PodcastsCoursesCyberCode Academy

CyberCode Academy

CyberCode Academy
CyberCode Academy
Latest episode

199 episodes

  • CyberCode Academy

    Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 7: A Comprehensive Guide to Virtual Machine and Container Security

    06/04/2026 | 23 mins.
    In this lesson, you’ll learn about securing infrastructure and application workloads in Microsoft Azure, with a focus on Virtual Machines and containerized environments:Virtual Machine (VM) SecurityUnderstanding the shared responsibility model:Azure secures the cloud
    You secure the OS, applications, and configurations

    Key security practices:Endpoint Protection:Using Microsoft Antimalware or third-party solutions

    OS Hardening:Applying Center for Internet Security benchmarks
    Disabling unnecessary services and tightening permissions

    Identity Management:Using Managed Identities to eliminate hard-coded credentials

    Update Management:Automating patching with Azure Update Management for Windows & Linux

    Container Security FundamentalsUsing containers for lightweight, portable applications with Docker
    Core Azure container services:Azure Container Instances (ACI) – quick, serverless containers
    Azure Container Registry (ACR) – private image storage
    Azure Kubernetes Service (AKS) – container orchestration

    Security best practices:Vulnerability Scanning:Scan images regularly for known exploits

    Trusted Registries:Use private registries instead of public/unverified images

    Registry Protection:Disable admin keys
    Use Azure AD + RBAC
    Enable firewall rules and Content Trust (image signing)

    Container & Orchestration SecuritySecuring container workloads:Implementing network segmentation
    Managing secrets securely (no hardcoding)
    Enforcing least-privilege runtime permissions

    Reducing risks such as:Container escape
    Host takeover
    Unauthorized access

    Orchestration with AKSUnderstanding Kubernetes architecture:Managed control plane (Azure-managed)
    Worker nodes (VMs you manage)
    Workloads organized into pods and namespaces

    Practical operations:Deploying apps using kubectl
    Configuring secure access to ACR using service principals
    Monitoring workloads via Kubernetes dashboard

    Key TakeawaysVM security depends on hardening, patching, and identity control
    Container security requires trusted images and strict access control
    ACR and AKS provide secure, scalable platforms when configured properly
    Defense-in-depth is essential across VMs, containers, and orchestration layers
    This lesson equips you with the skills to secure both traditional VM workloads and modern containerized applications in Azure.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cybercode_academy
  • CyberCode Academy

    Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 6: Azure Network Security

    05/04/2026 | 22 mins.
    In this lesson, you’ll learn about monitoring and securing Azure networks using diagnostic tools and exam-focused strategies in Microsoft Azure:Network Monitoring with Network WatcherUsing Azure Network Watcher to diagnose and analyze network behavior
    Key diagnostic tools include:IP Flow Verify: Identifies which NSG rule allows or blocks traffic
    Packet Capture: Captures and inspects live network traffic
    Effective Security Rules: Displays all applied NSG rules on a VM

    Gaining visibility into:Network performance issues
    Misconfigurations
    Security rule conflicts

    Traffic Logging and AnalyticsEnabling NSG Flow Logs to record inbound and outbound traffic
    Storing logs in Azure Storage Accounts for analysis
    Integrating with Log Analytics Workspace for deeper insights
    Using Traffic Analytics to:Visualize traffic patterns
    Detect anomalies and suspicious behavior
    Identify potential security threats

    Hands-On ConfigurationSetting up:Storage accounts for log retention
    Log Analytics workspaces for querying and visualization

    Monitoring:Communication between resources
    Blocked vs allowed traffic
    High-risk network activity

    AZ-500 Exam PreparationPracticing real-world scenarios focused on platform protection
    Key exam skills include:Determining the minimum number of NSG rules required for secure configurations
    Designing route tables for:Internet-bound traffic
    On-premises connectivity
    Integration with firewalls and NVAs

    Key TakeawaysNetwork Watcher provides deep visibility and troubleshooting capabilities
    Logging and analytics are essential for threat detection and auditing
    Understanding NSGs and routing is critical for both real-world security and the AZ-500 exam
    This lesson strengthens your ability to monitor, analyze, and secure Azure network environments while preparing you for certification success.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cybercode_academy
  • CyberCode Academy

    Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 5: Azure Network Infrastructure and Security

    04/04/2026 | 23 mins.
    In this lesson, you’ll learn about securing Azure network infrastructure and managing hybrid connectivity in Microsoft Azure:Remote Access Management
    Applying operational security best practices:Using dedicated admin workstations to protect credentials

    Securely accessing virtual machines using:Azure Bastion for RDP/SSH over SSL via the Azure portal

    Eliminating exposure of public IPs for management access
    Hybrid Networking Solutions
    Connecting on-premises infrastructure to Azure:Azure VPN for encrypted tunnels over the public internet
    ExpressRoute for private, high-speed enterprise connections
    Network Virtual Appliances (NVAs) for advanced third-party firewall and security capabilities

    Choosing the right solution based on:Performance requirements
    Security needs
    Cost considerations

    Azure Firewall Implementation
    Deploying Azure Firewall as a centralized security layer
    Configuring:Network rules (IP + ports filtering)
    Application rules (FQDN-based filtering)

    Integrating within a hub-and-spoke architecture for:Centralized traffic inspection
    Simplified security management

    Global Application Delivery & Protection
    Using Azure Front Door for:Layer 7 load balancing
    SSL termination
    High-performance global routing

    Enhancing protection with Azure Web Application Firewall (WAF):Blocking SQL injection and XSS attacks
    Applying geo-filtering policies
    Mitigating DDoS attacks

    Hands-On Implementation
    Deploying multi-region backend infrastructure
    Configuring:Custom domains with SSL certificates
    WAF policies for traffic filtering and threat mitigation

    Key Takeaways
    Secure access starts with controlled entry points (like Azure Bastion)
    Hybrid connectivity requires balancing security, speed, and cost
    Centralized security (Azure Firewall + hub-spoke) improves visibility and control
    Edge services (Front Door + WAF) are critical for performance and protection at scale
    This lesson equips you with the knowledge to design secure, scalable, and globally accessible Azure network architectures.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cybercode_academy
  • CyberCode Academy

    Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 4: Protecting Azure Virtual Networks

    03/04/2026 | 22 mins.
    In this lesson, you’ll learn about implementing and securing Azure Virtual Networks (VNETs) for robust cloud network protection:Virtual Network Foundations
    Understanding VNET architecture in Microsoft Azure:Defining private IP ranges using CIDR notation
    Configuring custom DNS settings
    Segmenting networks into subnets for isolation

    Service Endpoints:Creating secure, direct connections to Azure services (e.g., Storage, SQL)
    Keeping traffic within the Microsoft backbone instead of the public internet

    Virtual Network Peering
    Connecting multiple VNETs across regions securely
    Enabling:VNET-to-VNET communication over Microsoft’s backbone
    Gateway transit for shared VPN/ExpressRoute access

    Supporting scalable architectures like hub-and-spoke models
    Network Security Groups (NSGs)
    Using NSGs as stateful firewalls to control traffic flow
    Applying rules based on the five-tuple model:Source IP
    Source port
    Destination IP
    Destination port
    Protocol

    Leveraging service tags to simplify rule management for Azure services
    Application Security Groups (ASGs)
    Grouping virtual machines by role (e.g., Web, App, Database tiers)
    Applying security policies based on logical groupings instead of IPs
    Simplifying rule management in complex environments
    Hands-On Security Implementation
    Building a secure lab environment:Deploying a Windows bastion host for controlled access
    Creating a Linux application server

    Applying strict access controls:Restricting RDP access to a trusted public IP only
    Allowing SSH communication between authorized internal systems
    Blocking all traffic by default

    Key Takeaways
    VNETs provide network isolation and segmentation in the cloud
    Security is enforced through layered controls (NSGs + ASGs + endpoints)
    Proper design (e.g., bastion hosts, least access rules) significantly reduces attack surface
    This lesson builds a strong foundation for securing Azure infrastructure by combining network design, access control, and practical implementation strategies.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cybercode_academy
  • CyberCode Academy

    Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 3: Mastering Azure Identity and Access Management

    02/04/2026 | 22 mins.
    In this lesson, you’ll learn about managing identity and access in Microsoft Azure, aligned with the AZ-500 certification, with a strong focus on security and privileged access control:Azure Active Directory Identity ProtectionDetecting and responding to risky sign-ins and accounts, such as:Logins from anonymous IPs (e.g., via Tor)
    Unusual behavior or leaked credentials

    Identifying vulnerabilities like:Users without Multi-Factor Authentication (MFA)
    Weak or exposed credentials

    Using automated policies to:Trigger alerts
    Enforce remediation (e.g., force password reset or MFA)

    Tenants, Subscriptions, and RolesUnderstanding structure:Azure AD Tenant → Identity layer
    Azure Subscription → Resource management layer

    Differentiating roles:Azure AD roles → Manage users, groups, identities
    Azure RBAC roles → Manage cloud resources

    Core RBAC roles:Owner → Full control
    Contributor → Modify resources (no access control)
    Reader → View-only access

    Assigning roles to:Users
    Groups
    Service principals

    Privileged Identity Management (PIM)Using Azure AD Privileged Identity Management (PIM) to reduce risk from privileged accounts
    Key concepts:Just-In-Time (JIT) access → No permanent admin rights
    Time-bound activation → Roles expire automatically
    Approval workflows → Require authorization before elevation
    MFA enforcement for sensitive roles

    Governance features:Access reviews to validate ongoing need for permissions
    Auditing and tracking privileged activity

    Practical Security ScenariosSimulating risky behavior (e.g., Tor login) to trigger alerts
    Enforcing Conditional Access + PIM together for layered security
    Managing identities using least privilege principles
    Exam Preparation Focus (AZ-500)Choosing cost-effective identity protection solutions
    Understanding hybrid identity (e.g., Azure AD Connect basics)
    Combining:Conditional Access
    Identity Protection
    PIM

    Key TakeawaysIdentity is the primary security boundary in cloud environments
    Privileged access must be:Temporary
    Audited
    Strictly controlled

    Combining detection (Identity Protection) with control (PIM + RBAC) provides strong defense against account compromise
    This lesson marks a major milestone, building the foundation for becoming an Azure Security Engineer with a focus on identity-first security.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cybercode_academy

More Courses podcasts

About CyberCode Academy

Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.Study anywhere, anytime — and level up your skills with CyberCode Academy.🚀 Learn. Code. Secure.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy
Podcast website

Listen to CyberCode Academy, Prof Jiang’s Predictive History (The Story of Civilization, Secret History, Game Theory and more) and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features