This course provides IT security professionals with the knowledge and skills to implement security controls, ensure optimal security status for the organization, and identify and remediate security vulnerabilities.
This course provides IT security professionals with the knowledge and skills to implement security controls, ensure optimal security status for the organization, and identify and remediate security vulnerabilities. This course will cover identification and access security (IAM), platform, data and application protection, and security operations.
Training Aims
At the end of this training, the participant will be able to implement security-related strategies in the organization.
Target Customers
Azure security engineers who plan to take the related certification exam or who perform IT security tasks in their daily work, An engineer who wants to specialize in securing Azure-based digital platforms and play a critical role in the protection of an organization's data.
Prerequisites
Knowledge and understanding of:
Security best practices and industry security requirements such as Defense in Depth (DiD), least privileged access, role management-based access control, multi-factor authentication, shared responsibility, and the systematic verification model (zero trust)
Know security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), and disk and data encryption methods.
Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, but the course content builds on this knowledge by adding security-specific information.
????Have experience with Windows and Linux operating systems and scripting languages. The course labs can use PowerShell and the CLI.
Training Architecture
Module 1: Manage Identification and Access
After completing this module, participants will be able to:
Implement enterprise governance policies, including role-based access control, Azure policies, and resource locks.
Implement Azure AD infrastructure, including users, groups, and multi-factor authentication.
Implement Azure AD Identity Protection, including risk policies, conditional access, and access reviews.
Implement Privileged Azure Management (PIM), including Azure AD roles and Azure resources, which enables management, control, and monitoring of access to key enterprise resources
implement Azure AD Connect, including authentication methods and on-premises directory synchronization
This module covers Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.
Module 2: Implementing Platform Protection
After completing this module, participants will be able to:
Implement perimeter security policies, including Azure Firewall.
Implement network security policies, including network security groups and application security groups.
Implement host security policies, including endpoint protection, remote access management, update management, and disk encryption.
Implement container security policies, including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
This module covers perimeter, network, host, and container security.
Module 3: Securing Data and Applications
After completing this module, participants will be able to:
Implement Azure Key Vault, including certificates, keys, and secrets (items that require particularly restricted access).
Implement application security policies, including application registration, managed identities, and service endpoints.
Implement storage security policies, including shared access signatures, blob retention policies, and Azure file authentication.
Implement database security policies, including authentication, data classification, dynamic data masking, and persistent encryption.
This module covers Azure Key Vault, application security, storage security, and SQL database security.
Module 4: Manage security operations
This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.
After completing this module, participants will be able to:
Implement Azure Monitor, including connected sources, log analysis, and alerts.
Implement Azure Security Center, including policies, recommendations, and just-in-time access to virtual machines.
Implement Azure Sentinel, including workbooks, incidents, and playbooks.
Since 1996, Technologia has been a training and skills development partner, enabling business leaders and managers to improve their performance, as well as that of their teams, through a wide variety of learner-centered training. We offer consulting and support services based on the company's business objectives.
Our main areas of training expertise cover:
Project management, transformation and operations
Leadership and talent management
Information Technology
Marketing and customer relations
Essential knowledge
Our mission
Support organizations in all sectors and their employees in developing their skills by offering them learning management consulting services as well as training adapted to their needs.
We firmly believe that competence is a strategic element directly linked to achieving business objectives and improving overall performance.
What We Aspire To:
Position ourselves as a leader, a strategic partner par excellence in Quebec, able to offer a global and integrated service in the field of corporate training. It is obvious to us that maintaining and developing skills is essential to the success of individuals and the performance of organizations.
This Is Why Technologia:
Advises and equips Quebec companies to promote the development of their skills and the achievement of desired performance levels
Supports individuals in updating their skills during the development of their careers.
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities.
While the official Microsoft content is included, this “Hackathon” style program combines instructional and coaching sessions, an element of self-paced learning, and an intensive, team-based, coach-supported hands-on Hack The CertTM experience.
This Microsoft certified course teaches developers how to create end-to-end solutions in Microsoft Azure.
This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines.
Students will learn about core data concepts such as relational, non-relational, big data, and analytics and build their foundational knowledge of cloud data services within Microsoft Azure.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy