Course AZ-500T00: Microsoft Azure Security Technologies

Course Description

This training provides IT Security Professionals with the knowledge & skills needed to implement security controls, maintain an organization's security posture, & identify & remediate security vulnerabilities. This course includes security for identity & access, platform protection, data & applications, & security operations.

Prerequisites

Successful learners will have prior knowledge & understanding of the following:

  • Security best practices & industry security standards such as the "zero trust" paradigm, "shared responsibility," "multi-factor authentication," "least privileged access," and "defense in depth."
  • Learn about security protocols, including disc and data encryption techniques, Virtual Private Networks (VPN), Internet Security Protocol (IPSec), and Secure Socket Layer (SSL).
  • Working knowledge of deploying Azure workloads. The foundations of Azure administration are not covered in this course. Instead, the course material expands on that understanding by including information pertaining to security.
  • Have experience with Windows & Linux operating systems & scripting languages.
  • Course labs may use PowerShell & the CLI.

 

Target Audience

This course is for Azure Security Engineers planning to take the associated certification exam or perform security tasks in their day-to-day job. This course would also be beneficial for an engineer who wants to focus on delivering security for digital platforms built on Azure and play a key role in safeguarding an organization's data.

Content Outline

  • Configure Azure AD & Azure AD Domain Services for security
  • Create users & groups that enable the safe usage of your tenant
  • Use MFA to protect user's identities
  • Configure passwordless security options
  • Deploy Azure AD Connect
  • Pick & configure the best authentication option for your security needs
  • Configure password writeback
  • Deploy & configure Identity Protection
  • Configure MFA for users, groups, & applications
  • Make Conditional Access policies to ensure your security
  • Create & follow an access review process
  • Explain Zero Trust & how it impacts security
  • Configure & deploy roles using Privileged Identity Management (PIM)
  • Examine each PIM setting's usefulness in relation to your security objectives.
  • Explain the shared responsibility model & how it impacts your security configuration
  • Create Azure policies to protect your solutions
  • Configure & deploy access to services using RBAC
  • Define defense in depth
  • Protect your environment from denial-of-service attacks
  • Secure your solutions using firewalls & VPNs
  • Depending on your security posture, examine your end-to-end perimeter security setup.
  • Deploy & configure network security groups to protect your Azure solutions
  • Configure & lockdown service endpoints & private links
  • Using Application Gateway, Web App Firewall, and Front Door, you can protect your apps.
  • Set up ExpressRoute to safeguard your network traffic.
  • Configure & deploy Endpoint Protection
  • Deploy a privileged access strategy for devices & privileged workstations
  • Secure your virtual machines & access to them
  • Deploy Windows Defender
  • Practice layered security by reviewing & implementing Security Centers & Security Benchmarks
  • Describe the security tools that are available for containers in Azure
  • Configure security settings for containers & Kubernetes services
  • Lock down the network, storage, & identity resources connected to your containers
  • Deploy RBAC to control access to containers
  • Define what a key vault is & how it protects certificates & secrets
  • Deploy & configure Azure Key Vault
  • Secure access & administration of your crucial vault
  • Store keys & secrets in your key vault
  • Explore critical security considers like key rotation & backup/recovery
  • Utilizing app registration, create an application in Azure.
  • Select & configure which Azure AD users can access each application
  • Configure & deploy web app certificates
  • Define data sovereignty & how that is achieved in Azure
  • Configure Azure Storage access in a secure & managed way
  • Encrypt your data both in transit and at rest.
  • Apply rules for data retention
  • Configure which users & applications have access to your SQL databases
  • Block access to your servers using firewalls
  • Discover, classify, & audit the use of your data
  • Encrypt & protect your information while it is stored in the database.
  • Configure & monitor Azure Monitor
  • Define metrics & logs you want to track for your Azure applications
  • Connect data sources to & configure Log Analytics
  • Create & monitor alerts associated with the security of your solution
  • Define the most common types of cyber-attacks
  • Review Secure Score & raise it
  • Depending on your security posture, configure Azure Security Center.
  • Lock down your solutions using Security Center & Defender
  • Enable Just-in-Time access & other security features
  • Explain what Azure Sentinel is & how it is used
  • Connect data to Azure Sentinel, like Azure AD, Azure Logs
  •  & others
  • Track incidents using workbooks, playbooks, & hunting techniques
  • Deploy Azure Sentinel

FAQs

Azure Security Center is a unified infrastructure security management system that strengthens the security posture of user data centers & also provides advanced threat protection across user hybrid workloads in the Cloud, whether they're in Azure or not as on-premises.

To implement security in Azure, user can use the following steps:-

  • Get continuous protection with more profound insights from Azure Security Center.
  • Simplify security with built-in controls
  • Manage identity & power access.
  • Secure your network.
  • Safeguard data.
  • Key, secrets & certificate management.
  • Get centralized visibility & prevent attacks.

View performance directly from an Azure virtual machine scale set. To access now from an Azure virtual machine scale set, some steps are required &, i.e., In the portal of Azure, a user selects Virtual machine scale sets. From the list, the user can easily choose a VM & in the Monitoring section, select Insights to view the Performance tab.

Microsoft Azure, commonly referred to as Azure, is a Microsoft cloud computing service for developing, testing, and delivering, & managing applications & services through Microsoft-managed data centers.

To attend the training session, you should have operational Desktops or Laptops with the required specification and a good internet connection to access the labs. 

We would always recommend you attend the live session to practice & clarify the doubts instantly & get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Techlearning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption & NOT for distribution or commercial use.

Radiant Techlearning has a data center containing the Virtual Training environment for participants' h&-on-practice. 

Participants can easily access these labs over Cloud with the help of a remote desktop connection. 

Radiant virtual labs allow you to learn from anywhere in the world & in any time zone.

 

The learners will be enthralled as we engage them the real-world & industry Oriented projects during the training program. These projects will improve your skills & knowledge & you will gain a better experience. These real-time projects will help you a lot in your future tasks & assignments.

Send a Message.


  • Enroll