Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Az-500 Microsoft Azure Security Technologies With Sims

    Posted By: ELK1nG
    Az-500 Microsoft Azure Security Technologies With Sims

    Az-500 Microsoft Azure Security Technologies With Sims
    Published 11/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 4.69 GB | Duration: 9h 48m

    Get prepared for the AZ-500 exam with instructor led labs and hands on simulations available 24/7

    What you'll learn

    Learn the concepts and perform hands on activities needed to pass the AZ-500 exam

    Gain a tremendous amount of knowledge involving securing Microsoft Azure Services

    Get loads of hands on experience with securing Microsoft Azure Services

    Utilize hands on simulations that can be access anytime, anywhere!

    Requirements

    Willingness to put in the time and practice the steps shown in the course

    Description

    We really hope you'll agree, this training is way more than the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the courseUnderstanding the Microsoft EnvironmentHaving a Solid Foundation of Active Directory DomainsHaving a Solid Foundation of RAS, DMZ, and VirtualizationHaving a Solid Foundation of the Microsoft Cloud ServicesOrder of concepts covered in the courseQuestions for John ChristopherSetting up for hands onIMPORTANT Using Assignments in the courseCreating a free Azure AccountActivating Azure AD P2 licenseManage identities in Microsoft Azure Active Directory (Azure AD), part of Microsoft EntraVisualizing directory services, including Azure AD, Microsoft Entra & Azure ADDSCreate and manage a managed identity for Azure resourcesManage Azure AD users and external identitiesManage Azure AD groupsManage administrative unitsManage secure access by using Microsoft Azure Active Directory (Azure AD), part of Microsoft EntraConfigure Azure AD Privileged Identity Management (PIM)Implement Conditional Access policies, including multifactor authenticationImplement Azure AD Identity ProtectionImplement passwordless authenticationConfigure access reviewsManage Azure using command line toolsFoundational concepts of using PowerShellConnecting PowerShell to AzureWorking with Azure AD using PowerShellWorking with Azure CloudshellWorking with Azure CLI / BashInstalling Azure CLI on a local machineManage application accessIntegrate single sign on (SSO) and identity providers for authenticationCreate an app registrationConfigure app registration permission scopesManage app registration permission consentManage API permissions to Azure subscriptions and resourcesConfigure an authentication method for a service principalManage access controlVisualizing Azure role permissions for management groups, subscriptions, resource groups, and resourcesInterpret role and resource permissionsAssign built-in roles in Microsoft Azure Active Directory (Azure AD), part of Microsoft EntraCreate and assign custom roles, including Azure roles and Azure AD rolesImplement advanced network securitySecure the connectivity of hybrid networksCreate and configure virtual networks and subnetsSecure the connectivity of virtual networksDirect traffic through the Azure FirewallCreate and configure Azure FirewallCreate and configure Azure Firewall ManagerUnderstanding Azure Application Gateway vs Azure Front DoorCreate and configure Azure Application GatewayCreate and configure Azure Front Door and Web Application Firewall (WAF)Configure a resource firewall on a storage accountVisualizing Azure Service Endpoints and Private EndpointsImplement Azure Service Endpoints and Private EndpointsImplement Azure DDoS ProtectionDeleting resources from previous lessonsConfigure advanced security for computeConfigure Endpoint Protection for virtual machines (VMs)Implement and manage security updates for VMsConfigure security for container servicesManage access to Azure Container RegistryConfigure security for serverless computeConfigure security for an Azure App ServiceConfigure encryption at restConfigure encryption in transitConfigure centralized policy managementConfigure a custom security policyCreate a policy initiativeConfigure security settings and auditing by using Azure PolicyConfigure and manage threat protectionConcepts of Microsoft Defender for CloudConfigure Microsoft Defender for Servers (not including Microsoft Defender for Endpoint)Evaluate for vulnerabilities using Microsoft Defender for CloudConfigure Microsoft Defender for SQLConfigure and manage security monitoring solutionsCreate and customize alert rules by using Azure MonitorConfigure diagnostic logging and log retention by using Azure MonitorMonitor security logs by using Azure MonitorUnderstanding Microsoft SentinelCreate a log analytics workspace needed for Microsoft SentinelImplement Microsoft SentinelConfigure security for storageCreating a storage accountConfigure access control for storage accountsConfigure storage account access keysConfigure Azure Files identity-based authentication for SMB accessConfigure delegated accessConfigure security for dataEnable a SQL Database/Server and connect with SSMSConfigure SQL firewall settings for client connectionsEnable database authentication by using Microsoft Azure AD, part of Microsoft EntraEnable database auditingConfigure dynamic masking on SQL workloadsImplement database encryption for Azure SQL DatabaseImplement network isolation for data solutions, including Synapse Analytics & Cosmos DBConfigure and manage Azure Key VaultCreate and configure Key VaultConfigure access to Key VaultManage certificates, secrets, and keysConfigure key rotationConfigure backup and recovery of certificates, secrets, and keysFinishing UpWhere do I go from here?

    Overview

    Section 1: Introduction

    Lecture 1 Welcome to the course!

    Lecture 2 Understanding the Microsoft Environment

    Lecture 3 Having a Solid Foundation of Active Directory Domains

    Lecture 4 Having a Solid Foundation of RAS, DMZ, and Virtualization

    Lecture 5 Having a Solid Foundation of the Microsoft Cloud Services

    Lecture 6 Order of concepts covered in the course

    Section 2: Setting up for hands on

    Lecture 7 IMPORTANT Using Assignments in the course

    Lecture 8 Creating a free Azure Account

    Lecture 9 Activating Azure AD P2 license

    Section 3: Manage identities in Azure Active Directory (Azure AD), part of Microsoft Entra

    Lecture 10 Visualizing directory services, including Azure AD, Microsoft Entra & Azure ADDS

    Lecture 11 Create and manage a managed identity for Azure resources

    Lecture 12 Manage Azure AD users and external identities

    Lecture 13 Manage Azure AD groups

    Lecture 14 Manage administrative units

    Section 4: Manage secure access by using Azure Active Directory, part of Microsoft Entra

    Lecture 15 Configure Azure AD Privileged Identity Management (PIM)

    Lecture 16 Implement Conditional Access policies, including multifactor authentication

    Lecture 17 Implement Azure AD Identity Protection

    Lecture 18 Implement passwordless authentication

    Lecture 19 Configure access reviews

    Section 5: Manage Azure using command line tools

    Lecture 20 Foundational concepts of using PowerShell

    Lecture 21 Connecting PowerShell to Azure

    Lecture 22 Working with Azure AD using PowerShell

    Lecture 23 Working with Azure Cloudshell

    Lecture 24 Working with Azure CLI / Bash

    Lecture 25 Installing Azure CLI on a local machine

    Section 6: Manage application access

    Lecture 26 Integrate single sign on (SSO) and identity providers for authentication

    Lecture 27 Create an app registration

    Lecture 28 Configure app registration permission scopes

    Lecture 29 Manage app registration permission consent

    Lecture 30 Manage API permissions to Azure subscriptions and resources

    Lecture 31 Configure an authentication method for a service principal

    Section 7: Manage access control

    Lecture 32 Visualizing role permissions for management groups, subscriptions, and more

    Lecture 33 Interpret role and resource permissions

    Lecture 34 Assign builtin roles in Microsoft Azure Active Directory part of Microsoft Entra

    Lecture 35 Create and assign custom roles, including Azure roles and Azure AD roles

    Section 8: Implement advanced network security

    Lecture 36 Secure the connectivity of hybrid networks

    Lecture 37 Create and configure virtual networks and subnets

    Lecture 38 Secure the connectivity of virtual networks

    Lecture 39 Direct traffic through the Azure Firewall

    Lecture 40 Create and configure Azure Firewall

    Lecture 41 Create and configure Azure Firewall Manager

    Lecture 42 Understanding Azure Application Gateway vs Azure Front Door

    Lecture 43 Create and configure Azure Application Gateway

    Lecture 44 Create and configure Azure Front Door and Web Application Firewall (WAF)

    Lecture 45 Configure a resource firewall on a storage account

    Lecture 46 Visualizing Azure Service Endpoints and Private Endpoints

    Lecture 47 Implement Azure Service Endpoints and Private Endpoints

    Lecture 48 Implement Azure DDoS Protection

    Lecture 49 Deleting resources from previous lessons

    Section 9: Configure advanced security for compute

    Lecture 50 Configure Endpoint Protection for virtual machines (VMs)

    Lecture 51 Implement and manage security updates for VMs

    Lecture 52 Configure security for container services

    Lecture 53 Manage access to Azure Container Registry

    Lecture 54 Configure security for serverless compute

    Lecture 55 Configure security for an Azure App Service

    Lecture 56 Configure encryption at rest

    Lecture 57 Configure encryption in transit

    Section 10: Configure centralized policy management

    Lecture 58 Configure a custom security policy

    Lecture 59 Create a policy initiative

    Lecture 60 Configure security settings and auditing by using Azure Policy

    Section 11: Configure and manage threat protection

    Lecture 61 Concepts of Microsoft Defender for Cloud

    Lecture 62 Configure Microsoft Defender for Servers (not including Defender for Endpoint)

    Lecture 63 Evaluate for vulnerabilities using Microsoft Defender for Cloud

    Lecture 64 Configure Microsoft Defender for SQL

    Section 12: Configure and manage security monitoring solutions

    Lecture 65 Create and customize alert rules by using Azure Monitor

    Lecture 66 Configure diagnostic logging and log retention by using Azure Monitor

    Lecture 67 Monitor security logs by using Azure Monitor

    Lecture 68 Understanding Microsoft Sentinel

    Lecture 69 Create a log analytics workspace needed for Microsoft Sentinel

    Lecture 70 Implement Microsoft Sentinel

    Section 13: Configure security for storage

    Lecture 71 Creating a storage account

    Lecture 72 Configure access control for storage accounts

    Lecture 73 Configure storage account access keys

    Lecture 74 Configure Azure Files identity-based authentication for SMB access

    Lecture 75 Configure delegated access

    Section 14: Configure security for data

    Lecture 76 Enable a SQL Database/Server and connect with SSMS

    Lecture 77 Configure SQL firewall settings for client connections

    Lecture 78 Enable database authentication by using Azure AD, part of Microsoft Entra

    Lecture 79 Enable database auditing

    Lecture 80 Configure dynamic masking on SQL workloads

    Lecture 81 Implement database encryption for Azure SQL Database

    Lecture 82 Implement network isolation for data solutions, Synapse Analytics & Cosmos DB

    Section 15: Configure and manage Azure Key Vault

    Lecture 83 Create and configure Key Vault

    Lecture 84 Configure access to Key Vault

    Lecture 85 Manage certificates, secrets, and keys

    Lecture 86 Configure key rotation

    Lecture 87 Configure backup and recovery of certificates, secrets, and keys

    Section 16: Finishing Up

    Lecture 88 BONUS Lecture

    IT people interested in learning and passing the Microsoft AZ-500 exam!,IT people interested in learning a tremendous amount about security in Microsoft Azure Services!