back

AZ-500: Microsoft Azure Security Technologies

15 H 11 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
This course has a practice test
Episodes
Episodes
  • Course Overview
    • Overview
  • Managing Identity and Access in Azure
    • Secure Users in Azure AD
    • Secure Directory Groups in Azure AD
    • Recommend and Secure External Identities
    • Implement Azure AD Identity Protection
    • Configure Microsoft Entra Verified ID
    • Implement Multi-factor Authentication (MFA)
    • Implement Passwordless Authentication
    • Implement Single Sign-on (SSO)
    • Integrate SSO and Identity Providers
    • Recommend and Enforce Modern Authentication Protocols
    • Assign Built-in Roles in Azure AD
    • Assign Built-in Roles in Azure
    • Create and Assign Custom Azure and Azure AD Roles
    • Implement Microsoft Entra Permissions Management
    • Configure AAD Privileged Identity Management
    • Configure Microsoft Entra Identity Governance
    • Implement Conditional Access Policies
    • Manage Access to Enterprise Applications in AAD
    • Manage App Registrations in AAD
    • Configure App Registration Permission Scopes
    • Manage App Registration Permission Consent
    • Implement Password Protection
    • Use Service Principals and Managed Identities in AAD
    • Recommend and Configure an AAD Application Proxy
  • Planning and Implementing Secure Networking in Azure
    • Implement NSGs and ASGs
    • Implement User-defined Routes
    • Implement VNET Peering and VPN Gateway
    • Implement Virtual WAN and Secured Virtual Hub
    • Secure VPN connectivity
    • Implement Encryption over ExpressRoute
    • Configure Firewall for Azure App Service, Functions & PaaS
    • Monitor with Network Watcher and NSG Flow Logging
    • Implement Virtual Network Service Endpoints
    • Implement Private Endpoints
    • Implement Private Link services
    • Implement App Service Environment
    • Implement Network Security for SQL Managed Instances
    • Implement TLS to Apps, App Service and API Management
    • Implement and Manage an Azure Firewall
    • Implement an Azure Application Gateway
    • Implement an Azure Front Door and CDNs
    • Implement a Web Application Firewall
    • Implement Azure DDoS Protection Standard
  • Securing Compute, Storage, and Databases in Azure
    • Implement Remote Access to Public Endpoints
    • Configure Network Isolation for AKS
    • Secure, Configure and Monitor AKS
    • Configure Security Monitoring for Azure Container Instances, Apps and API Management
    • Manage Access to Azure Container Registry
    • Configure Disk Encryption in Azure
    • Configure Access Control for Storage Accounts
    • Select and Configure Access to Azure Files
    • Select and Configure Access to Azure Blob Storage
    • Select and Configure Access to Azure Tables & Queue
    • Select and Configure Data Protections Methods
    • Configure Bring your own key (BYOK)
    • Enable Database Authentication with Microsoft Azure AD
    • Enable Database Auditing
    • Identify Use Cases for the Microsoft Purview
    • Implement Data Classification Using Microsoft Purview
    • Plan and Implement Dynamic Masking
    • Recommend and Implement Database Encryption
  • Configuring and Managing Security Operations in Azure
    • Create, assign security policies in Azure Policy
    • Configure Security Using Azure Blueprint & Landing Zones
    • Create and Configure an Azure Key Vault
    • Recommend when to use a Dedicated HSM
    • Manage Certificates, Secrets, and Keys
    • Remediate Security Risks with Microsoft Defender for Cloud
    • Assess Compliance with Microsoft Defender for Cloud
    • Add Custom Initiatives to Microsoft Defender for Cloud
    • Connect Hybrid Cloud and Multi-cloud Environments to Microsoft Defender for Cloud
    • Identify and Monitor External Assets Using Microsoft Defender
    • Enable Workload Protection Services in Microsoft Defender for Cloud
    • Configure Microsoft Defender for Servers and Azure SQL Databases
    • Manage and Respond to Security Alerts in Microsoft Defender for Cloud
    • Configure Workflow Automation by using Microsoft Defender for Cloud
    • Evaluate Vulnerability Scans from Microsoft Defender for Server
    • Monitor Security Events by Using Azure Monitor
    • Configure Data Connectors in Microsoft Sentinel
    • Evaluate Alerts, Incidents and Configure Automation in Microsoft Sentinel
    • Create and Customize Analytics Rules in Microsoft Sentinel

Overview

1 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

WEBVTT >> Hello, thank you for choosing ACI Learning. We'd like to take the time to tell you a little bit about the course you're about to watch. My name is Wes Bryan. I'm an edutainer at ACI Learning, and I have been in technical training for a little bit better than a decade, and I specialize in CompTIA and Microsoft certifications. You'll also see that our subject matter expert is Brian Sfittergol, and he is an expert in securing Azure technologies. This course is for those who implement, manage, and monitor security for Azure hybrid environments and multi-cloud environments as well. In this course, we will explore managing identity and access in Azure, planning and implementing network security, as well as securing compute, storage, and databases. And finally, we'll look at configuring and managing security operations. We hope you will join us for the AZ500 Microsoft Azure Security Technologies.