MCSEClasses Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


Microsoft Course AZ-500: Microsoft Azure Security Technologies

Course Length: 4 days
Certifications: Microsoft MCA Certified: Azure Security Engineer Associate
Number of Exams: 1

Class Schedule
Call for Class Schedule
  • Certified Instructor
  • Includes all course materials
  • Exam AZ-500: Azure Security Engineers implement security controls and threat protection; manage identity and access; and protect data, applications, and networks in cloud and hybrid environments as part of end-to-end infrastructure.


    Course AZ-500T00: Microsoft Azure Security Technologies

    In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture. This course helps prepare for the Exam AZ-500: Microsoft Azure Security Technologies.

    Audience profile

    Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.

    At course completion

    After completing this course, students will be able to:

    • Describe specialized data classifications on Azure
    • Identify Azure data protection mechanisms
    • Implement Azure data encryption methods
    • Secure Internet protocols and how to implement them on Azure
    • Describe Azure security services and features

    Prerequisites

    Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.

    Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.

    Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.

    Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.

    Course Outline

    1 - Secure Azure solutions with Azure Active Directory
    • Explore Azure Active Directory features
    • Self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services
    • Azure AD DS and self-managed AD DS
    • Azure AD DS and Azure AD
    • Investigate roles in Azure AD
    • Azure AD built-in roles
    • Deploy Azure AD Domain Services
    • Create and manage Azure AD users
    • Manage users with Azure AD groups
    • Configure Azure AD administrative units
    • Implement passwordless authentication
    • Explore Try-This exercises
    2 - Implement Hybrid identity
    • Deploy Azure AD connect
    • Explore authentication options
    • Configure Password Hash Synchronization (PHS)
    • Implement Pass-through Authentication (PTA)
    • Deploy Federation with Azure AD
    • Explore the authentication decision tree
    • Configure password writeback
    3 - Deploy Azure AD identity protection
    • Explore Azure AD identity protection
    • Configure risk event detections
    • Implement user risk policy
    • Implement sign-in risk policy
    • Deploy multifactor authentication in Azure
    • Explore multifactor authentication settings
    • Enable multifactor authentication
    • Implement Azure AD conditional access
    • Configure conditional access conditions
    • Implement access reviews
    • Explore try-this exercises
    4 - Configure Azure AD privileged identity management
    • Explore the zero trust model
    • Review the evolution of identity management
    • Deploy Azure AD privileged identity management
    • Configure privileged identity management scope
    • Implement privileged identity management onboarding
    • Explore privileged identity management configuration settings
    • Implement a privileged identity management workflow
    • Explore Try-This exercises
    5 - Design an enterprise governance strategy
    • Review the shared responsibility model
    • Explore the Azure cloud security advantages
    • Review Azure hierarchy of systems
    • Configure Azure policies
    • Enable Azure role-based access control (RBAC)
    • Compare and contrast Azure RBAC vs Azure policies
    • Configure built-in roles
    • Enable resource locks
    • Deploy Azure blueprints
    • Design an Azure subscription management plan
    • Explore Try-This exercises
    6 - Implement perimeter security
    • Define defense in depth
    • Explore virtual network security
    • Enable Distributed Denial of Service (DDoS) Protection
    • Configure a distributed denial of service protection implementation
    • Explore Azure Firewall features
    • Deploy an Azure Firewall implementation
    • Configure VPN forced tunneling
    • Create User Defined Routes and Network Virtual Appliances
    • Explore hub and spoke topology
    • Perform try-this exercises
    7 - Configure network security
    • Explore Network Security Groups (NSG)
    • Deploy a Network Security Groups implementation
    • Create Application Security Groups
    • Enable service endpoints
    • Configure service endpoint services
    • Deploy private links
    • Implement an Azure application gateway
    • Deploy a web application firewall
    • Configure and manage Azure front door
    • Review ExpressRoute
    • Perform try-this exercises
    8 - Configure and manage host security
    • Enable endpoint protection
    • Define a privileged access device strategy
    • Deploy privileged access workstations
    • Create virtual machine templates
    • Enable and secure remote access management
    • Configure update management
    • Deploy disk encryption
    • Managed disk encryption options
    • Deploy and configure Windows Defender
    • Microsoft cloud security benchmark in Defender for Cloud
    • Explore Microsoft Defender for Cloud recommendations
    • Perform Try-This exercises
    9 - Enable Containers security
    • Explore containers
    • Configure Azure Container Instances security?
    • Manage security for Azure Container Instances (ACI)?
    • Explore the Azure Container Registry (ACR)?
    • Enable Azure Container Registry authentication
    • Review Azure Kubernetes Service (AKS)?
    • Implement an Azure Kubernetes Service architecture?
    • Configure Azure Kubernetes Service networking?
    • Deploy Azure Kubernetes Service storage?
    • Secure authentication to Azure Kubernetes Service with Active Directory?
    • Manage access to Azure Kubernetes Service using Azure role-based access controls
    10 - Deploy and secure Azure Key Vault
    • Explore Azure Key Vault
    • Configure Key Vault access
    • Review a secure Key Vault example
    • Deploy and manage Key Vault certificates
    • Create Key Vault keys
    • Manage customer managed keys
    • Enable Key Vault secrets
    • Configure key rotation
    • Manage Key Vault safety and recovery features
    • Perform Try-This exercises
    • Explore the Azure Hardware Security Module
    11 - Configure application security features
    • Review the Microsoft identity platform
    • Explore the Application model
    • Register an application with App Registration
    • Configure Microsoft Graph permissions
    • Enable managed identities
    • Azure App Services
    • App Service Environment
    • Azure App Service plan
    • App Service Environment networking
    • Availability Zone Support for App Service Environments
    • App Service Environment Certificates
    • Perform Try-This exercises
    12 - Implement storage security
    • Define data sovereignty
    • Configure Azure storage access
    • Deploy shared access signatures
    • Manage Azure AD storage authentication
    • Implement storage service encryption
    • Configure blob data retention policies
    • Configure Azure files authentication?
    • Enable the secure transfer required? property
    • Perform Try-This exercises
    13 - Configure and manage SQL database security
    • Enable SQL database authentication
    • Configure SQL database firewalls
    • Enable and monitor database auditing
    • Implement data discovery and classification?
    • Microsoft Defender for SQL
    • Vulnerability assessment for SQL Server
    • SQL Advanced Threat Protection
    • Explore detection of a suspicious event
    • SQL vulnerability assessment express and classic configurations
    • Configure dynamic data masking
    • Implement transparent data encryption?
    • Deploy always encrypted? features
    • Deploy an always encrypted implementation
    • Perform Try-This exercises
    14 - Configure and manage Azure Monitor
    • Explore Azure Monitor
    • Configure and monitor metrics and logs
    • Enable Log Analytics
    • Manage connected sources for log analytics
    • Enable Azure monitor Alerts
    • Configure properties for diagnostic logging
    • Perform try-this exercises
    15 - Enable and manage Microsoft Defender for Cloud
    • MITRE Attack matrix
    • Implement Microsoft Defender for Cloud
    • Security posture
    • Workload protections
    • Deploy Microsoft Defender for Cloud
    • Azure Arc
    • Azure Arc capabilities
    • Microsoft cloud security benchmark
    • Configure Microsoft Defender for Cloud security policies
    • View and edit security policies
    • Manage and implement Microsoft Defender for Cloud recommendations
    • Explore secure score
    • Define brute force attacks
    • Understand just-in-time VM access
    • Implement just-in-time VM access
    • Perform try-this exercises
    16 - Configure and monitor Microsoft Sentinel
    • Enable Microsoft Sentinel
    • Configure data connections to Sentinel
    • Create workbooks to monitor Sentinel data
    • Enable rules to create incidents
    • Configure playbooks
    • Hunt and investigate potential breaches

    [ back to top ]


    MCSEClasses.com is your best choice for Microsoft AZ-500, Microsoft AZ-500 training, Microsoft AZ-500 certification, Microsoft AZ-500 certification boot camp, Microsoft AZ-500 boot camp, Microsoft AZ-500 certification training, Microsoft AZ-500 boot camp training, Microsoft AZ-500 boot camp certification, Microsoft AZ-500 certification course, Microsoft AZ-500 course, training Microsoft AZ-500, certification Microsoft AZ-500, boot camp Microsoft AZ-500, certification Microsoft AZ-500 boot camp, certification Microsoft AZ-500 training, boot camp Microsoft AZ-500 training, certification Microsoft AZ-500 course.



    mcseclasses home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | ced solutions oracle® certification training | linux, unix, aix | comptia certification | webmaster training | pricing | locations | financing | instructors needed | e-mail us





    Search classes by keyword:


    Search classes by category:

    Copyright © 2024 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.

    MCSE certification boot camps and courses are offered in these select cities: Albany MCSE, Albuquerque MCSE, Alexandria MCSE, Anchorage MCSE, Atlanta MCSE, Austin MCSE, Billings MCSE, Birmingham MCSE, Bismarck MCSE, Boise MCSE, Boston MCSE, Charleston MCSE, Charlotte MCSE, Cheyenne MCSE, Chicago MCSE, Cincinnati MCSE, Cleveland MCSE, Columbia MCSE, Columbus MCSE, Dallas MCSE, Denver MCSE, Des Moines MCSE, Detroit MCSE, Hartford MCSE, Honolulu MCSE, Houston MCSE, Indianapolis MCSE, Jackson MCSE, Kansas City MCSE, Las Cruces MCSE, Lincoln MCSE, Little Rock MCSE, Los Angeles MCSE, Louisville MCSE, Madison MCSE, Milwaukee MCSE, Minneapolis MCSE, Montpelier MCSE, New Orleans MCSE, New York City MCSE, Norfolk MCSE, Oklahoma City MCSE, Omaha MCSE, Philadelphia MCSE, Phoenix MCSE, Pierre MCSE, Pittsburgh MCSE, Portland MCSE, Princeton MCSE, Providence MCSE, Raleigh MCSE, Richmond MCSE, Sacramento MCSE, Salt Lake City MCSE, San Antonio MCSE, San Diego MCSE, San Francisco MCSE, San Jose MCSE, Seattle MCSE, Stamford MCSE, Tulsa MCSE, Washington MCSE, Wilmington MCSE.

    MCSE Canada Boot Camps : mcse Calgary, mcse Edmonton, mcse Halifax, mcse Hamilton, mcse Kitchener, mcse London, mcse Montreal, mcse Ottawa, mcse Quebec City, mcse Toronto, mcse Vancouver, mcse Winnipeg.

    CED Solutions offers MCSE certification boot camps and courses in the United States: MCSE Alabama, MCSE Alaska, MCSE Arizona, MCSE Arkansas, MCSE California, MCSE Colorado, MCSE Connecticut, MCSE District of Columbia, MCSE Delaware, MCSE Georgia, MCSE Hawaii, MCSE Idaho, MCSE Illinois, MCSE Indiana, MCSE Iowa, MCSE Kansas, MCSE Kentucky, MCSE Louisiana, MCSE Maine, MCSE Massachusetts, MCSE Michigan, MCSE Minnesota, MCSE Mississippi, MCSE Missouri, MCSE Montana, MCSE Nebraska, MCSE New Jersey, MCSE New Mexico, MCSE New York, MCSE North Carolina, MCSE North Dakota, MCSE Ohio, MCSE Oklahoma, MCSE Oregon, MCSE Pennsylvania, MCSE Rhode Island, MCSE South Carolina, MCSE South Dakota, MCSE Texas, MCSE Utah, MCSE Vermont, MCSE Virginia, MCSE Washington, MCSE West Virginia, MCSE Wisconsin, MCSE Wyoming.

    MCSE Canada Boot Camps : Alberta mcse, British Columbia mcse, Manitoba mcse, New Brunswick mcse, Newfoundland mcse, Nova Scotia mcse, Ontario mcse, Saskatchewan mcse. Quebec mcse.