Microsoft Azure

by Technologia IT Group Inc Claim Listing

This course provides IT security professionals with the knowledge and skills to implement security controls, ensure optimal security status for the organization, and identify and remediate security vulnerabilities.

$1950

Contact the Institutes

Fill this form

Advertisement

Technologia IT Group Inc Logo

img Duration

4 Days

Course Details

This course provides IT security professionals with the knowledge and skills to implement security controls, ensure optimal security status for the organization, and identify and remediate security vulnerabilities. This course will cover identification and access security (IAM), platform, data and application protection, and security operations.

 

Training Aims

At the end of this training, the participant will be able to implement security-related strategies in the organization.

 

Target Customers

Azure security engineers who plan to take the related certification exam or who perform IT security tasks in their daily work, An engineer who wants to specialize in securing Azure-based digital platforms and play a critical role in the protection of an organization's data.

 

Prerequisites

Knowledge and understanding of:

  • Security best practices and industry security requirements such as Defense in Depth (DiD), least privileged access, role management-based access control, multi-factor authentication, shared responsibility, and the systematic verification model (zero trust)

  • Know security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), and disk and data encryption methods.

  • Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, but the course content builds on this knowledge by adding security-specific information.

  • ????Have experience with Windows and Linux operating systems and scripting languages. The course labs can use PowerShell and the CLI.

 

 

Training Architecture

Module 1: Manage Identification and Access
After completing this module, participants will be able to:

  • Implement enterprise governance policies, including role-based access control, Azure policies, and resource locks.

  • Implement Azure AD infrastructure, including users, groups, and multi-factor authentication.

  • Implement Azure AD Identity Protection, including risk policies, conditional access, and access reviews.

  • Implement Privileged Azure Management (PIM), including Azure AD roles and Azure resources, which enables management, control, and monitoring of access to key enterprise resources

  • implement Azure AD Connect, including authentication methods and on-premises directory synchronization

This module covers Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.


Module 2: Implementing Platform Protection
After completing this module, participants will be able to:

  • Implement perimeter security policies, including Azure Firewall.

  • Implement network security policies, including network security groups and application security groups.

  • Implement host security policies, including endpoint protection, remote access management, update management, and disk encryption.

  • Implement container security policies, including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.

This module covers perimeter, network, host,  and container security.

Module 3: Securing Data and Applications
After completing this module, participants will be able to:

  • Implement Azure Key Vault, including certificates, keys, and secrets (items that require particularly restricted access).

  • Implement application security policies, including application registration, managed identities, and service endpoints.

  • Implement storage security policies, including shared access signatures, blob retention policies, and Azure file authentication.

  • Implement database security policies, including authentication, data classification, dynamic data masking, and persistent encryption.

This module covers Azure Key Vault, application security, storage security, and SQL database security.

Module 4: Manage security operations
This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.
After completing this module, participants will be able to:

  • Implement Azure Monitor, including connected sources, log analysis, and alerts.

  • Implement Azure Security Center, including policies, recommendations, and just-in-time access to virtual machines.

  • Implement Azure Sentinel, including workbooks, incidents, and playbooks.

  • Montreal Branch

    1626, boulevard St-Laurent, Montreal

Check out more Microsoft Azure courses in Canada

Versalys Logo

Microsoft Azure Security Technologies (AZ-500T00)

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities.

by Versalys [Claim Listing ]
SETC Training Logo

Azure DevOps Training

If you are an Azure DevOps administrator, installation and configuration, security, SCRUM and work item tracking, disaster recovery, tolerance, and build automation are taught.

by SETC Training [Claim Listing ]
Eccentrix Logo

Azure Developer Associate (AZ204)

This Microsoft certified course teaches developers how to create end-to-end solutions in Microsoft Azure.

by Eccentrix [Claim Listing ]
ExitCertified Logo

Microsoft Azure Administrator

This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines.

by ExitCertified [Claim Listing ]
Knowledge Hut Logo

Azure Solutions Architect Certification (AZ-305)

Design and implement infrastructure solutions that meet business requirements. This course will enhance your knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance.

by Knowledge Hut [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy