Azure Security Engineer Associate AZ-500 Training
Crafted with meticulous attention to detail by a seasoned industry professional with over 5 years of Azure expertise, the course “Azure Security Engineer Associate AZ-500 Training” provides learners with a comprehensive curriculum to acquire comprehensive knowledge and proficiency in this domain. Get skilled as anย Azure Security Engineer Associate with a preparatory course for Azure’s AZ-500 examination. This insightful course validates the knowledge and capabilities to manage and protect data and networks in a cloud infrastructure along with how to implement security protocols and threat protection.
In This Module We Will Learn :
AZURE ACTIVE DIRECTORY
- Azure AD Features
- Azure AD vs AD DS
- Roles for Azure AD
- Azure AD Domain Services
- Azure AD Users
- Azure AD Groups
- Administrative Units
- Passwordless
AZURE AD IDENTITY PROTECTION
- Azure AD Identity Protection
- Risk Events
- User Risk Policy
- Sign-in Risk Policy
- Azure MFA concepts
- Azure AD Conditional Access
- Conditions
- Access Reviews
MODULE LABS
- Lab 01 โ Role-Based Access Control
- Lab 02 โ Azure Policy
- Lab 03 โ Resource Manager Locks
- Lab 04 โ MFA – Conditional Access – Identity Protection
- Lab 05 โ Azure AD Privileged Identity Management
- Lab 06 โ Implement Directory Synchronization
HYBRID IDENTITITY
- Azure AD Connect
- Azure AD Connect cloud sync
- Authentication Options
- Password Hash Synchronization (PHS)
- Pass-through Authentication (PTA)
- Federation with Azure AD
- Authentication Decision Tree
- Password Writeback
AZURE AD PROVILEDGE IDENTITY MANAGEMENT
- Microsoft’s Zero Trust Model
- Microsoft Identity Management Evolution
- PIM Features
- PIM Scope
- PIM Onboarding
- PIM Configuration Settings
- PIM Workflow
ENTERPRISE GOVERNANCE
- Shared Responsibility Model
- Azure Cloud Security Advantages
- Azure Hierarchy
- Azure Policy
- Azure Role Based Access Control (RBAC)
- Azure RBAC vs Azure Policies
- Built-in Roles
- Resource Locks
- Azure Blueprints
- Azure Subscription Management
PERIMETER SECURITY
- Defense in Depth
- Virtual Network Security
- Distributed Denial of Service (DDoS)
- DDoS Implementation
- Azure Firewall Features
- Azure Firewall Implementation
- VPN Forced Tunneling
- UDRs and NVAs
HOST SECURITY
- Endpoint Protection
- Privileged Access Workstations
- Virtual Machine Templates
- Remote Access Management
- Update Management
- Disk Encryption
- Microsoft Defender
- Security Center Recommendations
- Securing Azure Workloads
MODULE LABS
- Lab 07 โ Network and Application Security Groups
- Lab 08 โ Azure Firewall
- Lab 09 โ Configuring and Securing ACR and AKS
NETWORK SECURITY
- Network Security Groups (NSG)
- NSG Implementation
- Application Security Groups
- Service Endpoints
- Private Endpoints
- Azure Application Gateway
- Web Application Firewall
- Azure Front Door
- ExpressRoute
CONTAINER SECURITY
- Containers
- ACI Security
- Azure Container Instances (ACI)
- Azure Container Registry (ACR)
- ACR Authentication
- Azure Kubernetes Service (AKS)
- AKS Terminology
- AKS Architecture
- AKS Networking
- AKS Storage
- AKS and Active Directory
AZURE KEY VAULT
- Azure Key Vault Features
- Key Vault Access
- Key Vault Example
- Key Vault Certificates
- Key Vault Keys
- Customer Managed Keys
- Key Vault Secrets
- Key Rotation
STORAGE SECURITY
- Data Sovereignty
- Azure Storage Access
- Shared Access Signatures
- Azure AD Storage Authentication
- Storage Service Encryption
- Blob Data Retention Policies
- Azure Files Authentication
- Secure Transfer Required
MODULE LABS
- Lab 10 โ Key Vault
- Lab 11 – Securing Azure SQL Database
- Lab 12 โ Service Endpoints and Securing Storage
APPLICATION SECURITY
- Microsoft Identity Platform
- Azure AD Application Scenarios
- App Registration
- Microsoft Graph Permissions
- Managed Identities
- Web App Certificates
DATABASE SECURITY
- SQL Database Authentication
- SQL Database Firewalls
- Database Auditing
- Data Discovery and Classification
- Vulnerability Assessment
- Advanced Threat Protection
- Dynamic Data Masking
- Transparent Data Encryption
- Always Encrypted
AZURE MONITOR
- Azure Monitor
- Metrics and Logs
- Log Analytics
- Connected Sources
- Azure Monitor Alerts
- Diagnostic Logging
AZURE SENTINEL
- Azure Sentinel
- Data Connections
- Workbooks
- Incidents
- Playbooks
- Hunting
MICROSOFT DEFENDER FOR CLOUD
- Cyber Kill Chain
- Microsoft Defender for Cloud Features
- Security Center Policies
- Security Center Recommendations
- Secure Score
- Brute Force Attacks
- Just in Time Virtual Machine Access
MODULE LABS
- Lab 13 โ Azure Monitor
- Lab 14 โ Microsoft Defender for Cloud
- Lab 15 โ Azure Sentinel
Course Content
Similar Courses:
Azure Data Engineer DP-203 Training
The Azure Database Engineer Associate DP-203 training prepares you for the Azure DP-203 certification exam.…
Azure Database Admin Associate DP-300 Training
Crafted with meticulous attention to detail by a seasoned industry professional with over 5 years…
Azure AI Fundamentals AI-900 Training
Crafted with meticulous attention to detail by a seasoned industry professional with over 5 years…
Azure Data Fundamentals DP-900 Training
Crafted with meticulous attention to detail by a seasoned industry professional with over 5 years…