
  • Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts.

Course Cancellation/Reschedule Policy

  • You can register your interest without upfront payment. There is no penalty for withdrawal of the course before the class commerce.
  • We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% for any paid amount.
  • Note the venue of the training is subject to changes due to availability of the classroom

Course Details

Topic 1 Examine Defender for Cloud regulatory compliance standards

  • Regulatory compliance standards in Defender for Cloud
  • Microsoft cloud security benchmark in Defender for Cloud
  • Improve your regulatory compliance in Defender for Cloud

Topic 2 Enable Defender for Cloud on your Azure subscription

  • Connect your Azure subscriptions
  • Exercise - Configuring Microsoft Defender for Cloud for Enhanced Protection

Topic 3 Filter network traffic with a network security group using the Azure portal

  • Azure resource group
  • Azure Virtual Network
  • How network security groups filter network traffic
  • Application security groups
  • Create a virtual network infrastructure

Topic 4 Create a Log Analytics workspace

  • Log Analytics workspace
  • Create a Log Analytics workspace

Topic 5 Collect guest operating system monitoring data from Azure and hybrid virtual machines using Azure Monitor Agent

  • Deploy the Azure Monitor Agent
  • Collect data with Azure Monitor Agent
  • Create a data collection rule and install the Azure Monitor Agent

Topic 6 Explore just-in-time virtual machine access

  • Understand just-in-time virtual machine access
  • Enable just-in-time access on virtual machines
  • Enable just-in-time access on virtual machines

Topic 7 Configure Azure Key Vault networking settings

  • Azure Key Vault basic concepts
  • Best practices for Azure Key Vault
  • Azure Key Vault network security
  • Configure Azure Key Vault firewalls and virtual networks
  • Configure Key Vault networking settings
  • Azure Key Vault soft delete overview
  • Virtual network service endpoints for Azure Key Vault
  • Enable soft delete in Azure Key Vault

Course Info

Promotion Code

Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.

Minimum Entry Requirement

Knowledge and Skills

  • Able to operate using computer functions
  • Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

Attitude

  • Positive Learning Attitude
  • Enthusiastic Learner

Experience

  • Minimum of 1 year of working experience.

Target Age Group: 21-65 years old

Minimum Software/Hardware Requirement

Software:

You can download and install the following software:

Hardware: Windows and Mac Laptops

Job Roles

  • Cloud Security Engineer
  • Azure Security Engineer
  • Cybersecurity Analyst
  • Cloud Compliance Specialist
  • Security Operations Center (SOC) Analyst
  • Information Security Officer
  • IT Security Administrator
  • Microsoft Defender for Cloud Specialist
  • Security Architect
  • Compliance and Risk Manager
  • IT Governance Specialist
  • Cloud Infrastructure Engineer
  • Security Threat Analyst
  • Enterprise Security Engineer
  • Azure Solutions Architect
  • Network Security Engineer
  • Identity and Access Management (IAM) Specialist
  • Virtualization Security Expert
  • Incident Response Specialist
  • Security Automation Engineer

Trainers

Man Guo Chang: Man Guo Chang graduated from Nanyang Technological University, School of Electrical and Electronic Engineering, major in Computer Engineering.

He has more than 25 years of working experience in the Semiconductor field, specialized in IC Testing, Inline Electrical Testing, Product & Yield Engineering, Data Analysis, System Engineering, and Software Development. He is also an ACTA certified trainer, currently providing STEM training to adult learners in the area of Computer Vision, Internet of Things, Embedded Electronics, and Python Programming

Richard Wan: Richard Wan is a ACTA certified trainer. Richard Wan has more than 30 years of experience in software development in various computer disciplines, including computer vision, communication and digital publishing.

Technical expertise includes: Windows, Linux developments with C, C++, Delphi (Object Pascal), Visual Studio, OpenCV. Embedded system programming including microcontrollers, Arduino, Pi, BeagleBone etc.

Ken Yuen: Ken Yuen is a ACTA certified trainer. He has more than 10 years of experience working as an instructor, Application Development Engineer, Technical Consultant and Project Manager. He is an MOE-Registered Instructor teaching STEM programs for past 3 years such as Arduino, Micro:bits and robotics to schools and libraries based on the smart nation initiative roadmap.

He completed his Diploma in Electronic Engineering at Singapore Polytechnic and graduated with Bachelor of Electrical and Electronics Engineering from Nanyang Technological University and certified PMP (Project Management Professional).

Customer Reviews (16)

will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 6/2/2024)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
longer and more content with hardware
Integrated with robotics (Posted on 2/4/2022)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Trainee knowledgeable and willing to share solutions. Thanks. (Posted on 3/3/2020)
might consider Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
We spent alot of time troubleshooting other participant's raspberry. It would be good if the class have few sd card or standby pi4 for this course.. morning we have spent more that one 1hr to teoubleshoot 2 other praticipant's raspberry pi.

Advanced raspberry pi requires more days to learn. Advance course for 2 days might be enough. Each module maybe give 2 scenario as the advance requires alot of understanding on how it actually works.

Compile programs and the functions for it. Ex
Vnc - remote desktop
I belief that each lecturer have their preference software to use..

Better to have 1 lecturer to teach as for me ill be taking 5 different course. Worried that i will have 5 different lecturer and if i have a wuestion its hard for me to point out who to send the question to. (Posted on 1/8/2020)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
provide solutions to challenging quizzes

start at 8.30 or 9 am instead of 10 am & end at 5pm sharp. thank you (Posted on 11/6/2019)
Overall, trainer is well versed. Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
The course to start at 8am instead as the practice seesions is not enough as the ortion on Motors and ThingSpeak were not covered in details and has no practice. The SD card were not setup properly and we spent quite a bit of time setting them up and hence intrerrupted the learning. Overall, still a good course to attend.

Could have spent more time on the explanantion of the wrapper program. Overall, trainer is well versed. (Posted on 11/6/2019)
overall the training was good Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Although this is an advance course, the course are simple, easy to follow and practical tools for me to use in my work. The instructor was very knowledgeable in what he was training. He always ensured that I knew and understood all elements of the training. I would recommend it to everyone. (Posted on 5/31/2019)
Might Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Classroom teaching environment and learning tools/resources.

Course participants had earlier informed course administrator of their requirements for course-related tools such as the Raspberry Pi starter kit and laptops for in-class hands-on tasks. However, despite the requests being made via email, the tools were not prepared in advance and thus time was spent on such administrative matters during the actual training. (Posted on 9/5/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 8/21/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 8/20/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Nil (Posted on 6/15/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Check the Raspberry Pi project kit before issuing to the participants. See Further comments for more detail.

Could you please check the wiring of the motor driver and the DC motor, they were of the wrong wire type, It should be a male to male wire instead of a male to female wire for the DC motor. Also, the soldering of the wires to the DC motor driver were poorly done. I had to borrow the trainer's motor driver and motor to follow the course lessons. Also, the connector for the Raspberry Pi Sense Hat is quite loose, the moment i have to disconnect it with the GPIO pins from the Raspberry Pi, The Sense Hat board came off, leaving the connector on the Raspberry Pi GPIO pins itself. I had to redo the soldering for the motor driver and the Dc motor again just to get it connected easily. One comment on the leads of the resistors, they are too thin for them to be placed into the breadboard which required a bit of force from me to get the resistors to have a good connection on the breadboard. (Posted on 5/27/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Have lesser people per course (Posted on 5/20/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Nil (Posted on 3/12/2017)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Will Recommend (Posted on 5/30/2016)
NA Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
NA (Posted on 5/28/2016)

Write Your Own Review

You're reviewing: SC-5002 Secure Azure Services and Workloads with Microsoft Defender for Cloud Regulatory Compliance Controls

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha

You May Be Interested In These Courses

WSQ - Microsoft Security Operations Analyst (SC-200)

WSQ - Microsoft Security Operations Analyst (SC-200)

8 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)
WSQ - Microsoft Cybersecurity Architect (SC-100) Training

WSQ - Microsoft Cybersecurity Architect (SC-100) Training

2 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)
WSQ - Pearson Vue Certified IT Specialist Network Security Training

WSQ - Pearson Vue Certified IT Specialist Network Security Training

$1,000.00 (GST-exclusive)
$1,090.00 (GST-inclusive)
WSQ - ISC2 Information Systems Security Professional (CISSP) Training

WSQ - ISC2 Information Systems Security Professional (CISSP) Training

15 Review(s)
$3,500.00 (GST-exclusive)
$3,815.00 (GST-inclusive)
WSQ - CompTIA Cybersecurity Analyst (CySA+) Training

WSQ - CompTIA Cybersecurity Analyst (CySA+) Training

$2,500.00 (GST-exclusive)
$2,725.00 (GST-inclusive)
WSQ - Navigating Digital Threats: Proactive Measures Against Cyber Frauds and Scams

WSQ - Navigating Digital Threats: Proactive Measures Against Cyber Frauds and Scams

1 Review(s)
$400.00 (GST-exclusive)
$436.00 (GST-inclusive)
WSQ - Cyber Security Awareness Course for Personal and Businesses

WSQ - Cyber Security Awareness Course for Personal and Businesses

230 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
WSQ - CompTIA Certified Security+ Training

WSQ - CompTIA Certified Security+ Training

4 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)
WSQ - Microsoft Azure Security Engineer Associate (AZ-500)

WSQ - Microsoft Azure Security Engineer Associate (AZ-500)

1 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)