Az-500 Microsoft Azure Security Technologies With Sims
Last updated 8/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English (US) | Size: 3.12 GB | Duration: 10h 37m
Last updated 8/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English (US) | Size: 3.12 GB | Duration: 10h 37m
Get prepared for the AZ-500 exam with instructor led labs and hands on simulations available 24/7
What you'll learn
Learn the concepts and perform hands on activities needed to pass the AZ-500 exam
Gain a tremendous amount of knowledge involving securing Microsoft Azure Services
Get loads of hands on experience with securing Microsoft Azure Services
Utilize hands on simulations that can be access anytime, anywhere!
Requirements
Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more than the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the courseUnderstanding the Microsoft EnvironmentHaving a Solid Foundation of Active Directory DomainsHaving a Solid Foundation of RAS, DMZ, and VirtualizationHaving a Solid Foundation of the Microsoft Cloud ServicesOrder of concepts covered in the courseQuestions for John ChristopherSetting up for hands onIMPORTANT Using Assignments in the courseCreating a free Azure AccountActivating an Entra ID P2 licenseManage identities in Microsoft Azure Active Directory (Azure AD), part of Microsoft EntraVisualizing directory services, including Azure AD, Microsoft Entra & Azure ADDSCreate and manage a managed identity for Azure resourcesManage Azure AD users and external identitiesManage Azure AD groupsManage administrative unitsManage secure access by using Microsoft Azure Active Directory (Azure AD), part of Microsoft EntraConfigure Azure AD Privileged Identity Management (PIM)Activating a PIM role as a userImplement Conditional Access policies, including multifactor authenticationImplement Azure AD Identity ProtectionImplement passwordless authenticationConfigure access reviewsManage Azure using command line toolsFoundational concepts of using PowerShellConnecting PowerShell to AzureWorking with Azure AD using PowerShellWorking with Azure CloudshellWorking with Azure CLI / BashInstalling Azure CLI on a local machineManage application accessIntegrate single sign on (SSO) and identity providers for authenticationCreate an app registrationConfigure app registration permission scopesManage app registration permission consentManage API permissions to Azure subscriptions and resourcesConfigure an authentication method for a service principalManage access controlVisualizing Azure role permissions for management groups, subscriptions, resource groups, and resourcesInterpret role and resource permissionsAssign built-in roles in Microsoft Azure Active Directory (Azure AD), part of Microsoft EntraCreate and assign custom roles, including Azure roles and Azure AD rolesImplement advanced network securitySecure the connectivity of hybrid networksCreate and configure virtual networks and subnetsSecure the connectivity of virtual networksCreate and configure Azure FirewallDirect traffic through the Azure FirewallCreate and configure Azure Firewall ManagerUnderstanding Azure Application Gateway vs Azure Front DoorCreate and configure Azure Application GatewayCreate and configure Azure Front Door and Web Application Firewall (WAF)Configure a resource firewall on a storage accountVisualizing Azure Service Endpoints and Private EndpointsImplement Azure Service Endpoints and Private EndpointsImplement Azure DDoS ProtectionDeleting resources from previous lessonsConfigure advanced security for computeConfigure Endpoint Protection for virtual machines (VMs)Implement and manage security updates for VMsConfigure security for container servicesManage access to Azure Container RegistryConfigure security for serverless computeConfigure security for an Azure App ServiceConfigure encryption at restConfigure encryption in transitConfigure centralized policy managementConfigure a custom security policyCreate a policy initiativeConfigure security settings and auditing by using Azure PolicyConfigure and manage threat protectionConcepts of Microsoft Defender for CloudConfigure Microsoft Defender for Servers (not including Microsoft Defender for Endpoint)Evaluate for vulnerabilities using Microsoft Defender for CloudConfigure Microsoft Defender for SQLConfigure and manage security monitoring solutionsCreate and customize alert rules by using Azure MonitorConfigure diagnostic logging and log retention by using Azure MonitorMonitor security logs by using Azure MonitorUnderstanding Microsoft SentinelCreate a log analytics workspace needed for Microsoft SentinelImplement Microsoft SentinelConfigure security for storageCreating a storage accountConfigure access control for storage accountsConfigure storage account access keysConfigure Azure Files identity-based authentication for SMB accessConfigure delegated accessConfigure security for dataEnable a SQL Database/Server and connect with SSMSConfigure SQL firewall settings for client connectionsEnable database authentication by using Microsoft Azure AD, part of Microsoft EntraEnable database auditingConfigure dynamic masking on SQL workloadsImplement database encryption for Azure SQL DatabaseImplement network isolation for data solutions, including Synapse Analytics & Cosmos DBConfigure and manage Azure Key VaultCreate and configure Key VaultRecommend when to use a dedicated Hardware Security Module (HSM)Configure access to Key Vault, including vault access policies and Azure RBACManage certificates, secrets, and keysConfigure key rotationConfigure backup and recovery of certificates, secrets, and keysFinishing UpWhere do I go from here?
Who this course is for:
IT people interested in learning and passing the Microsoft AZ-500 exam!,IT people interested in learning a tremendous amount about security in Microsoft Azure Services!