Microsoft Azure Security Technologies (AZ-500) (Updated 2021)
Microsoft security in the cloud & on-premises26 H 52 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Manage Azure Active Directory Identities
- Overview
- Configure security for service principals
- Manage Azure AD directory groups
- Manage Azure AD Users
- Manage Administrative Units
- Configure Password Writeback
- Configure Authentication Methods
- Transfer Azure subs between Azure AD tenants
- Configure secure access by using Azure AD
- Monitor Privileged Access
- Configure Access Reviews
- Activate Privileged Identity Management
- Implement Conditional Access policies
- Configure Azure AD identity protection
- Manage application access
- Create App Registration
- Configure App Registration permission scopes
- Manage App Registration permission consent
- Manage API access Azure subscriptions, resources
- Manage access control
- Configure Subscription and Resource Permissions
- Configure Resource Group Permissions
- Configure Custom RBAC Roles
- Identify the Appropriate Role - Least Privilege
- Interpret Permissions - Check Access
- Implement advanced network security
- Secure the Connectivity of Virtual Networks
- Create, Configure Network, App Security Groups
- Steps to Create and Configure NSGs and ASGs
- Create and Configure Azure Firewall
- Implement Azure Firewall Manager
- Create and Configure Azure Front Door Service
- Configure a WAF on Azure Application Gateway
- Configure Azure Bastion
- Configure Resource Firewalls
- Implement Service Endpoints
- Implement DDoS
- Configure advanced security for compute
- Configure Endpoint Protection
- Configure system updates for VMs in Azure
- Authentication for Azure Container Registry
- Implement Vulnerability Management
- Configure Isolation for AKS
- Configure Security for Container Registry
- Implement Disk Encryption
- Configure SSL/TLS certs
- Configure Authentication
- Configure Automatic Updates
- Monitor security by using Azure Monitor
- Alerts - create, customize, review and respond
- Configure Azure Monitor
- Configure Diagnostic Logging and Log Retention
- Monitor security by using Azure Security Center
- Configure Vulnerability Scanning
- Harden VMs in Azure
- Centralized policy management in Security Center
- Evaluate for Compliance Using Security Center
- Monitor security by using Azure Sentinel
- Create and Customize Alerts
- Configure Data Sources to Azure Sentinel
- Evaluate Results From Azure Sentinel
- Configure a Playbook
- Configure security policies
- Configure Security Settings Using Azure Policy
- Configure Security Settings Using Azure Blueprint
- Configure security for storage
- Configure Access Control for Storage Accounts
- Configure Key Management for Storage Accounts
- Azure AD Authentication for Azure Storage
- Configure Azure AD DS auth for Azure Files
- Create and Manage Shared Access Signatures (SAS)
- Shared Access Policy for a Blob or Blob Container
- Implement Storage Service Encryption
- Configure Azure Defender for Storage
- Configure security for databases
- Enable Database Authentication
- Enable Database Auditing
- Configure Azure Defender for SQL
- Implement Database Encryption
- Implement Azure SQL DB Always Encrypted
- Configure and manage Key Vault
- Manage Access to Key Vault
- Manage Certificates
- Manage Secrets
- Configure Key Rotation
- Spotlight Key Vault Soft Delete, Purge Protection
- Configure Azure Defender for Key Vault
Overview
4 M



- Episode Description
- Transcript
This course is designed for Azure Security Engineers who want to implement security controls, maintain the security posture, manage identity and access, and protect data, applications, and networks. You will be focusing on how to identify and remediate vulnerabilities by using a variety of security tools, implement threat protection, and respond to security incident escalations. To be successful on the AZ-500 exam, you should have a strong understanding of core Azure services, Azure workloads, security, and governance, as well as having experience in using PowerShell, the Command Line Interface, Azure Portal, and ARM templates.