Az-500 Microsoft Azure Security Technologies With Sims

Az-500 Microsoft Azure Security Technologies With Sims

Description

We really hope you’ll agree, this training is way more than the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Introduction

  • Welcome to the course
  • Understanding the Microsoft Environment
  • Having a Solid Foundation of Active Directory Domains
  • Having a Solid Foundation of RAS, DMZ, and Virtualization
  • Having a Solid Foundation of the Microsoft Cloud Services
  • Order of concepts covered in the course
  • Questions for John Christopher

Setting up for hands on

  • IMPORTANT Using Assignments in the course
  • Creating a free Azure Account
  • Activating Azure AD P2 license

Manage identities in Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra

  • Visualizing directory services, including Azure AD, Microsoft Entra & Azure ADDS
  • Create and manage a managed identity for Azure resources
  • Manage Azure AD users and external identities
  • Manage Azure AD groups
  • Manage administrative units

Manage secure access by using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra

  • Configure Azure AD Privileged Identity Management (PIM)
  • Implement Conditional Access policies, including multifactor authentication
  • Implement Azure AD Identity Protection
  • Implement passwordless authentication
  • Configure access reviews

Manage Azure using command line tools

  • Foundational concepts of using PowerShell
  • Connecting PowerShell to Azure
  • Working with Azure AD using PowerShell
  • Working with Azure Cloudshell
  • Working with Azure CLI / Bash
  • Installing Azure CLI on a local machine

Manage application access

  • Integrate single sign on (SSO) and identity providers for authentication
  • Create an app registration
  • Configure app registration permission scopes
  • Manage app registration permission consent
  • Manage API permissions to Azure subscriptions and resources
  • Configure an authentication method for a service principal

Manage access control

  • Visualizing Azure role permissions for management groups, subscriptions, resource groups, and resources
  • Interpret role and resource permissions
  • Assign built-in roles in Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
  • Create and assign custom roles, including Azure roles and Azure AD roles

Implement advanced network security

  • Secure the connectivity of hybrid networks
  • Create and configure virtual networks and subnets
  • Secure the connectivity of virtual networks
  • Direct traffic through the Azure Firewall
  • Create and configure Azure Firewall
  • Create and configure Azure Firewall Manager
  • Understanding Azure Application Gateway vs Azure Front Door
  • Create and configure Azure Application Gateway
  • Create and configure Azure Front Door and Web Application Firewall (WAF)
  • Configure a resource firewall on a storage account
  • Visualizing Azure Service Endpoints and Private Endpoints
  • Implement Azure Service Endpoints and Private Endpoints
  • Implement Azure DDoS Protection
  • Deleting resources from previous lessons

Configure advanced security for compute

  • Configure Endpoint Protection for virtual machines (VMs)
  • Implement and manage security updates for VMs
  • Configure security for container services
  • Manage access to Azure Container Registry
  • Configure security for serverless compute
  • Configure security for an Azure App Service
  • Configure encryption at rest
  • Configure encryption in transit

Configure centralized policy management

  • Configure a custom security policy
  • Create a policy initiative
  • Configure security settings and auditing by using Azure Policy

Configure and manage threat protection

  • Concepts of Microsoft Defender for Cloud
  • Configure Microsoft Defender for Servers (not including Microsoft Defender for Endpoint)
  • Evaluate for vulnerabilities using Microsoft Defender for Cloud
  • Configure Microsoft Defender for SQL

Configure and manage security monitoring solutions

  • Create and customize alert rules by using Azure Monitor
  • Configure diagnostic logging and log retention by using Azure Monitor
  • Monitor security logs by using Azure Monitor
  • Understanding Microsoft Sentinel
  • Create a log analytics workspace needed for Microsoft Sentinel
  • Implement Microsoft Sentinel

Configure security for storage

  • Creating a storage account
  • Configure access control for storage accounts
  • Configure storage account access keys
  • Configure Azure Files identity-based authentication for SMB access
  • Configure delegated access

Configure security for data

  • Enable a SQL Database/Server and connect with SSMS
  • Configure SQL firewall settings for client connections
  • Enable database authentication by using Microsoft Azure AD, part of Microsoft Entra
  • Enable database auditing
  • Configure dynamic masking on SQL workloads
  • Implement database encryption for Azure SQL Database
  • Implement network isolation for data solutions, including Synapse Analytics & Cosmos DB

Configure and manage Azure Key Vault

  • Create and configure Key Vault
  • Configure access to Key Vault
  • Manage certificates, secrets, and keys
  • Configure key rotation
  • Configure backup and recovery of certificates, secrets, and keys

Leave a Reply