AZ-500T00 – Microsoft Azure Security Technologies

  • Duration: 10 weeks
Categories:

1. Secure Azure solutions with Azure Active Directory

Explore how to securely configure and administer your Azure Active Directory instance.

Click here to know more

2. Implement Hybrid identity

Explore how to deploy and configure Azure AD Connect to create a hybrid identity solution for your company.

Click here to know more

3. Deploy Azure AD identity protection

Protect identities in Azure AD using Conditional Access, MFA, access reviews, and other capabilities.

Click here to know more

4. Configure Azure AD privileged identity management

Ensure that your privileged identities have extra protection and are accessed only with the least amount of access needed to do the job.

Click here to know more

5. Design an enterprise governance strategy

Learn to use RBAC and Azure Policy to limit access to your Azure solutions, and determine which method is right for your security goals.

Click here to know more

6. Implement perimeter security

Prevent attacks before they get to your Azure solutions. Use the concepts of defense in depth and zero trust to secure Azure perimeter.

Click here to know more

7. Configure network security

Use Azure network capabilities to secure your network and applications from external and internal attacks.

Click here to know more

8. Configure and manage host security

Learn to lock down the devices, virtual machines, and other components that run your applications in Azure.

Click here to know more

9. Enable Containers security

Explore how to secure your applications running within containers and how to securely connect to them.

Click here to know more

10. Deploy and secure Azure Key Vault

Protect your keys, certificates, and secrets in Azure Key Vault. Learn to configure key vault for the most secure deployment.

Click here to know more

11. Configure application security features

Register your company applications then use Azure security features to configure and monitor secure access to the application.

Click here to know more

12. Implement storage security

Ensure your data is stored, transferred, and accessed in a secure way using Azure storage and file security features.

Click here to know more

13. Configure and manage SQL database security

Configure and lock down your SQL database on Azure to protect your corporate data while it is stored.

Click here to know more

14. Configure and manage Azure Monitor

Use Azure Monitor, Log Analytics, and other Azure tools to monitor the secure operation of your Azure solutions.

Click here to know more

15. Enable and manage Microsoft Defender for Cloud

Use Azure Security Center, Azure Defender, and Secure Score to track and improve your security posture in Azure.

Click here to know more

16. Configure and monitor Microsoft Sentinel

Use Azure Sentinel to discover, track, and respond to security breaches within your Azure environment.

Click here to know more

Leave feedback about this