AZ-500: Microsoft Azure Security Technologies
15 H 11 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayThis course has a practice test
Episodes
Episodes
- Course Overview
- Overview
- Managing Identity and Access in Azure
- Secure Users in Azure AD
- Secure Directory Groups in Azure AD
- Recommend and Secure External Identities
- Implement Azure AD Identity Protection
- Configure Microsoft Entra Verified ID
- Implement Multi-factor Authentication (MFA)
- Implement Passwordless Authentication
- Implement Single Sign-on (SSO)
- Integrate SSO and Identity Providers
- Recommend and Enforce Modern Authentication Protocols
- Assign Built-in Roles in Azure AD
- Assign Built-in Roles in Azure
- Create and Assign Custom Azure and Azure AD Roles
- Implement Microsoft Entra Permissions Management
- Configure AAD Privileged Identity Management
- Configure Microsoft Entra Identity Governance
- Implement Conditional Access Policies
- Manage Access to Enterprise Applications in AAD
- Manage App Registrations in AAD
- Configure App Registration Permission Scopes
- Manage App Registration Permission Consent
- Implement Password Protection
- Use Service Principals and Managed Identities in AAD
- Recommend and Configure an AAD Application Proxy
- Planning and Implementing Secure Networking in Azure
- Implement NSGs and ASGs
- Implement User-defined Routes
- Implement VNET Peering and VPN Gateway
- Implement Virtual WAN and Secured Virtual Hub
- Secure VPN connectivity
- Implement Encryption over ExpressRoute
- Configure Firewall for Azure App Service, Functions & PaaS
- Monitor with Network Watcher and NSG Flow Logging
- Implement Virtual Network Service Endpoints
- Implement Private Endpoints
- Implement Private Link services
- Implement App Service Environment
- Implement Network Security for SQL Managed Instances
- Implement TLS to Apps, App Service and API Management
- Implement and Manage an Azure Firewall
- Implement an Azure Application Gateway
- Implement an Azure Front Door and CDNs
- Implement a Web Application Firewall
- Implement Azure DDoS Protection Standard
- Securing Compute, Storage, and Databases in Azure
- Implement Remote Access to Public Endpoints
- Configure Network Isolation for AKS
- Secure, Configure and Monitor AKS
- Configure Security Monitoring for Azure Container Instances, Apps and API Management
- Manage Access to Azure Container Registry
- Configure Disk Encryption in Azure
- Configure Access Control for Storage Accounts
- Select and Configure Access to Azure Files
- Select and Configure Access to Azure Blob Storage
- Select and Configure Access to Azure Tables & Queue
- Select and Configure Data Protections Methods
- Configure Bring your own key (BYOK)
- Enable Database Authentication with Microsoft Azure AD
- Enable Database Auditing
- Identify Use Cases for the Microsoft Purview
- Implement Data Classification Using Microsoft Purview
- Plan and Implement Dynamic Masking
- Recommend and Implement Database Encryption
- Configuring and Managing Security Operations in Azure
- Create, assign security policies in Azure Policy
- Configure Security Using Azure Blueprint & Landing Zones
- Create and Configure an Azure Key Vault
- Recommend when to use a Dedicated HSM
- Manage Certificates, Secrets, and Keys
- Remediate Security Risks with Microsoft Defender for Cloud
- Assess Compliance with Microsoft Defender for Cloud
- Add Custom Initiatives to Microsoft Defender for Cloud
- Connect Hybrid Cloud and Multi-cloud Environments to Microsoft Defender for Cloud
- Identify and Monitor External Assets Using Microsoft Defender
- Enable Workload Protection Services in Microsoft Defender for Cloud
- Configure Microsoft Defender for Servers and Azure SQL Databases
- Manage and Respond to Security Alerts in Microsoft Defender for Cloud
- Configure Workflow Automation by using Microsoft Defender for Cloud
- Evaluate Vulnerability Scans from Microsoft Defender for Server
- Monitor Security Events by Using Azure Monitor
- Configure Data Connectors in Microsoft Sentinel
- Evaluate Alerts, Incidents and Configure Automation in Microsoft Sentinel
- Create and Customize Analytics Rules in Microsoft Sentinel
Overview
1 M



- Episode Description
- Transcript