AZ-500: Microsoft Azure Security Technologies
![](https://cloud-hox.com/wp-content/uploads/2024/01/mast.jpg)
About Course
AZ-500: Microsoft Azure Security Technologies – Course Overview
This AZ-500 certification training course from CloudHox is designed to train IT professionals who plan to take the Microsoft AZ-500 certification exam. This course and passing the AZ-500 exam will meet all the requirements to become a Microsoft Certified Azure Security Engineer Associate.
The Microsoft Certified Azure Security Engineer Associate certification offers in-depth knowledge and understanding of Azure Security Technologies.
Azure security engineers often serve as part of a larger team to plan and implement cloud-based management and security. The responsibilities of an Azure security engineer include managing the security posture, identifying and remediating vulnerabilities, performing threat modeling, implementing threat protection, and responding to security incident escalations.
After completing Azure AZ 500 course, students will be able to:
- Describe specialized data classifications on Azure
- Identify Azure data protection mechanisms
- Implement Azure data encryption methods
- Secure Internet protocols and how to implement them on Azure
- Describe Azure security services and features
Main Highlights of Microsoft AZ-500 Training
- Our Azure Security certification AZ-500 training modules have 50% -60% hands-on lab sessions to encourage Thinking-Based Learning (TBL).
- Interactive-rich virtual and face-to-face classroom teaching to inculcate Problem-Based Learning (PBL).
- Microsoft certified instructor-led training and mentoring sessions to develop Competency-Based Learning (CBL) and inculcate Problem-Based Learning (PBL).
- Well-structured use-cases to simulate challenges encountered in a Real-World environment during Microsoft AZ-500 certification training.
- Integrated teaching assistance and support through experts designed Learning Management System (LMS) and ExamReady platform.
- Being a Microsoft Learning Partner provides us with the edge over competition.
Course Content
Module 1: Manage Identity and Access
Azure Active Directory
-
Azure AD Features
00:00 -
Azure AD vs AD DS
00:00 -
Roles for Azure AD
00:00 -
Azure AD Domain Services
00:00 -
Azure AD Users
00:00 -
Azure AD Groups
00:00 -
Administrative Units
00:00 -
Password-less
00:00
Hybrid Identity
-
Azure AD Connect
00:00 -
Azure AD Connect cloud sync
00:00 -
Authentication Options
00:00 -
Password Hash Synchronization (PHS)
00:00 -
Pass-through Authentication (PTA)
00:00 -
Federation with Azure AD
00:00 -
Authentication Decision Tree
00:00 -
Password Writeback
00:00
Azure Identity Protection
-
Azure AD Identity Protection
00:00 -
Risk Events
00:00 -
User Risk Policy
00:00 -
Sign-in Risk Policy
00:00 -
Azure MFA concepts
00:00 -
Conditions
00:00 -
Access Reviews
00:00
Azure AD Privileged Identity Management
-
Microsoft’s Zero Trust Model
00:00 -
Microsoft Identity Management Evolution
00:00 -
PIM Features
00:00 -
PIM Scope
00:00 -
PIM Onboarding
00:00 -
PIM Configuration Settings
00:00 -
PIM Workflow
00:00
Enterprise Governance
-
Shared Responsibility Model
00:00 -
Azure Cloud Security Advantages
00:00 -
Azure Hierarchy
00:00 -
Azure Policy
00:00 -
Azure Role Based Access Control (RBAC)
00:00 -
Azure RBAC vs Azure Policies
00:00 -
Built-in Roles
00:00 -
Resource Locks
00:00 -
Azure Blueprints
00:00 -
Azure Subscription Management
00:00
Module 2: Implement Platform Protection
Perimeter Security
-
Defense in Depth
00:00 -
Virtual Network Security
00:00 -
Distributed Denial of Service (DDoS)
00:00 -
DDoS Implementation
00:00 -
Azure Firewall Features
00:00 -
Azure Firewall Implementation
00:00 -
VPN Forced Tunneling
00:00 -
UDRs and NVAs
00:00
Network Security
-
Network Security Groups (NSG)
00:00 -
NSG Implementation
00:00 -
Application Security Groups
00:00 -
Service Endpoints
00:00 -
Private Endpoints
00:00 -
Azure Application Gateway
00:00 -
Web Application Firewall
00:00 -
Azure Front Door
00:00 -
ExpressRoute
00:00
Host Security
-
Endpoint Protection
00:00 -
Privileged Access Workstations
00:00 -
Virtual Machine Templates
00:00 -
Remote Access Management
00:00 -
Update Management
00:00 -
Disk Encryption
00:00 -
Microsoft Defender
00:00 -
Security Center Recommendations
00:00 -
Securing Azure Workloads
00:00
Container Security
-
Containers
00:00 -
ACI Security
00:00 -
Azure Container Instances (ACI)
00:00 -
Azure Container Registry (ACR)
00:00 -
ACR Authentication
00:00 -
Azure Kubernetes Service (AKS)
00:00 -
AKS Terminology
00:00 -
AKS Architecture
00:00 -
AKS Networking
00:00 -
AKS Storage
00:00 -
AKS and Active Directory
00:00
Module 3: Secure Data and Applications
Azure Key Vault
-
Azure Key Vault Features
00:00 -
Key Vault Access
00:00 -
Key Vault Example
00:00 -
Key Vault Certificates
00:00 -
Key Vault Keys
00:00 -
Customer Managed Keys
00:00 -
Key Vault Secrets
00:00 -
Key Rotation
00:00
Application Security
-
Microsoft Identity Platform
00:00 -
Azure AD Application Scenarios
00:00 -
App Registration
00:00 -
Microsoft Graph Permissions
00:00 -
Managed Identities
00:00 -
Web App Certificates
00:00
Storage Security
-
Data Sovereignty
00:00 -
Azure Storage Access
00:00 -
Shared Access Signatures
00:00 -
Azure AD Storage Authentication
00:00 -
Storage Service Encryption
00:00 -
Blob Data Retention Policies
00:00 -
Azure Files Authentication
00:00 -
Secure Transfer Required
00:00
SQL Database Security
-
SQL Database Authentication
00:00 -
SQL Database Firewalls
00:00 -
Database Auditing
00:00 -
Data Discovery and Classification
00:00 -
Vulnerability Assessment
00:00 -
Advanced Threat Protection
00:00 -
Dynamic Data Masking
00:00 -
Transparent Data Encryption
00:00 -
Always Encrypted
00:00
Module 4: Manage Security Operations
Azure Monitor
-
Azure Monitor
00:00 -
Metrics and Logs
00:00 -
Log Analytics
00:00 -
Connected Sources
00:00 -
Azure Monitor Alerts
00:00 -
Diagnostic Logging
00:00
Microsoft Defender for Cloud
-
Cyber Kill Chain
00:00 -
Microsoft Defender for Cloud Features
00:00 -
Security Center Policies
00:00 -
Security Center Recommendations
00:00 -
Secure Score
00:00 -
Brute Force Attacks
00:00 -
Just in Time Virtual Machine Access
00:00
Microsoft Sentinel
-
Microsoft Sentinel
00:00 -
Data Connections
00:00 -
Workbooks
00:00 -
Incidents
00:00 -
Playbooks
00:00 -
Hunting
00:00