Microsoft Azure Security Technologies (AZ-500) (Updated 2022)
Microsoft security in the cloud & on-premises26 H 40 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayThis course has a practice test
Episodes
Episodes
- Manage Azure Active Directory Identities
- Overview
- Managed Identity for Azure Resources
- Manage Azure AD Groups
- Manage Azure AD Users
- Manage External Identities Using Azure AD
- Manage Administrative Units
- Manage Secure Access Using Azure AD
- Configure Azure AD Privileged Identity Management (PIM)
- Implement Conditional Access Policies
- Implement Azure AD Identity Protection
- Implement Passwordless Authentication
- Configure Access Reviews
- Manage Application Access
- Integrate Single Sign-On (SSO) & Multiple Identity Providers
- Create an App Registration
- Configure App Registration Permission Scopes
- Manage App Registration Permission Consent
- Manage API Permissions
- Authentication Methods for a Service Principal
- Manage Access Control
- Configure Azure Role Permissions
- Interpret Role & Resource Permissions
- Assign Built-in Azure AD Roles
- Create & Assign Custom Roles
- Implement Advanced Network Security
- Secure the Connectivity of Hybrid Networks
- Secure the Connectivity of Virtual Networks
- Create & Configure Azure Firewall
- Create & Configure Azure Firewall Manager
- Create & Configure Azure Application Gateway
- Create & Configure Azure Front Door
- Create & Configure Web Application Firewall (WAF)
- Configure a Resource Firewall
- Network Isolation for Web Apps & Azure Functions
- Implement Azure Service Endpoints
- Implement Azure Private Endpoints
- Implement Azure Private Links
- Implement Azure DDoS Protection
- Configure Advanced Security for Compute
- Configure Endpoint Protection for VMs
- Implement & Manage Security Updates for VMs
- Configure Security of Container Services
- Manage Access to Azure Container Registry
- Configure Security for Serverless Compute
- Configure Security for an Azure App Service
- Configure Encryption at Rest
- Configure Encryption in Transit
- Configure Centralized Policy Management
- Configure a Custom Security Policy
- Create a Policy Initiative
- Using Azure Policy
- Configure & Manage Threat Protection
- Configure Microsoft Defender for Servers
- Evaluate Vulnerability Scans
- Configure Microsoft Defender for SQL
- Microsoft Threat Modeling Tool
- Security Monitoring Solutions
- Alert Rules Using Azure Monitor
- Configure Logging for Azure Monitor
- Monitor Security Logs Using Azure Monitor
- Alert Rules in Microsoft Sentinel
- Connectors in Microsoft Sentinel
- Alerts & Incidents in Microsoft Sentinel
- Configure Security for Storage
- Access Control for Storage Accounts
- Key Management for Access Keys
- Delegated Access
- Configure Azure AD Authentication for Azure Storage & Files
- Configure Security for Databases
- Database Authentication Using Azure AD
- Enable Database Auditing
- Dynamic Masking on SQL Workloads
- Database Encryption for Azure SQL Database
- Network Isolation for Data Solutions
- Configure & Manage Azure Key Vault
- Create & Configure Key Vault
- Configure Access to Key Vault
- Manage Certificates & Secrets & Keys
- Configure Key Rotation
- Configure Backup & Recovery
Overview
4 M



- Episode Description
- Transcript