Summary and resources

Completed

As your organization migrates to Azure, you must protect resources from unauthorized access or attack. By applying controls to network traffic, you allow only legitimate traffic requests.

In this module, we explored a range of network security requirements. You now have the fundamental knowledge required to design and implement network security in Azure.

Learn more