What's new

Tutorial AZ-500 Microsoft Azure Security Technologies With Sims

codebytes4u

Forum Expert
Joined
Aug 5, 2016
Posts
1,113
Reaction
28,144
Points
3,675
AZ-500 Microsoft Azure Security Technologies With Sims
Size: 4.69GB
Get prepared for the AZ-500 exam with instructor led labs and hands on simulations available 24/7.
Learn the concepts and perform hands on activities needed to pass the AZ-500 exam
Gain a tremendous amount of knowledge involving securing Microsoft Azure Services
Get loads of hands on experience with securing Microsoft Azure Services
Utilize hands on simulations that can be access anytime, anywhere.
Overview
Section 1: Introduction
Lecture 1 Welcome to the course!
Lecture 2 Understanding the Microsoft Environment
Lecture 3 Having a Solid Foundation of Active Directory Domains
Lecture 4 Having a Solid Foundation of RAS, DMZ, and Virtualization
Lecture 5 Having a Solid Foundation of the Microsoft Cloud Services
Lecture 6 Order of concepts covered in the course
Section 2: Setting up for hands on
Lecture 7 IMPORTANT Using Assignments in the course
Lecture 8 Creating a free Azure Account
Lecture 9 Activating Azure AD P2 license
Section 3: Manage identities in Azure Active Directory (Azure AD), part of Microsoft Entra
Lecture 10 Visualizing directory services, including Azure AD, Microsoft Entra & Azure ADDS
Lecture 11 Create and manage a managed identity for Azure resources
Lecture 12 Manage Azure AD users and external identities
Lecture 13 Manage Azure AD groups
Lecture 14 Manage administrative units
Section 4: Manage secure access by using Azure Active Directory, part of Microsoft Entra
Lecture 15 Configure Azure AD Privileged Identity Management (PIM)
Lecture 16 Implement Conditional Access policies, including multifactor authentication
Lecture 17 Implement Azure AD Identity Protection
Lecture 18 Implement p4sswordless authentication
Lecture 19 Configure access reviews
Section 5: Manage Azure using command line tools
Lecture 20 Foundational concepts of using PowerShell
Lecture 21 Connecting PowerShell to Azure
Lecture 22 Working with Azure AD using PowerShell
Lecture 23 Working with Azure Cloudshell
Lecture 24 Working with Azure CLI / Bash
Lecture 25 Installing Azure CLI on a local machine
Section 6: Manage application access
Lecture 26 Integrate single sign on (SSO) and identity providers for authentication
Lecture 27 Create an app registration
Lecture 28 Configure app registration permission scopes
Lecture 29 Manage app registration permission consent
Lecture 30 Manage API permissions to Azure subscriptions and resources
Lecture 31 Configure an authentication method for a service principal
Section 7: Manage access control
Lecture 32 Visualizing role permissions for management groups, subscriptions, and more
Lecture 33 Interpret role and resource permissions
Lecture 34 Assign builtin roles in Microsoft Azure Active Directory part of Microsoft Entra
Lecture 35 Create and assign custom roles, including Azure roles and Azure AD roles
Section 8: Implement advanced network security
Lecture 36 Secure the connectivity of hybrid networks
Lecture 37 Create and configure virtual networks and subnets
Lecture 38 Secure the connectivity of virtual networks
Lecture 39 Direct traffic through the Azure Firewall
Lecture 40 Create and configure Azure Firewall
Lecture 41 Create and configure Azure Firewall Manager
Lecture 42 Understanding Azure Application Gateway vs Azure Front Door
Lecture 43 Create and configure Azure Application Gateway
Lecture 44 Create and configure Azure Front Door and Web Application Firewall (WAF)
Lecture 45 Configure a resource firewall on a storage account
Lecture 46 Visualizing Azure Service Endpoints and Private Endpoints
Lecture 47 Implement Azure Service Endpoints and Private Endpoints
Lecture 48 Implement Azure DDoS Protection
Lecture 49 Deleting resources from previous lessons
Section 9: Configure advanced security for compute
Lecture 50 Configure Endpoint Protection for virtual machines (VMs)
Lecture 51 Implement and manage security updates for VMs
Lecture 52 Configure security for container services
Lecture 53 Manage access to Azure Container Registry
Lecture 54 Configure security for serverless compute
Lecture 55 Configure security for an Azure App Service
Lecture 56 Configure encryption at rest
Lecture 57 Configure encryption in transit
Section 10: Configure centralized policy management
Lecture 58 Configure a custom security policy
Lecture 59 Create a policy initiative
Lecture 60 Configure security settings and auditing by using Azure Policy
Section 11: Configure and manage threat protection
Lecture 61 Concepts of Microsoft Defender for Cloud
Lecture 62 Configure Microsoft Defender for Servers (not including Defender for Endpoint)
Lecture 63 Evaluate for vulnerabilities using Microsoft Defender for Cloud
Lecture 64 Configure Microsoft Defender for SQL
Section 12: Configure and manage security monitoring solutions
Lecture 65 Create and customize alert rules by using Azure Monitor
Lecture 66 Configure diagnostic logging and log retention by using Azure Monitor
Lecture 67 Monitor security logs by using Azure Monitor
Lecture 68 Understanding Microsoft Sentinel
Lecture 69 Create a log analytics workspace needed for Microsoft Sentinel
Lecture 70 Implement Microsoft Sentinel
Section 13: Configure security for storage
Lecture 71 Creating a storage account
Lecture 72 Configure access control for storage accounts
Lecture 73 Configure storage account access keys
Lecture 74 Configure Azure Files identity-based authentication for SMB access
Lecture 75 Configure delegated access
Section 14: Configure security for data
Lecture 76 Enable a SQL Database/Server and connect with SSMS
Lecture 77 Configure SQL firewall settings for client connections
Lecture 78 Enable database authentication by using Azure AD, part of Microsoft Entra
Lecture 79 Enable database auditing
Lecture 80 Configure dynamic masking on SQL workloads
Lecture 81 Implement database encryption for Azure SQL Database
Lecture 82 Implement network isolation for data solutions, Synapse Analytics & Cosmos DB
Section 15: Configure and manage Azure Key Vault
Lecture 83 Create and configure Key Vault
Lecture 84 Configure access to Key Vault
Lecture 85 Manage certificates, secrets, and keys
Lecture 86 Configure key rotation
Lecture 87 Configure backup and recovery of certificates, secrets, and keys
Section 16: Finishing Up
Lecture 88 BONUS Lecture

1685897011421.png


You do not have permission to view the full content of this post. Log in or register now.
 

Attachments

Back
Top