Azure Security Certification Training AZ-500
Categories: All Courses, Cybersecurity Certifications

About Course
Azure Security Certification Training AZ-500 equips IT professionals with expertise in securing Microsoft Azure environments. Covering various security aspects, it focuses on identity and access management, platform protection, data security, and networking security. Participants learn to implement security controls, detect vulnerabilities, and respond to threats effectively. This training ensures mastery of Azure security tools and techniques, enhancing the ability to design and manage secure cloud solutions. Successful completion leads to the Microsoft Certified: Azure Security Engineer Associate credential, validating proficiency in safeguarding Azure resources.
What Will You Learn?
- 1. Expertise
- 2. Career Advancement
- 3. Risk Mitigation
- 4. Compliance
- 5. Hands-On Experience
- 6. Advanced Threat Protection
- 7. Cloud Security Confidence
Course Content
Module 1
-
1.01 Concepts of defense
06:24 -
1.02 Layers of security
05:12 -
1.03 Security requirements and compliance
06:09 -
Quiz Module 01
-
Section 1: Defense-in-Depth Security Model
-
Section 2: Layers of Security
-
Section 3: Security Requirements and Compliance
-
Section 4: Case Study and Practical Analysis
Module 2
-
2.01 Introduction to Azure Active Directory
08:16 -
2.02 Azure AD tenants
04:29 -
2.03 Password reset
06:22 -
2.04 AD Connect and its implementation
03:01 -
2.05 Using AD Connect Health for monitoring
04:40 -
2.06 MFA and SSO
05:15 -
2.07 Protection of identity
06:13 -
2.08 Registration of apps
04:29 -
2.09 Creating service principals
03:34 -
2.10 Privileged Identity Management (PIM)
05:45 -
2.11 RBAC
05:57 -
2.12 Activating a PIM role
03:41 -
Quiz Module 02
-
Section 1: Introduction to Azure AD & Tenants
-
Section 2: Authentication and Security
-
Section 3: Managing Users and Password Policies
-
Section 4: App Registration and Service Principals
-
Section 5: Privileged Identity Management (PIM) and Role-Based Access Control (RBAC)
-
Section 6: Case Study and Practical Analysis
Module 3
-
3.01 Using portals to build a network
05:31 -
3.02 Utilizing PowerShell and building subnets and VNets
04:54 -
3.03 Connectivity and peering in VNet
05:32 -
3.04 Routing
04:05 -
3.05 DNS Private and public
05:47 -
3.06 DNS and the Internet
04:12 -
3.07 Network security groups (NSGs)
06:02 -
3.08 Network Watcher
05:26 -
3.09 Building and configuring NSGs
03:59 -
3.10 Services of load balancing in Azure
04:28 -
3.11 Configuring App Gateway
05:16 -
3.12 Azure Firewall and Front Door
05:45 -
3.13 Distributed Denial of Service (DDoS) and its configuration
05:23 -
3.14 Azure Bastion
03:52 -
Quiz Module 03
-
Section 1: Building and Configuring Virtual Networks (VNets)
-
Section 2: Name Resolution and Routing in Azure
-
Section 3: Network Security Groups (NSGs) and Firewall Policies
-
Section 4: Monitoring and Troubleshooting Networks
-
Section 5: Load Balancing and Application Security
-
Section 6: Advanced Security Measures in Azure
-
Section 7: Practical Case Study and Analysis
Module 4
-
4.01 Virtual machines (VMs)
04:24 -
4.02 Deploying a VM using PowerShell and the portal
05:20 -
4.03 Zones and sets and their availability
05:15 -
4.04 VM Storage
04:45 -
4.05 Disk caching
04:32 -
4.06 Encryption of disk in Azure
04:39 -
4.07 Key vault creation for disk encryption
05:38 -
4.08 Management of virtual machines
07:09 -
4.09 Azure Security Center
05:58 -
Quiz Module 04
-
Section 1: Virtual Machines and Deployment
-
Section 2: High Availability and Fault Tolerance
-
Section 3: Storage and Disk Management in Azure
-
Section 4: Virtual Machine Security & Management
-
Section 5: Backup, Disaster Recovery, and Monitoring
-
Section 6: Case Study and Practical Scenarios
Module 5
-
5.01 Installation of Git and Docker
04:28 -
5.02 Azure Kubernetes Service (AKS)
06:12 -
5.03 Building Azure Container Registry
05:38 -
5.04 Developing a Kubernetes cluster
05:46 -
5.05 Using Kubernetes to run applications
05:37 -
5.06 Securing the Container Registry
05:35 -
5.07 Security and scanning of a container
05:13 -
Quiz Module 05
-
Section 1: Git & Docker Installation
-
Section 2: Azure Kubernetes Service (AKS)
-
Section 3: Azure Container Registry (ACR)
-
Section 4: Developing a Kubernetes Cluster
-
Section 5: Running Applications in Kubernetes
-
Section 6: Securing Container Registry & Scanning Containers
-
Section 7: Case Study & Practical Scenario
Module 6
-
6.01 Implementing RBAC
05:52 -
6.02 Azure Policy
05:06 -
6.03 Implementing Azure Region Policy
04:44 -
6.04 Subscription policies
04:25 -
6.05 Resource locks and their implementation
03:45 -
6.06 Alerts and Azure Monitor
04:47 -
6.07 Log analytics
04:29 -
6.08 Introduction to Azure Security Center
05:36 -
6.09 Preventing, predicting, and responding to threats
05:29 -
6.01 Implementing RBAC (Role-Based Access Control)
-
Section 1: Role-Based Access Control (RBAC)
-
Section 2: Azure Policy & Compliance
-
Section 3: Azure Region & Subscription Policies
-
Section 4: Resource Locks & Protection
-
Section 5: Monitoring with Azure Monitor & Log Analytics
-
Section 6: Introduction to Azure Security Center
-
Section 7: Threat Detection & Response
-
Section 8: Case Study & Practical Scenario
Module 7
-
7.01 SQL services in Azure
07:14 -
7.02 Developing a SQL database in Azure
05:16 -
7.03 Strategies of caching
04:22 -
7.04 Auditing design
04:39 -
7.05 Long-term retention of SQL backup
04:00 -
7.06 Cosmos DB, along with its levels of consistency
05:31 -
7.07 Data Lake store in Azure
04:50 -
7.08 Data types
04:58 -
Quiz Module 07
-
Section 1: SQL Services in Azure
-
Section 2: Developing a SQL Database in Azure
-
Section 3: Strategies of Caching
-
Section 4: Auditing Design
-
Section 5: Long-Term Retention of SQL Backup
-
Section 6: Cosmos DB & Levels of Consistency
-
Section 7: Data Lake Store in Azure
-
Section 8: Data Types & Storage in Azure
Module 8
-
8.01 Storage accounts
05:08 -
8.02 Using the portal to build a storage account
04:09 -
8.03 Utilizing Azure Storage and Storage Explorer
05:39 -
8.04 SAS development and management
04:28 -
8.05 Encryption keys
06:00 -
Quiz Module 08
-
Section 1: Azure Storage Accounts
-
Section 2: Using the Portal to Build a Storage Account
-
Section 3: Utilizing Azure Storage and Storage Explorer
-
Section 4: Shared Access Signature (SAS) Development and Management
-
Section 5: Encryption Keys and Data Protection
-
Section 6: Real-World Scenarios and Best Practices