back

Microsoft Azure (AZ-500)

Microsoft Azure Security Technologies26 H 19 M

Episodes
Episodes
  • Overview
    • Overview
  • Configure Azure Active Directory for workloads
    • Create App Registration
    • Configure App Registration permission scopes
    • Manage App Registration permission consent
    • Configure Multi-Factor Authentication settings
    • Manage Azure AD directory groups
    • Manage Azure AD Users
    • Install and Configure Azure AD Connect
    • Configure authentication methods
    • Implement Conditional Access policies
    • Configure Azure AD identity protection
  • Configure Azure AD Privileged Identity Management
    • Activate Privileged Identity Management
    • Monitor Privileged Access
    • Configure Access Reviews
  • Configure Azure tenant security
    • Transfer Azure subs between Azure AD tenants
    • Manage API access Azure subscriptions, resources
  • Implement network security
    • Configure virtual network connectivity
    • Create, Configure Network, App Security Groups
    • Steps to Create and Configure NSGs and ASGs
    • Create and configure Azure Firewall
    • Configure Resource Firewall
    • Create and configure Azure Front Door service
    • Configure remote access management
    • Configure baseline
  • Implement host security
    • Configure endpoint security within the VM
    • Configure VM Security and Configure Baseline
    • Harden VMs in Azure
    • Configure system updates for VMs in Azure
  • Configure container security
    • Configure networking
    • Configure authentication
    • Configure container isolation
    • Configure AKS Security
    • Configure container registry
    • Implement vulnerability management
  • Implement Azure Resource management security
    • Create Azure resource locks
    • Managing security policies, groups, roles, perms
  • Configure security services
    • Configure Azure Monitor
    • Configure diagnostic logging and log retention
    • Configure vulnerability scanning
  • Manage security alerts
    • Alerts - create, customize, review and respond
    • Configure playbook security event Azure Sentinel
    • Investigate escalated security incidents
  • Configure security policies to manage data
    • Configure data classification
    • Configure data retention
    • Configure data sovereignty
  • Configure security for data infrastructure
    • Enable database authentication
    • Enable database auditing
    • Configure Azure SQL Database ATP
    • Configure access control for storage accounts
    • Configure key management for storage accounts
    • Configure Azure AD DS auth for Azure Files
    • Create and manage Shared Access Signatures (SAS)
    • Configure security for HDInsight
    • Configure security for Cosmos DB
    • Configure security for Azure Data Lake
  • Configure encryption for data at rest
    • Implement Azure SQL DB Always Encrypted
    • Implement database encryption
    • Implement Storage Service Encryption
    • Implement disk encryption
  • Configure application security
    • Configure SSL/TLS certs
    • Configure Azure services to protect web apps
    • Create an application security baseline
  • Configure and manage Key Vault
    • Manage access to Key Vault
    • Manage certificates
    • Manage secrets
    • Configure key rotation
    • Spotlight Key Vault Soft Delete, Purge Protection
  • July 2020 Updates
    • Configure security for service principals
    • Secure the connectivity of virtual networks
    • Configure a WAF on Azure Application Gateway
    • Configure Azure Bastion
    • Implement Service Endpoints
    • Implement DDoS
    • Shared access policy for a blob or blob container

Overview

4 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

This course is designed for Azure Security Engineers who want to implement security controls, maintain the security posture, manage identity and access, and protect data, applications, and networks. You will be focusing on how to identify and remediate vulnerabilities by using a variety of security tools, implement threat protection, and respond to security incident escalations. To be successful on the AZ-500 exam, you should have a strong understanding of core Azure services, Azure workloads, security, and governance, as well as having experience in using PowerShell, the Command Line Interface, Azure Portal, and ARM templates.

You're watching ITProTV. [MUSIC] >> Hello everyone, in this video, we're gonna take a look at the AZ-500 Microsoft Azure Security Technologies course on ITProTV. Let's start with some introductions. I'm Don Pezet, one of the edutainers here at ITProTV. I have a background actually with AWS, not with Azure. So this course is gonna be a bit of a chance for me to learn a little bit about the platform. I'm joined here by Mr. Adam Gordon, who is our Azure SME. So Adam, why don't you tell us a little bit about yourself? >> Sure, so I work here at ITProTV as an edutainer, as hopefully many of you are aware. I spent a lot of time working with Microsoft technologies, cloud technologies, more broadly. And I focus on infrastructure and security. >> All right, now I know you have a love and a passion of Azure, so I'm expecting to learn a lot from you. But there's a couple of things that our viewers are probably expecting to take away. First off, is this a certification course? Does it tie to a certificate? >> It is, as a matter of fact, it is gonna tee you up for the Azure Security Engineer Associate certification. >> All right, now if I am wanting to go and get that certification, is this a one exam, one cert, or are there multiples? >> One and one. >> Nice, that's my favorite kind, to get in and out. >> Absolutely. >> All right, now beyond a certification, cuz not everybody's out there seeking for a cert, what's in it for me? What skills am I gonna learn in this course? >> So when you think about AZ-500, right, the Azure Security Technologies platform in terms of the amount of material we're covering in the course, four main areas of skill kind of stand out. Managing identity and access, so what are we gonna do with regards to access control, role-based access. Our ability to be able to provide capabilities both in the Azure platform overall, and even including our on-premises environments to use directory services to control access to resources, very important. Implementing platform protection. How do we protect virtual machines? How do we protect network capabilities, storage capabilities? How do we take all the objects and make sure they are going to be secured in one form or another? How do we manage security operations? Looking at the Security Center as our primary focal point there with regards to the extended capabilities, including new capabilities like Azure Sentinel and some of the threat intelligence that Microsoft provides. And finally, securing data and applications, our workloads in terms of storage and storage access tokens and policy and all sorts of stuff related to data. >> All right, so those are a lot of very valuable skills for us to have out there in the real world. When you're delivering this training, I know that Microsoft has a list of exam objectives, and what course structure are we gonna follow? Are we following those objectives, or do you have a different arrangement? >> No, we're gonna go exactly aligned with the Microsoft exam blueprint. What you would think of as the course outline is what we would say is the exam blueprint. Coming right from Microsoft's website, up to date and aligned with the requirements they specify you need to know in order to pass the exam. >> All right, and is our ultimate goal for this course to help them get ready for the exam? >> It absolutely is, obviously, really two goals. First and foremost, if you're taking this course to achieve certification, wanna make sure you're aligned with that. Rest assured all the information you need, the hands-on skills, the knowledge to navigate in the portal, as well as using the command line will be covered in depth. But if you're just looking for some hands-on information, some insight, some guidance to be able to use these skills and apply them, whether you certify or not, you'll be able to do that as well. >> All right, last question for you, Adam. I know you love Azure and every aspect of it. In this course, what is the thing that you're most excited about? >> Working with you, Don. >> It is a pleasure. >> [LAUGH] It is, so I am actually excited about spending time with Don. We don't really get to spend time doing courses together very much. So this is exciting for me. But in terms of what's gonna be exciting for me that I wanna share with you, it's the ability to navigate through Azure, top to bottom. And see under the hood all the security elements we can apply, both from the command line and in the portal. And show you real world ways you can apply those to your benefit to secure your resources, but also to certify at the same time. >> All right, well, ladies and gentlemen, I know I'm excited about this course. If you are too, then you're in the right place. Don't go anywhere because Microsoft Azure Security Technologies or AZ-500 is coming up next. >> See you soon. >> Thank you for watching ITProTV. [MUSIC]

Just you? Training a whole team? There's an ITProTV plan that fits.

With more than 5,800 hours of engaging video training for IT professionals, you'll find the courses you and your team need to stay current and get the latest certifications.