Microsoft Logo

SC-5002: Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls Training

SC-5002 teaches you how to secure your Azure environment and meet regulatory compliance requirements using Microsoft Defender for Cloud. You'll cover threat protection, vulnerability management, and compliance controls. If you're responsible for keeping Azure workloads secure and compliant, this is the course.

📘 Security 👥 233 Enrolled ⏱️ 1 Day 💼 Intermediate Level ⭐ 5 | 45 Reviews

Why Microtek Learning?

500+

Courses

10+ Years

Experience

95K+

Global Learners

Virtual Instructor-Led Training

$599
| SC-5002: Secure Azure services and workloads with

Course Overview

This course covers implementing regulatory compliance controls in Azure using Microsoft Defender for Cloud. You'll learn how to secure services and workloads while meeting the compliance standards your organization needs to follow. It's focused on practical implementation rather than just understanding the compliance frameworks.

Mode of Training

🏫 Classroom 💻 Live Online 🧪 Blended 👨‍👩‍👧‍👦 Private Group

Upcoming Schedules

Start Date Time Duration Mode Price
Apr 28, 2026 9:00 am - 5:00 pm 1 Day Online
$599
May 08, 2026 9:00 am - 5:00 pm 1 Day Online
$599
May 28, 2026 9:00 am - 5:00 pm 1 Day Online
$599
Jun 11, 2026 9:00 am - 5:00 pm 1 Day Online
$599
Jun 30, 2026 9:00 am - 5:00 pm 1 Day Online
$599
+ View more schedules

What you will learn

  • Examine Defender for Cloud regulatory compliance standards
  • Enable Defender for Cloud on your Azure subscription
  • Filter network traffic with a network security group using the Azure portal
  • Create a Log Analytics workspace for Microsoft Defender for Cloud
  • Configure and integrate a Log Analytics agent and workspace in Defender for Cloud
  • Explore just-in-time virtual machine access
  • Configure Azure Key Vault networking settings
  • Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal

Who Should Attend This Course?

  • Security Engineer
  • Security Administrator

📞 Talk to a Learning Advisor

Please enter Name
Please enter a valid email address.
Please enter a valid phone number in international format (e.g., +14155552671).
Please enter Message
Please agree to I agree to Terms & Privacy Policy*.
Please agree to I authorize Microtek Learning to contact me via Phone/Email*.

📘 SC-5002: Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls Outline

  • Understand how to use Microsoft Defender for Cloud’s compliance management dashboard
  • Identify and interpret key regulatory compliance standards applicable to your industry
  • Implement and manage compliance controls within Microsoft Defender for Cloud
  • Conduct regular compliance assessments and generate comprehensive compliance reports
  • Learn how to connect your Azure subscriptions to Microsoft Defender for Cloud
  • Understand the benefits of integrating Azure subscriptions for enhanced security monitoring
  • Explore methods to manage and ensure compliance across connected Azure subscriptions
  • Gain skills to implement best practices for threat protection within your Azure environment
  • Lab: Enable Defender for Cloud on your Azure subscription
  • Understand the purpose and benefits of using Azure NSG to filter network traffic
  • Learn how to create and configure NSGs to enforce access controls for Azure resources
  • Gain insights into how NSGs can be used to allow or deny specific types of traffic based on source, destination, and port
  • Understand how to prioritize NSG rules and leverage Azure NSG flow logs for monitoring and troubleshooting
  • Recognize the role of NSGs in implementing network security best practices in Azure
  • Lab: Create a virtual network infrastructure
  • Understand the importance of a centralized logging solution like Azure Log Analytics workspace for Microsoft Defender for Cloud
  • Learn how to create and configure a Log Analytics workspace in Azure
  • Gain insights into collecting and analyzing security data from Microsoft Defender for Cloud within the Log Analytics workspace
  • Understand how to create custom queries and alerts to proactively detect security threats and incidents
  • Recognize the benefits of integrating Log Analytics workspace with other Azure services and tools
  • Lab: Create a Log Analytics workspace for Microsoft Defender for Cloud
  • Understand the importance of a centralized log collection and analysis solution in Microsoft Defender for Cloud
  • Learn how to configure and deploy the Log Analytics agent in Azure
  • Gain insights into creating and configuring a Log Analytics workspace for Defender for Cloud
  • Understand how to integrate the Log Analytics workspace with Defender for Cloud to collect and analyze security logs
  • Recognize the benefits of leveraging centralized log analytics for proactive security monitoring and threat detection
  • Lab: Configure and integrate a Log Analytics agent and workspace agent in Defender for Cloud
  • Understand the risks associated with open management ports on virtual machines
  • Learn how to implement JIT VM access using Microsoft Defender for Cloud
  • Explore how JIT VM access reduces attack surfaces in Azure and AWS environments
  • Gain skills to configure and manage temporary, controlled access to VMs for authorized users
  • Lab: Enable just-in-time access on virtual machines
  • Understand the importance of configuring networking settings for Azure Key Vault in ensuring secure access and communication
  • Learn how to configure network access control for Azure Key Vault using virtual network service endpoints and private endpoints
  • Gain insights into configuring firewall rules and virtual network service endpoints to restrict access to Key Vault
  • Understand the process of configuring private endpoints to securely access Key Vault from virtual networks
  • Recognize the benefits of properly configuring networking settings for Azure Key Vault in enhancing overall security
  • Lab: Configure Key Vault networking settings
  • Lab: Perform soft-delete and purge protection key vault recovery
  • Understand the importance of using Azure Private Endpoint to establish secure connections to Azure SQL Server
  • Learn how to configure and create an Azure Private Endpoint for Azure SQL Server in the Azure portal
  • Gain insights into the network architecture and components involved in setting up an Azure Private Endpoint
  • Understand how to validate and test the connection between the Azure Private Endpoint and Azure SQL Server
  • Recognize the benefits of using Azure Private Endpoint for securing database connections and isolating network traffic
  • Lab: Connect to an Azure SQL server using an Azure Private Endpoint using the Azure portal

Still have questions?

Reach out to our learning advisors for personalized guidance on choosing the right course, group training, or enterprise packages.

📞 Talk to an Advisor

What You Get with Microtek Learning

Instructor-Led Excellence

  • Certified Instructor-led Training
  • Top Industry Trainers
  • Official Student Handbooks

Measurable Learning Outcomes

  • Pre- & Post-Training Assessments
  • Practice Tests
  • Exam-Oriented Curriculum

Real-World Skill Building

  • Hands-on Activities & Scenarios
  • Interactive Online Courses
  • Peer Collaboration (Not in self-paced)

Full Support & Perks

  • Exam Scheduling Support *
  • Learn & Earn Program *
  • Support from Certified Experts
  • Gov. & Private Pricing *

Our Clients

For over 10 years, Microtek Learning has helped organizations, leaders, students and professionals to reach their maximum potential. We have led the path by addressing their challenges and advancing their performances.

Actemium
US Dept of Defense
Education Advisory Board
GE Digital
Department of Homeland Security
Pacific Life
MetLife
AIG
Chase
DC Gov
Johnson & Johnson
William Osler Health System
Google

Our Awards

Microsoft Award

Microsoft Learning
Partner of the Year

Inc 5000

5000 List of the Fastest-Growing Private Companies in America

Top IT Training

Top IT Training Companies
(Multiple Years)

Why We Are Best To Choose?

Team Support

Professional Team Support

Our expert counseling team provides round-the-clock assistance with the best value offers.

Experienced Trainers

Experienced Trainers

Certified trainers with 5–15 years of real-world industry experience guide your learning.

Satisfaction Guarantee

100% Satisfaction Guarantee

We guarantee satisfaction with top-quality content and instructor delivery.

Real-World Experience

Real-World Experience

Train with industry projects and curricula aligned to current standards.

Best Price Guarantee

Best Price Guarantee

We promise the lowest pricing and best offers in the market.

Guaranteed to Run

Guaranteed to Run

All courses are assured to run on scheduled dates via all delivery methods.

Security Learning Resources

Explore our collection of free resources to boost your Security learning journey

Blogs

Security Expert Blogs

Explore insights from industry experts to stay ahead in tech—dive into our Expert Blogs now!

Read Blogs
Talk to Advisor