Azure Security Engineer (AZ-500) Course
The Azure Security (AZ-500) course provides specialized training on securing Microsoft Azure environments. Participants learn to implement security controls, manage identity and access, and protect data and applications within Azure. The course covers topics such as configuring security policies, monitoring security posture, and responding to security incidents. With hands-on labs and practical scenarios, professionals gain the skills needed to effectively safeguard Azure resources and prepare for the AZ-500 certification exam.
Azure Security Engineer (AZ-500) Course Highlights
-
01
Lifetime access
-
02
Real-time case studies
-
03
24*7 Support from our team of administrators
-
04
Lifetime video access
-
05
The project integrated into the Curriculum
-
06
Access to Recorded Sessions
-
07
Interview Prep
-
08
Lab Access – Virtual Labs
Training Calender
Start Date | End Date | Start-End Time | Batch Type | Training Mode | Batch Status | Start Learning |
---|---|---|---|---|---|---|
27th Sep 2024 | 25th Nov 2024 | 09:00 - 13:00 IST | Weekend | Online | (Open) | Enroll Now |
Course Syllabus
Overview
AZ 500- Microsoft Azure Security Technologies training course aims to enhance the latest
knowledge and skillset of Microsoft Azure security engineers who are involved in the :
• Implementation of security controls,
• Maintenance of the security posture,
• Managing identity and access, and
• Protection of data, applications, and networks.
Domain-1 (Manage Identity and Access)
Manage Azure Active Directory identities:
• Configure security for service principals
• Manage Azure AD directory groups
• Manage Azure AD users
• Configure password writeback
• Configure authentication methods including password hash and Pass Through
Authentication (PTA), OAuth, and passwordless
• Transfer Azure subscriptions between Azure AD tenants
Configure secure access by using Azure AD
• Monitor privileged access for Azure AD Privileged Identity Management (PIM)
• Configure Access Reviews
• Activate and configure PIM
• Implement Conditional Access policies including Multi-Factor Authentication
• Configure Azure AD identity protection
Manage application access
• Create App Registration
• Configure App Registration permission scopes
• Manage App Registration permission consent
• Manage API access to Azure subscriptions and resources
Configure subscription and resource permissions
• Configure resource group permissions
• Configure custom RBAC roles
• Identify the appropriate role
• Apply principle of least privilege
• Interpret permissions
• Check access
Domain-2 (Implement Platform Protection)
Implement advanced network security
• Secure the connectivity of virtual networks (VPN authentication, Express Route
encryption)
• Configure Network Security Groups (NSGs) and Application Security Groups
(ASGs)
• Create and configure Azure Firewall
• Configure Azure Front Door service as an Application Gateway
• Configure a Web Application Firewall (WAF) on Azure Application Gateway
• Configure Azure Bastion
• Configure a firewall on a storage account, Azure SQL, KeyVault, or App Service
• Implement Service Endpoints
• Implement DDoS
Configure advanced security for compute
• Configure endpoint protection
• Configure and monitor system updates for VMs
• Configure authentication for Azure Container Registry
• Implement vulnerability management
• Configure isolation for AKS
• Configure security for container registry
• Implement Azure Disk Encryption
• Configure authentication and security for Azure App Service
• Configure authentication for Azure Kubernetes Service
• Configure automatic updates
Domain-3 (Manage security operations)
Monitor security by using Azure Monitor
• Create and customize alerts
• Monitor logs by using Azure Monitor
• Configure diagnostic logging and log retention
Monitor security by using Azure Security Center
• Create and customize alerts
• Evaluate vulnerability scans from Azure Security Center
• Configure Just in Time VM access by using Azure Security Center
• Configure centralized policy management by using Azure Security Center
• Configure compliance policies and evaluate for compliance by using Azure
Security Center
Monitor security by using Azure Sentinel
• Create and customize alerts
• Configure data sources to Azure Sentinel
• Evaluate results from Azure Sentinel
• Configure a playbook for a security event by using Azure Sentinel
Domain-4 (Secure data and applications)
Configure security for storage
• Configure access control for storage accounts
• Configure key management for storage accounts
• Configure Azure AD authentication for Azure Storage
• Configure Azure AD Domain Services authentication for Azure Files
• Create and manage Shared Access Signatures (SAS)
• Create a shared access policy for a blob or blob container
• Configure Storage Service Encryption
• Enable database authentication
• Enable database auditing
• Configure Azure SQL Database Advanced Threat Protection
• Implement database encryption
• Implement Azure SQL Database Always Encrypted
Configure and manage Key Vault
• Manage access to Key Vault
• Manage permissions to secrets, certificates, and keys
• Configure RBAC usage in Azure Key Vault
• Manage certificates
• Manage secrets
• Configure key rotation
• Backup and restore of Key Vault items
Our Reviews
What Says Our Happy Clients
START LEARNING
Still Unsure ? Contact us & we will get back to you.
Let’s Connect
Email Information
Trainings: trainings@cyberhuntit.com
Business : sales@cyberhuntit.com
Recruitment information / General – hr@cyberhuntit.com
Address
Meridian Plaza, office No-301A, 3rd floor, Ameerpet Rd, Greenlands, Begumpet, Hyderabad, Telangana 500016