This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection.
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.
Objectives:
Configure Azure AD and Azure AD Domain Services for security
Create users and groups that enable secure usage of your tenant
Use MFA to protect user's identities
Configure passwordless security options
Deploy Azure AD Connect
Pick and configure that best authentication option for your security needs
Configure password writeback
Deploy and configure Identity Protection
Configure MFA for users, groups, and applications
Create Conditional Access policies to ensure your security
Create and follow an access review process
Describe Zero Trust and how it impacts security
Configure and deploy roles using Privileged Identity Management (PIM)
Evaluate the usefulness of each PIM setting as it relates to your security goals
Explain the shared responsibility model and how it impacts your security configuration
Create Azure policies to protect your solutions
Configure and deploy access to services using RBAC
Define defense in depth
Protect your environment from denial-of-service attacks
Secure your solutions using firewalls and VPNs
Explore your end-to-end perimeter security configuration based on your security posture
Deploy and configure network security groups to protect your Azure solutions
Configure and lockdown service endpoints and private links
Secure your applications with Application Gateway, Web App Firewall, and Front Door
Configure ExpressRoute to help protect your network traffic
Configure and deploy Endpoint Protection
Deploy a privileged access strategy for devices and privileged workstations
Secure your virtual machines and access to them
Deploy Windows Defender
Practice layered security by reviewing and implementing Security Center and Security Benchmarks
Define the available security tools for containers in Azure
Configure security settings for containers and Kubernetes services
Lock down network, storage, and identity resources connected to your containers
Deploy RBAC to control access to containers
Define what a key vault is and how it protects certificates and secrets
Deploy and configure Azure Key Vault
Secure access and administration of your key vault
Store keys and secrets in your key vault
Explore key security considers like key rotation and backup / recovery
Register an application in Azure using app registration
Select and configure which Azure AD users can access each application
Configure and deploy web app certificates
Define data sovereignty and how that is achieved in Azure
Configure Azure Storage access in a secure and managed way
Encrypt your data while it is at rest and in transit
Apply rules for data retention
Configure which users and applications have access to your SQL databases
Block access to your servers using firewalls
Discover, classify, and audit the use of your data
Encrypt and protect your data while is it stored in the database.
Configure and monitor Azure Monitor
Define metrics and logs you want to track for your Azure applications
Connect data sources to and configure Log Analytics
Create and monitor alerts associated with your solutions security
Define the most common types of cyber-attacks
Configure Azure Security Center based on your security posture
Review Secure Score and raise it
Lock down your solutions using Security Center and Defender
Enable Just-in-Time access and other security features
Explain what Azure Sentinel is and how it is used
Deploy Azure Sentinel
Connect data to Azure Sentinel, like Azure Logs, Azure AD, and others
Track incidents using workbooks, playbooks, and hunting techniques
Prerequisites:
Successful learners will have prior knowledge and understanding of:
Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.
Trainocate is Sri Lanka’s largest IT and human capability development training provider. With a global presence in 15 countries, Trainocate is a pioneer in delivering cutting edge training and certifications which are industry recognized and help professionals expedite their career advancement.
With more than 25+ years of experience in the field, Trainocate is an Authorized Training Partner with esteemed and prestigious technology partners of the IT & Business industry. 
Our core career competencies include Analytics, Artificial Intelligence, Big Data, Cloud Computing, Data Science, Dev Ops, and Machine Learning.
We always value existing and emerging technologies. We have Premier Partnerships & Affiliations with leading vendors and organizations like Microsoft, AWS, Cisco, CompTIA, Google Cloud, NetApp, IBM, Red Hat, Trend Micro, VMware, and many other leading IT vendors.
We have established a strong partnership with many vendors through the years. As an authorized training provider, we are authorized to deliver our vendors’ industry-recognized curriculum and certifications. Trainocate’s Strong curriculum consists of 2000 + courses.
We are committed to serving our clients and bringing forth bold innovative ideas required to thrive in this era of digital transformation. 
Awards & Recognition:
Right from day one, we were pioneers in delivering cutting edge training and certifications.We're proud to be recognized for the work we do on behalf of our customers, employees and professionals worldwide.
This certification allows students to demonstrate knowledge of cloud concepts, core Azure services, Azure pricing, SLA, and lifecycle, and the fundamentals of cloud security, privacy, compliance, and trust.
Leveraging the combined expertise of our well-regarded Google Cloud Professionals, AWS & Azure Certified Architects, and VMware Certified Experts, we help you digitally transform and accelerate your business outcome.
Whether you're a developer or simply someone who wants to get a feel for what quantum computing is all about, this learning path is a great place to start exploring quantum computing and optimization.
Designing Microsoft Azure Infrastructure Solutions (AZ-305) is a four-day course designed for administrators with good knowledge of, and experience in, IT operations, Azure administration, business continuity, and disaster recovery.
This course provides advanced-level training on infrastructure solutions design, application architecture, storage, data integration, governance, authentication, networks, and migration.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy