Table of Contents
- Securing Azure AD Identities
- Securing Azure Networks
- Securing Remote Access
- Securing Virtual Machines
- Securing Azure SQL Databases
- Securing Azure Storage
- Using Advisor
- Using Microsoft Defender for Cloud
- Using Microsoft Sentinel
- Using Traffic Analytics

