• Online, Self-Paced
Course Description

In this challenge, you will implement an end-to-end security solution by using Azure SQL Database. First, you will deploy an Azure virtual machine that hosts SQL Server, and then you will deploy an Azure SQL database. Next, you will enable SQL auditing, and then you will create a virtual network service endpoint. Next, you will encrypt a column by using Always Encrypted, and then you will configure Azure Disk Encryption on an Azure virtual machine. Finally, you will create an alert rule for monitoring an Azure SQL database. Note: Once you begin the challenge, you will not be able to pause, save, or exit and then return to your challenge. Please ensure that you have set aside enough time to complete the challenge before you start.

Learning Objectives

In this challenge, you will implement an end-to-end security solution by using Azure SQL Database. First, you will deploy an Azure virtual machine that hosts SQL Server, and then you will deploy an Azure SQL database. Next, you will enable SQL auditing, and then you will create a virtual network service endpoint. Next, you will encrypt a column by using Always Encrypted, and then you will configure Azure Disk Encryption on an Azure virtual machine. Finally, you will create an alert rule for monitoring an Azure SQL database. Note: Once you begin the challenge, you will not be able to pause, save, or exit and then return to your challenge. Please ensure that you have set aside enough time to complete the challenge before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.