Microsoft Azure Security Technologies Training (AZ-500)

by TVM Logic (Cicadosoft Technologies) Claim Listing

Microsoft Azure Security Technologies course is designed for Microsoft Azure security engineers who implement security controls, maintain the security posture, manages identity and access, and protects data, applications, and networks.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

TVM Logic (Cicadosoft Technologies) Logo

img Duration

40 Hours

Course Details

The Cloud Architect program is designed to make you an expert in cloud applications and architecture. It will enable you to master the core skillsets required for designing and deploying dynamically scalable, highly available, fault-tolerant, and reliable applications on two of the top Cloud platform providers — Amazon Web Services (AWS) and Microsoft Azure.

The program will give you an in-depth understanding of cloud services such as AWS Cloud formation, Azure resource manager, EC2, S3, Route53, VPC, Azure App Services and more. You’ll acquire the knowledge and skills for passing cloud architect certifications such as AWS Architect and Azure Architect.

Microsoft Azure Security Technologies course is designed for Microsoft Azure security engineers who implement security controls, maintain the security posture, manages identity and access, and protects data, applications, and networks.

After taking these course candidates will identify and remediate vulnerabilities by using a variety of security tools, implements threat protection, and responds to security incident escalations.

This Course are for Microsoft Azure security engineers who implement security controls, maintain the security posture, manages identity and access, and protects data, applications, and networks. Candidates identify and remediate vulnerabilities by using a variety of security tools, implements threat protection, and responds to security incident escalations.

As a Microsoft Azure security engineer, candidates often serve as part of a larger team dedicated to cloud-based management and security and may also secure hybrid environments as part of an end-to-end infrastructure.

In this course, you will gain insights into Azure Security services to help secure your services and data within Azure.You will learn Azure security best practice and understand the terminology, tools, and techniques for creating a secure resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune.

 

Course Outline:

  • Manage identity and access
  • Configure Microsoft Azure Active Directory for workloads
  • create App registration
  • configure App registration permission scopes
  • manage App registration permission consent
  • configure multi-factor authentication settings
  • manage Microsoft Azure AD directory groups
  • manage Microsoft Azure AD users
  • install and configure Microsoft Azure AD Connect
  • configure authentication methods
  • implement conditional access policies
  • configure Microsoft Azure AD identity protection
  • Configure Microsoft Azure AD Privileged Identity Management
  • monitor privileged access
  • configure access reviews
  • activate Privileged Identity Management
  • Configure Microsoft Azure tenant security
  • transfer Microsoft Azure subscriptions between Microsoft Azure AD tenants
  • manage API access to Microsoft Azure subscriptions and resources
  • Implement platform protection
  • Implement network security
  • configure virtual network connectivity
  • configure Network Security Groups (NSGs)
  • create and configure Microsoft Azure firewall
  • create and configure application security groups
  • configure remote access management
  • configure baseline
  • configure resource firewall
  • Implement host security
  • configure endpoint security within the VM
  • configure VM security
  • harden VMs in Microsoft Azure
  • configure system updates for VMs in Microsoft Azure
  • configure baseline
  • Configure container security
  • configure network
  • configure authentication
  • configure container isolation
  • configure AKS security
  • configure container registry
  • configure container instance security
  • implement vulnerability management
  • Implement Microsoft Azure Resource management security
  • create Microsoft Azure resource locks
  • manage resource group security
  • configure Microsoft Azure policies
  • configure custom RBAC roles
  • configure subscription and resource permissions
  • Manage security operations
  • Configure security services
  • configure Microsoft Azure monitor
  • configure Microsoft Azure log analytics
  • configure diagnostic logging and log retention
  • configure vulnerability scanning
  • Configure security policies
  • configure centralized policy management by using Microsoft Azure Security Center
  • configure Just in Time VM access by using Microsoft Azure Security Center
  • Manage security alerts
  • create and customize alerts
  • review and respond to alerts and recommendations
  • configure a playbook for a security event by using Microsoft Azure Security Center
  • investigate escalated security incidents
  • Secure data and applications
  • Configure security policies to manage data
  • configure data classification
  • configure data retention
  • configure data sovereignty
  • Configure security for data infrastructure
  • enable database authentication
  • enable database auditing
  • configure Microsoft Azure SQL Database threat detection
  • configure access control for storage accounts
  • configure key management for storage accounts
  • create and manage Shared Access Signatures (SAS)
  • configure security for HDInsights
  • configure security for Cosmos DB
  • configure security for Microsoft Azure Data Lake
  • Configure encryption for data at rest
  • implement Microsoft Azure SQL Database Always Encrypted
  • implement database encryption
  • implement Storage Service Encryption
  • implement disk encryption
  • implement backup encryption
  • Implement security for application delivery
  • implement security validations for application development
  • configure synthetic security transactions
  • Configure application security
  • configure SSL/TLS certs
  • configure Microsoft Azure services to protect web apps
  • create an application security baseline
  • Configure and manage Key Vault
  • manage access to Key Vault
  • manage permissions to secrets, certificates, and keys
  • manage certificates
  • manage secrets
  • configure key rotation
  • Thiruvan Branch

    Center Plaza Bldg, Vazhuthacaud, Thiruvan

Check out more Microsoft Azure courses in India

Sarvagya Learning Logo

Microsoft Azure Fundamentals certification - AI-900

The Microsoft Certified - Azure Fundamentals exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Microsoft Azure Fundamentals.

by Sarvagya Learning [Claim Listing ]
IT Education Centre Logo

Microsoft Azure Training

Microsoft Azure is the fast-evolving cloud system utilized for integrated cloud solutions such as computing, database, analytics, media, etc. Microsoft Azure helps businesses to develop quickly, achieve targets, and help you save money too.

by IT Education Centre [Claim Listing ]
Soft Crayons Logo

DP-900 Microsoft Azure Data Fundamentals Training

Softcrayons, known as the best institute for Azure certifications. We offer the best online course and best offline course options, catering to your learning needs. With 100% placement assistance, Softcrayons ensures you achieve your career goals in data fundamentals.

by Soft Crayons [Claim Listing ]
Rogersoft Technologies Logo

Microsoft Azure Administrator Training

ROGERSOFT TECHNOLOGIES, thorough Microsoft Azure Administrator Training course, will help in understanding the course. We provide hands-on training and molds you to become an expert Programmers.

by Rogersoft Technologies [Claim Listing ]
Prwatech Logo

Microsoft Azure

Azure is a public pay-per-use cloud that enables you to quickly compile, deploy, and manage applications in a global network of Microsoft data centers.

by Prwatech [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy