In this course of Microsoft Azure Security Technologies, professionals will get to learn about the knowledge and skills required to maintain the security posture, implement security controls, and identify and remediation of vulnerabilities by using a variety of security tools. Microsoft Azure Security Technologies also covers configuring and deploying security solutions for cloud N-tier architecture.



Radiant Techlearning offers Microsoft Azure Security Technologies training program in Classroom & Virtual Instructor Led / online mode.



Duration: 4 Days 



Learning Objectives

This course will enable professionals to: 

  • Describe specialized data classifications on Azure
  • Identify Azure data protection mechanisms
  • Implement Azure data encryption methods
  • Secure Internet protocols and how to implement them on Azure
  • Describe Azure security services and features


Before attending this course, it is strongly encouraged that learners acquire the knowledge equivalent to what is assessed as part of the Microsoft Azure Administrator Associate certification.



Audience profile

Professionals should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.

Course Content

Module 1: Manage Identity and Access

Gone are the days when security focused on a strong perimeter defence to keep malicious hackers out. Inside the wall, an organization’s systems were trusted and anything outside the perimeter was treated as hostile. Today’s security posture uses the Zero Trust model and to assume breach. Security professionals no longer focus on perimeter defence. Data and services evenly from both inside and outside the corporate firewall have to be supported access by modern-day organizations. This section will provide a roadmap to start building more security into Azure solutions.


  • Configure Azure AD PIM
  • Configure and manage Azure Key Vault
  • Configure Azure AD for Azure workloads
  • Security for an Azure subscription


This module will enable professionals to: 

  • Understand the Zero Trust Model.
  • Configure Azure Active Directory for workloads.
  • Configure Azure AD Privileged Identity Management.
  • Configure Azure tenant security.
  • Configure and manage Key Vault.


Module 2: Implement Platform Protection

We know that security is jobbing one in the cloud and how important it is that you find accurate and timely information about Azure security. Taking advantage of Azure’s wide array of security tools and capabilities is one of the prominent reasons to use it for your apps and services. Creation of secure solutions on the secure Azure platform is possible with these tools and capabilities.


  • Understand cloud security
  • Azure networking
  • Secure the network
  • Implementing host security
  • Implement platform security
  • Implement subscription security


This course will enable professionals to: 

  • Implement network security.
  • Implement host security.
  • Configure container Security.
  • Implement Azure Resource Manager security.


Module 3: Secure Data and applications

A comprehensive solution which is helpful for the organizations to gain full advantage out of the promise of cloud applications while maintaining control with improved visibility into activity is the Azure security for data and applications offers a. It also protects the critical data across cloud applications more efficiently. Organizations can safely move to the cloud while maintaining control of critical data using tools to help assess risk, uncover Shadow IT, investigate activities and stop threats, enforce policies etc.


  • Configure security policies to manage data
  • Configure security for data infrastructure
  • Configure encryption for data at rest
  • Understand application security
  • Implement security for application lifecycle
  • Secure applications


This course will enable professionals to: 

  • Configure security policies to manage data.
  • Configure security for data infrastructure.
  • Configure encryption for data at rest.
  • Implement security for application delivery.
  • Configure application security.


Module 4: Manage Security Operations

Azure secures the mechanisms to help administrators managing Azure cloud services and virtual machines. The mechanisms included are as follows: 

  • Authentication and role-based access control, 
  • Monitoring, 
  • Logging, and Auditing, 
  • Certificates and encrypted communications, 
  • Web management portal.



  • Configure security services
  • Configure security policies using Azure Security Center
  • Manage security alerts
  • Respond to an remediation of security issues
  • Create security baselines


This course will enable professionals to: 

  • Configure security services.
  • Configure security policies.
  • Manage security alerts.


Q: What is Azure Security?


A: Azure Security Center is a unified infrastructure security management system which strengthens the security posture of user data centers and also provides advanced threat protection across user hybrid workloads in the cloud doesn’t matter whether they’re in Azure or not, as well as on premises.


Q: How do you implement security in Azure?


A: To implement security in Azure user can use the following steps:-

  • Get continuous protection with deeper insights from Azure Security Center.
  • Simplify security with built-in controls
  • Manage identity and control access.
  • Secure your network.
  • Safeguard data.
  • Key, secrets and certificate management.
  • Get centralized visibility and prevent attacks.


Q: How do I monitor Azure?


A: View performance directly from an Azure virtual machine scale set. To access directly from an Azure virtual machine scale set, some steps are required and i.e. In the portal of Azure, user select Virtual machine scale sets. From the list, user can easily choose a VM and in the Monitoring section choose Insights to view the Performance tab.


Q: What is Microsoft Azure technology?


A: Microsoft Azure, commonly referred to as Azure, is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers.


Q: Will I get course completion certificate?


A: The course completion certification would be awarded to all the professionals, who have completed the training program and the project assignment given by your instructor. 

You can use the certificate in your future job interviews will surely help you to land in your dream job.


Q: What is the infrastructure required to attend your training program?


A: To attend the training session you should have an operational Desktops or Laptops with required specification along with good internet connection to access the labs. 


Q: What if I miss a class on a particular day?


A: We would always recommend you to attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if due to some contingency if you have to skip the class Radiant Techlearning would help you with the recorded session of that particular day.  However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.


Q: How I will be accessing the labs?


A: Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant’s hand-on-practice. 

Participants can easily access these labs over Cloud with the help of remote desktop connection. 

Radiant virtual labs provides you the flexibility to learn from anywhere in the world and in any time zone. 


Unble To Find a Batch..?

Request a Batch