AZ-500T00 – Microsoft Azure Security Technologies

  • Duration: 5 days
Categories:

The AZ-500 certification course focuses on securing Azure solutions, providing an in-depth understanding of the tools and strategies to safeguard your Azure environment. It covers a wide range of topics, starting with configuring and managing Azure Active Directory for identity and access management, as well as implementing hybrid identity solutions with Azure AD Connect. The course delves into Azure AD security, including identity protection, privileged identity management, and enterprise governance strategies using RBAC and Azure Policy.

It also explores perimeter security concepts, network security, and host security to protect applications and devices. Further, it addresses container security, key vault protection, and the use of Azure’s application and storage security features. The course teaches how to secure and monitor databases, implement Microsoft Defender for Cloud, and use Azure Sentinel for tracking and responding to security threats. With a focus on both proactive security measures and continuous monitoring, this course prepares individuals to design, implement, and manage comprehensive security strategies in Azure environments.

1. Secure Azure solutions with Azure Active Directory

Explore how to securely configure and administer your Azure Active Directory instance.

Click here to know more

2. Implement Hybrid identity

Explore how to deploy and configure Azure AD Connect to create a hybrid identity solution for your company.

Click here to know more

3. Deploy Azure AD identity protection

Protect identities in Azure AD using Conditional Access, MFA, access reviews, and other capabilities.

Click here to know more

4. Configure Azure AD privileged identity management

Ensure that your privileged identities have extra protection and are accessed only with the least amount of access needed to do the job.

Click here to know more

5. Design an enterprise governance strategy

Learn to use RBAC and Azure Policy to limit access to your Azure solutions, and determine which method is right for your security goals.

Click here to know more

6. Implement perimeter security

Prevent attacks before they get to your Azure solutions. Use the concepts of defense in depth and zero trust to secure Azure perimeter.

Click here to know more

7. Configure network security

Use Azure network capabilities to secure your network and applications from external and internal attacks.

Click here to know more

8. Configure and manage host security

Learn to lock down the devices, virtual machines, and other components that run your applications in Azure.

Click here to know more

9. Enable Containers security

Explore how to secure your applications running within containers and how to securely connect to them.

Click here to know more

10. Deploy and secure Azure Key Vault

Protect your keys, certificates, and secrets in Azure Key Vault. Learn to configure key vault for the most secure deployment.

Click here to know more

11. Configure application security features

Register your company applications then use Azure security features to configure and monitor secure access to the application.

Click here to know more

12. Implement storage security

Ensure your data is stored, transferred, and accessed in a secure way using Azure storage and file security features.

Click here to know more

13. Configure and manage SQL database security

Configure and lock down your SQL database on Azure to protect your corporate data while it is stored.

Click here to know more

14. Configure and manage Azure Monitor

Use Azure Monitor, Log Analytics, and other Azure tools to monitor the secure operation of your Azure solutions.

Click here to know more

15. Enable and manage Microsoft Defender for Cloud

Use Azure Security Center, Azure Defender, and Secure Score to track and improve your security posture in Azure.

Click here to know more

16. Configure and monitor Microsoft Sentinel

Use Azure Sentinel to discover, track, and respond to security breaches within your Azure environment.

Click here to know more

Leave feedback about this