Azure Security Certification Training AZ-500
Categories: All Courses, Cybersecurity Certifications

About Course
Azure Security Certification Training AZ-500 equips IT professionals with expertise in securing Microsoft Azure environments. Covering various security aspects, it focuses on identity and access management, platform protection, data security, and networking security. Participants learn to implement security controls, detect vulnerabilities, and respond to threats effectively. This training ensures mastery of Azure security tools and techniques, enhancing the ability to design and manage secure cloud solutions. Successful completion leads to the Microsoft Certified: Azure Security Engineer Associate credential, validating proficiency in safeguarding Azure resources.
What Will You Learn?
- 1. Expertise
- 2. Career Advancement
- 3. Risk Mitigation
- 4. Compliance
- 5. Hands-On Experience
- 6. Advanced Threat Protection
- 7. Cloud Security Confidence
Course Content
Module 1
-
1.01 Concepts of defense
-
1.02 Layers of security
-
1.03 Security requirements and compliance
Module 2
-
2.01 Introduction to Azure Active Directory
-
2.02 Azure AD tenants
-
2.03 Password reset
-
2.04 AD Connect and its implementation
-
2.05 Using AD Connect Health for monitoring
-
2.06 MFA and SSO
-
2.07 Protection of identity
-
2.08 Registration of apps
-
2.09 Creating service principals
-
2.10 Privileged Identity Management (PIM)
-
2.11 RBAC
-
2.12 Activating a PIM role
Module 3
-
3.01 Using portals to build a network
-
3.02 Utilizing PowerShell and building subnets and VNets
-
3.03 Connectivity and peering in VNet
-
3.04 Routing
-
3.05 DNS Private and public
-
3.06 DNS and the Internet
-
3.07 Network security groups (NSGs)
-
3.08 Network Watcher
-
3.09 Building and configuring NSGs
-
3.10 Services of load balancing in Azure
-
3.11 Configuring App Gateway
-
3.12 Azure Firewall and Front Door
-
3.13 Distributed Denial of Service (DDoS) and its configuration
-
3.14 Azure Bastion
Module 4
-
4.01 Virtual machines (VMs)
-
4.02 Deploying a VM using PowerShell and the portal
-
4.03 Zones and sets and their availability
-
4.04 VM Storage
-
4.05 Disk caching
-
4.06 Encryption of disk in Azure
-
4.07 Key vault creation for disk encryption
-
4.08 Management of virtual machines
-
4.09 Azure Security Center
Module 5
-
5.01 Installation of Git and Docker
-
5.02 Azure Kubernetes Service (AKS)
-
5.03 Building Azure Container Registry
-
5.04 Developing a Kubernetes cluster
-
5.05 Using Kubernetes to run applications
-
5.06 Securing the Container Registry
-
5.07 Security and scanning of a container
Module 6
-
6.01 Implementing RBAC
-
6.02 Azure Policy
-
6.03 Implementing Azure Region Policy
-
6.04 Subscription policies
-
6.05 Resource locks and their implementation
-
6.06 Alerts and Azure Monitor
-
6.07 Log analytics
-
6.08 Introduction to Azure Security Center
-
6.09 Preventing, predicting, and responding to threats
Module 7
-
7.01 SQL services in Azure
-
7.02 Developing a SQL database in Azure
-
7.03 Strategies of caching
-
7.04 Auditing design
-
7.05 Long-term retention of SQL backup
-
7.06 Cosmos DB, along with its levels of consistency
-
7.07 Data Lake store in Azure
-
7.08 Data types
Module 8
-
8.01 Storage accounts
-
8.02 Using the portal to build a storage account
-
8.03 Utilizing Azure Storage and Storage Explorer
-
8.04 SAS development and management
-
8.05 Encryption keys