back

Microsoft Azure Security Technologies (AZ-500) (Updated 2022)

Microsoft security in the cloud & on-premises26 H 41 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
This course has a practice test
Episodes
Episodes
  • Manage Azure Active Directory Identities
    • Overview
    • Managed Identity for Azure Resources
    • Manage Azure AD Groups
    • Manage Azure AD Users
    • Manage External Identities Using Azure AD
    • Manage Administrative Units
  • Manage Secure Access Using Azure AD
    • Configure Azure AD Privileged Identity Management (PIM)
    • Implement Conditional Access Policies
    • Implement Azure AD Identity Protection
    • Implement Passwordless Authentication
    • Configure Access Reviews
  • Manage Application Access
    • Integrate Single Sign-On (SSO) & Multiple Identity Providers
    • Create an App Registration
    • Configure App Registration Permission Scopes
    • Manage App Registration Permission Consent
    • Manage API Permissions
    • Authentication Methods for a Service Principal
  • Manage Access Control
    • Configure Azure Role Permissions
    • Interpret Role & Resource Permissions
    • Assign Built-in Azure AD Roles
    • Create & Assign Custom Roles
  • Implement Advanced Network Security
    • Secure the Connectivity of Hybrid Networks
    • Secure the Connectivity of Virtual Networks
    • Create & Configure Azure Firewall
    • Create & Configure Azure Firewall Manager
    • Create & Configure Azure Application Gateway
    • Create & Configure Azure Front Door
    • Create & Configure Web Application Firewall (WAF)
    • Configure a Resource Firewall
    • Network Isolation for Web Apps & Azure Functions
    • Implement Azure Service Endpoints
    • Implement Azure Private Endpoints
    • Implement Azure Private Links
    • Implement Azure DDoS Protection
  • Configure Advanced Security for Compute
    • Configure Endpoint Protection for VMs
    • Implement & Manage Security Updates for VMs
    • Configure Security of Container Services
    • Manage Access to Azure Container Registry
    • Configure Security for Serverless Compute
    • Configure Security for an Azure App Service
    • Configure Encryption at Rest
    • Configure Encryption in Transit
  • Configure Centralized Policy Management
    • Configure a Custom Security Policy
    • Create a Policy Initiative
    • Using Azure Policy
  • Configure & Manage Threat Protection
    • Configure Microsoft Defender for Servers
    • Evaluate Vulnerability Scans
    • Configure Microsoft Defender for SQL
    • Microsoft Threat Modeling Tool
  • Security Monitoring Solutions
    • Alert Rules Using Azure Monitor
    • Configure Logging for Azure Monitor
    • Monitor Security Logs Using Azure Monitor
    • Alert Rules in Microsoft Sentinel
    • Connectors in Microsoft Sentinel
    • Alerts & Incidents in Microsoft Sentinel
  • Configure Security for Storage
    • Access Control for Storage Accounts
    • Key Management for Access Keys
    • Delegated Access
    • Configure Azure AD Authentication for Azure Storage & Files
  • Configure Security for Databases
    • Database Authentication Using Azure AD
    • Enable Database Auditing
    • Dynamic Masking on SQL Workloads
    • Database Encryption for Azure SQL Database
    • Network Isolation for Data Solutions
  • Configure & Manage Azure Key Vault
    • Create & Configure Key Vault
    • Configure Access to Key Vault
    • Manage Certificates & Secrets & Keys
    • Configure Key Rotation
    • Configure Backup & Recovery

Overview

4 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

You're watching ITProTv. [MUSIC] >> Greetings everyone and welcome to the course overview of the AZ-500 series of which we are about to commence. I will be your host throughout that series, my name is Daniel Lowrie and I've got over 20 years of experience in IT. And my specialty is in that of offensive security so I hope to lend a little bit of that to the conversation. Joining me will be our subject matter expert, one Mr. Adam Gordon. >> Adam why don't you tell us a little about yourself? Absolutely, good to be with you Daniel again. And of course with all of you, I do just like Daniel does spend a lot of time talking about infrastructure and security. I tend to spend more time on the blue team side these days. You'll hear us go back and forth quite a bit throughout our conversations. This being a focus course around Azure Security, we have a lot of interesting insights for you. I've spent the better part of the last 40 years working as a consultant and a trainer in the IT space. And the better part of that time has been spent on platforms like Microsoft showing technology and dealing with the complexities of technology to customers and students all over the world. >> All right, now that we've got the pleasantries out of the way, I want you to tell us who is the intended audience for this series? >> So any of you out there that want to take advantage of either understanding more about the Azure Security capabilities across all the different areas of services, functions, features, etc, and or are looking to maybe learn a specific aspect of those security technologies and implement them in the real world. Maybe project driven capabilities for instance, but equally and most importantly if you're looking to study for taken past the AZ-500 exam, ultimately become an Azure Security engineer, well, this course is definitely for you. But keep in mind you gotta have the background knowledge to be able to work with these technologies. We're not gonna spend a lot of time showing you how to do those things, we're gonna assume you know how to do them and explain how to use the technologies to augment your security. >> All right, let's talk a minute for our viewers out there about the course goals and the structure of the series as we work our way through it. >> So when we think about the course overall, we're gonna look at four major areas that represent our overall capabilities on the Azure platform from a security standpoint. We're gonna break those down based on how Microsoft presents them in the exam blueprint. Those major areas are managing identity and access, implementing platform protection, managing security operations, and securing data and applications. And within that we're gonna have a series of individual topics for each of those major four areas and then a series of episodes that represent the skills necessary to achieve all of the topics and all the goals Microsoft says are important focus-worthy and necessary for you to be successful on the AZ-500 exam. >> And speaking of being successful on the AZ-500 exam, could you tell us a little bit about the exam itself? >> So the exam is gonna be, if you've ever taken any traditional Microsoft exams and I'm hoping you have at this point in your career, it's gonna be similar to what you're used to seeing. There'll be some multiple choice questions, there will be the ability for you to demonstrate how to do or implement a certain skill through some sort of task. So you'll have a combination of those environments and those capabilities asked about on the exam. So a little bit of synthesized and applying a little bit of show and tell and we throw some on top for good measure, a whole big heaping of well, just a lot of services and capabilities that we have to master, put it on the blender and you got yourself an exam. >> All right, and why don't you tell us why you're excited about this series? >> Well, I'm excited for a couple of reasons. First to be able to spend time with Daniel and walk through all of these details with him and get his perspective on how we implement these technologies. Always valuable to get that perspective and hear from him about how he sees this. I'm excited to spend time with all of you, showing you how to work with and use these technologies, giving you that real world perspective that we can bring to you but also help you focus on success areas for exam preparation. And I'm excited cuz I get to work with these technologies all the time in the real world and now I get to spend time showing you how to make sure you're working with them correctly and optimizing your security along the way. But you know what, in order to do that, you gotta stop watching this overview and you gotta start getting ready to go take the course and actually spend time with Daniel and I. So Daniel anything else we gotta go over before we wrap up? >> Adam I think that about covers it for the series and hopefully that gets you out there excited to watch and join us for it. Until then, have a great day. Thank you for watching ITProTv. [MUSIC]

Start training today

Just you? Check out our personal plans

Premium

$529 per seat/per year

2

Total seats

Standard

$349 per seat/per year

2

Total seats

Credit card required

This is for your account.
This is for your account.
We will contact you with this phone number about your trial.
We will contact you with this email about your trial.
What is the name of your company?
In which country is your company located?

Step 1 of 2

Get a demo or a start a team trial