Udemy

AZ-500 Azure Security Technologies - Training Course

Enroll Now
  • 1,735 Students
  • Updated 1/2024
  • Certificate Available
4.5
(227 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
12 Hour(s) 5 Minute(s)
Language
English
Taught by
Everton Oliveira
Certificate
  • Available
  • *The delivery and distribution of the certificate are subject to the policies and arrangements of the course provider.
Rating
4.5
(227 Ratings)

Course Overview

AZ-500 Azure Security Technologies - Training Course

Pass the AZ-500 with Confidence: A Complete Exam Prep for Microsoft Azure Security Technologies

Become an Azure Security Engineer with this AZ-500 Exam Prep Course! This comprehensive course is designed to provide IT professionals with the knowledge and skills needed to pass the Microsoft AZ-500 exam and obtain the highly-desired Azure Security Engineer Associate certification. You will gain a deep understanding of all exam objectives. Give your career the boost it needs and enroll today!


Learn by Doing

  • Hands-on activities

  • 157-page e-book (free and exclusive)

  • Access to resource template library on GitHub

  • In-depth demonstrations led by a Microsoft Certified Trainer

  • Quizzes to test your knowledge


30-Day Money Back Guarantee ★★★★★

I want you to be satisfied, so if for whatever reason you are unhappy with the course, you can request a partial or full refund within 30 days.


Skills Measured

Below you can find the list of topics covered in this course.


Manage Identity and Access

  • Manage Identities in Azure AD

    • Secure users in Azure AD

    • Secure Directory Groups in Azure AD

    • Recommend When to Use External Identities

    • Implement Azure AD Identity Protection

    • Manage Administrative Units

  • Manage Authentication by Using Azure AD

    • Implement Passwordless Authentication

    • Implement single sign-on (SSO)

    • Integrate Single Sign-on (SSO) and Identity Providers

  • Manage Authorization by Using Azure AD

    • Configure Azure Role Permissions for Management Groups, Subscriptions, Resource Groups, and Resources

    • Assign Built-in Roles in Azure AD

    • Interpret Role and Resource Permissions

    • Create and assign custom roles, including Azure roles and Azure AD roles

    • Configure Azure AD Privileged Identity Management (PIM)

    • Configure Role Management and Access Reviews by using Microsoft Entra Identity

    • Implement Conditional Access policies

  • Manage Application Access in Azure AD

    • Manage App Registrations in Azure AD

    • Configure App Registration Permission Scopes

    • Manage App Registration Permission Consent

    • Manage and Use Service Principals

    • Manage Managed Identities for Azure Resources

    • Manage API Permissions to Azure Subscriptions and Resources

Secure Networking

  • Plan and Implement Security for Virtual Networks

    • Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)

    • Secure the connectivity of virtual networks

    • Configure firewall settings on PaaS resources

  • Plan and Implement Security for Private Access to Azure Resources

    • Plan and Implement Virtual Network Service Endpoints

    • Plan and Implement Private Endpoints

    • Plan and Implement Private Link services

    • Plan and Implement Network Integration for Azure App Service and Azure Functions

    • Implement Network Isolation for Data Solutions, Including Azure Synapse Analytics and Azure Cosmos DB

  • Plan and Implement Security for Public Access to Azure resources

    • Plan and Implement TLS to Applications, Including Azure App Service and API Management

    • Plan, Implement, and Manage an Azure Firewall

    • Plan, Implement, and Manage an Azure Firewall Manager and Firewall Policies

    • Plan and Implement an Azure Application Gateway

    • Plan and implement an Azure Front Door, Including Content Delivery Network (CDN)

    • Plan and implement a Web Application Firewall (WAF)

    • Recommend when to use Azure DDoS Protection Standard

Secure Compute, Storage, and Databases

  • Plan and Implement Advanced Security for Compute

    • Plan and implement remote access to public endpoints, including Azure Bastion

    • Plan and implement remote access to public endpoints, including Just-in-Time Access (JIT)

    • Configure Security for Container Services

    • Manage access to Azure Container Registry (ACR)

    • Configure Disk Encryption, Including Azure Disk Encryption (ADE), Encryption as Host

    • Configure Endpoint Protection for virtual machines (VMs)

    • Implement and manage security updates for VMs

    • Configure Security for Serverless Compute

  • Plan and Implement Security for Storage

    • Configure Access Control for Storage Accounts

    • Manage Fife Cycle for Storage Account Access Keys

    • Configure Delegated Access

    • Select and Configure an Appropriate Method for Access to Azure Files

  • Plan and Implement Security for Azure SQL Database and Azure SQL Managed Instance

    • Enable Database Authentication by Using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra

    • Enable Database Auditing

    • Plan and Implement Dynamic Masking

    • Implement Transparent Database Encryption (TDE)

Manage Security Operations

  • Plan, Implement, and Manage Governance for Security

    • Create, Assign, and Interpret Security Policies in Azure Policy

    • Create, Assign, and Interpret Security Initiatives in Azure Policy

    • Create and Configure an Azure Key Vault

    • Recommend when to use a Dedicated HSM

    • Configure Access to Key Vault, Including Vault Access Policies and Azure Role Based Access Control

    • Manage Certificates, Secrets, and Keys

    • Configure Key Rotation

    • Configure Backup and Recovery of Certificates, Secrets, and Keys

  • Configure and Manage Threat Protection by Using Microsoft Defender for Cloud

    • Add industry and regulatory standards to Microsoft Defender for Cloud

  • Configure and Manage Threat Protection by Using Microsoft Defender for Cloud

    • Configure Microsoft Defender for Servers

    • Configure Microsoft Defender for Azure SQL Database

    • Evaluate Vulnerability Scans from Microsoft Defender for Server

  • Configure and Manage Security Monitoring and Automation Solutions

    • Create and Customize Alert Rules by Using Azure Monitor

    • Configure Diagnostic Logging and Log Retention by using Azure Monitor

    • Monitor Security Events by Using Azure Monitor

    • Configure Data Connectors in Microsoft Sentinel

    • Create and Customize Analytics Rules in Microsoft Sentinel

    • Evaluate Alerts and Incidents in Microsoft Sentinel

Course Content

  • 16 section(s)
  • 102 lecture(s)
  • Section 1 Introduction
  • Section 2 Manage Identities in Azure AD
  • Section 3 Manage Authentication by Using Azure AD
  • Section 4 Manage Authorization by Using Azure AD
  • Section 5 Manage Application Access in Azure AD
  • Section 6 Plan and Implement Security for Virtual Networks
  • Section 7 Plan and Implement Security for Private Access to Azure Resources
  • Section 8 Plan and Implement Security for Public Access to Azure resources
  • Section 9 Plan and Implement Advanced Security for Compute
  • Section 10 Plan and Implement Security for Storage
  • Section 11 Plan and Implement Security for Azure SQL Database and Azure SQL Managed Instanc
  • Section 12 Plan, Implement, and Manage Governance for Security
  • Section 13 Manage Security Posture by Using Microsoft Defender for Cloud
  • Section 14 Configure and Manage Threat Protection by Using Microsoft Defender for Cloud
  • Section 15 Configure and Manage Security Monitoring and Automation Solutions
  • Section 16 Practice Questions

What You’ll Learn

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
  • Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
  • Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
  • Implement perimeter security strategies including Azure Firewall.
  • Implement network security strategies including Network Security Groups and Application Security Groups.
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
  • Implement Azure Key Vault including certificates, keys, and secretes.
  • Implement application security strategies including app registration, managed identities, and service endpoints.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
  • Implement Azure Monitor including connected sources, log analytics, and alerts.
  • Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
  • Implement Azure Sentinel including workbooks, incidents, and playbooks.


Reviews

  • K
    Kenneth Childress
    5.0

    is good

  • S
    Sergio Pinilla
    5.0

    So far, easy to understand and follow along.

  • R
    Rubén Flores SIlva
    4.0

    buena

  • A
    Anil Rai
    4.0

    Simple explanation

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed