• Home
  • 9
  • Azure Security Engineer (AZ-500)

Azure Security Engineer (AZ-500) Course

The Azure Security (AZ-500) course provides specialized training on securing Microsoft Azure environments. Participants learn to implement security controls, manage identity and access, and protect data and applications within Azure. The course covers topics such as configuring security policies, monitoring security posture, and responding to security incidents. With hands-on labs and practical scenarios, professionals gain the skills needed to effectively safeguard Azure resources and prepare for the AZ-500 certification exam.

Azure Security Engineer (AZ-500) Course Highlights

  • 01

    Lifetime access

  • 02

    Real-time case studies

  • 03

    24*7 Support from our team of administrators

  • 04

    Lifetime video access

  • 05

    The project integrated into the Curriculum

  • 06

    Access to Recorded Sessions

  • 07

    Interview Prep

  • 08

    Lab Access – Virtual Labs

Training Calender

Start Date
End Date
Start-End Time
Batch Type
Training Mode
Batch Status
Start Learning
27th Sep 2024
25th Nov 2024
09:00 - 13:00 IST
Weekend
Online
(Open)
Enroll Now

Course Syllabus

Overview

AZ 500- Microsoft Azure Security Technologies training course aims to enhance the latest
knowledge and skillset of Microsoft Azure security engineers who are involved in the :

• Implementation of security controls,
• Maintenance of the security posture,
• Managing identity and access, and
• Protection of data, applications, and networks.

Domain-1 (Manage Identity and Access)

Manage Azure Active Directory identities:

 

• Configure security for service principals
• Manage Azure AD directory groups
• Manage Azure AD users
• Configure password writeback
• Configure authentication methods including password hash and Pass Through
Authentication (PTA), OAuth, and passwordless
• Transfer Azure subscriptions between Azure AD tenants

 

Configure secure access by using Azure AD

 

• Monitor privileged access for Azure AD Privileged Identity Management (PIM)
• Configure Access Reviews
• Activate and configure PIM
• Implement Conditional Access policies including Multi-Factor Authentication
• Configure Azure AD identity protection

 

Manage application access

 

• Create App Registration
• Configure App Registration permission scopes
• Manage App Registration permission consent
• Manage API access to Azure subscriptions and resources
Configure subscription and resource permissions
• Configure resource group permissions
• Configure custom RBAC roles
• Identify the appropriate role
• Apply principle of least privilege
• Interpret permissions
• Check access

Domain-2 (Implement Platform Protection)

Implement advanced network security

• Secure the connectivity of virtual networks (VPN authentication, Express Route
encryption)
• Configure Network Security Groups (NSGs) and Application Security Groups
(ASGs)
• Create and configure Azure Firewall
• Configure Azure Front Door service as an Application Gateway
• Configure a Web Application Firewall (WAF) on Azure Application Gateway
• Configure Azure Bastion
• Configure a firewall on a storage account, Azure SQL, KeyVault, or App Service
• Implement Service Endpoints
• Implement DDoS

Configure advanced security for compute

• Configure endpoint protection
• Configure and monitor system updates for VMs
• Configure authentication for Azure Container Registry
• Implement vulnerability management
• Configure isolation for AKS
• Configure security for container registry
• Implement Azure Disk Encryption
• Configure authentication and security for Azure App Service
• Configure authentication for Azure Kubernetes Service
• Configure automatic updates

Domain-3 (Manage security operations)

Monitor security by using Azure Monitor

 

• Create and customize alerts
• Monitor logs by using Azure Monitor
• Configure diagnostic logging and log retention

 

Monitor security by using Azure Security Center

 

• Create and customize alerts
• Evaluate vulnerability scans from Azure Security Center
• Configure Just in Time VM access by using Azure Security Center
• Configure centralized policy management by using Azure Security Center
• Configure compliance policies and evaluate for compliance by using Azure
Security Center

 

Monitor security by using Azure Sentinel

• Create and customize alerts
• Configure data sources to Azure Sentinel
• Evaluate results from Azure Sentinel
• Configure a playbook for a security event by using Azure Sentinel

Domain-4 (Secure data and applications)

Configure security for storage

 

• Configure access control for storage accounts
• Configure key management for storage accounts
• Configure Azure AD authentication for Azure Storage
• Configure Azure AD Domain Services authentication for Azure Files
• Create and manage Shared Access Signatures (SAS)
• Create a shared access policy for a blob or blob container
• Configure Storage Service Encryption
• Enable database authentication
• Enable database auditing
• Configure Azure SQL Database Advanced Threat Protection
• Implement database encryption
• Implement Azure SQL Database Always Encrypted

 

Configure and manage Key Vault

 

• Manage access to Key Vault
• Manage permissions to secrets, certificates, and keys
• Configure RBAC usage in Azure Key Vault
• Manage certificates
• Manage secrets
• Configure key rotation
• Backup and restore of Key Vault items

Our Reviews

What Says Our Happy Clients

CyberHunt IT Solutions stands out as a premier institution for anyone aspiring to build a career in cybersecurity. From their comprehensive curriculum to hands-on training, they offer an unparalleled learning experience that equips students with both theoretical knowledge and practical skills.

Nikhil kannale

Cyberhunt IT solutions is one of the best institutes that I have seen. It is the perfect place if you want to prepare for Cybersecurity (SOC). They have well-maintained classes as well as highly managed labs. The support for placement is best they have.
Highly recommended.

Jitendra Mahto

One of the bestest institute to start your career in cyber security domain. I had a great learning experience here all thanks to Bhosle sir and team for all the support. His teaching Skills and efforts for placement of students are commendable. I highly recommend this institute to achive your goals.

Deepti Patil

Very Highly Hands on Experince on Cyber Security By Mr. Datta. and also have onsite Hands on Experince.
Very good enveroment and good staff and Highly recommended if any one is looking career in Cyber Security.

Ajay Bhosle

I had a great time doing Cyber Security course here and made me a great experience. They take a good care of students and regarding placements too. This institution helps the students to get a good opportunity to explore more.

Sowmya r

I had the best experience here. I had completed cyber security training here. They take a good care of students and regarding placements too. They keep evolving themselves to the new infrastructure. The credit system that this institute follows is very unique and students get a good opportunity to explore more.

Shubham

START LEARNING

Still Unsure ? Contact us  & we will get back to you.

Let’s Connect

Email Information

Trainings: trainings@cyberhuntit.com

Business : sales@cyberhuntit.com

Recruitment information / General – hr@cyberhuntit.com

Address

Meridian Plaza, office No-301A, 3rd floor, Ameerpet Rd, Greenlands, Begumpet, Hyderabad, Telangana 500016