Microsoft Certified: Azure Security Engineer Associate: AZ-500 - Microsoft Azure Security Technologies

  • 19 Courses | 14h 13m 36s
  • Includes Lab
Likes 130 Likes 130
 
Discover how to implement platform protection, manage identity and access, manage security operations, and secure data and applications as you prepare for the AZ-500: Microsoft Azure Security Technologies certification exam.

GETTING STARTED

Microsoft Azure Security Technologies: Azure Storage Account Security

  • Playable
    1. 
    Course Overview
    2m 12s
    NOW PLAYING
  • Playable
    2. 
    Storage Account Security
    4m 21s
    UP NEXT

COURSES INCLUDED

Microsoft Azure Security Technologies: Azure Storage Account Security
This 18-video course helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam by exploring several methods available to improve Azure storage account security and encrypt cloud data, and demonstrating how to use VM (virtual machine) disks. You will examine ways to harden Azure storage accounts; how to control storage account container access using access policies; and what is encrypted by default. Next, learners will observe how to use RBAC (role-based access control) to control resource access in a cloud computing environment. You will then learn how to configure custom encryption keys. This course examines the soft delete feature within an Azure storage account for blobs and binary large objects, which is not enabled by default. Next, learn to regenerate storage account keys in the portal, in PowerShell, and using the CLI (command-line interface). You will learn to use shared access signatures in Azure Storage Explorer, and to configure access policies for storage queues. Finally, learn to configure VM disk encryption by using PowerShell.
18 videos | 1h 2m has Assessment available Badge
Microsoft Azure Security Technologies: Data Classification
This 17-video course explores how to organize and secure sensitive data by using data classification, as part of preparations for AZ-500 Microsoft Azure Security Technologies certification exam. First, learners will examine the PCI-DSS (Payment Card Industry Data Security Standard), and laws and regulations of the European Union GDPR (General Data Protection Regulation), and HIPAA (Health Insurance Portability and Accountability Act) to protect data. You will examine how to add tags to Microsoft Azure cloud resources in the Azure portal GUI (graphical user interface), and with PowerShell. Next, learn how DLP (data loss prevention) is used to control sensitive data. You will install AIP (Azure Information Protection) client, and learn to add labels to your data to organize it for security purposes. This course demonstrates how to use AIP in MS Word. You will learn to view protected data statistics. Finally, you will learn how to configure blob lifecycle settings, and blob container policies by using the portal.
17 videos | 1h has Assessment available Badge
Microsoft Azure Security Technologies: Azure Database Security
Explore Azure database security and the available mechanisms designed to protect data in this 17-video course, which helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam. First, examine characteristics of the Azure SQL Database, a DBaaS (database as a service), offered in the Azure cloud and the NoSQL database Azure Cosmos DB. Then learn to protect sensitive data with data masking, and how to enable geofencing. Learners will next examine how security is managed in Azure Data Lake, and how to analyze data stored in the data lake. You will learn to work with several Azure SQL database security mechanisms, including the always-encrypted option, column security, auditing, and SQL backups. Then you will learn how to enable SQL Geo-Replication and use the CLI (command-line interface) to manage SQL Replication. Finally, examine when to use SQL failover groups, and how to restore SQL data by using the portal, PowerShell, and the CLI.
17 videos | 57m has Assessment available Badge
Microsoft Azure Security Technologies: Database User Access
This 14-video course explores Azure database user access management, SQL threat detection, and how to enable SQL threat policies, while helping prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam. First, you will learn to use SQL and Azure AD (Active Directory) logins to authenticate Azure SQL deployments, and create SQL logins. You will learn how to use SQL Server Management Studio to connect to Azure SQL and how to enable RBAC (role-based access control) for Azure AD administration by  using the GUI (graphical user interface), CLI (command-line interface), and PowerShell. You will learn to configure the Azure SQL Firewall, and to configure custom keys for Azure SQL TDE (transparent data encryption). This course then demonstrates how to conduct a SQL vulnerability assessment to determine security shortcomings. You will examine Advanced Threat Detection, and how to configure threat detection settings at the Azure SQL Server level and at individual database level. Finally, learn to enable threat policies by using CLI and PowerShell.
14 videos | 52m has Assessment available Badge
Microsoft Azure Security Technologies: Identity & Access Management
In this 16-video course, learners can prepare for AZ-500 Microsoft Azure Security Technologies certification exam by exploring Azure AD (Active Directory), and how to use it as a secure identity store to control resource access. You will learn how Azure uses identities in AD; how to create a new Azure AD tenant for identity isolation; and how to switch between tenants and manage them. This course examines the function of PIM (privileged identity management), and Azure AD Access review to analyze permissions, manage group memberships, and access to applications. Next, you will learn how to configure and use Azure AD Identity Protection to detect suspicious activity related to user accounts, and how to identify the relationship between subscriptions and tenants. Then learners examine how to use Azure AD Conditional Access to enhance Azure AD security, and how to configure Conditional Access policies. You will learn how to register apps in Azure AD, and to manage Azure AD Principles. Finally, the course discusses how OAuth 2.0 is used for Resource Authorization.
16 videos | 51m has Assessment available Badge
Microsoft Azure Security Technologies: Azure AD Connect
This 10-video course helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam by exploring how to configure and use Azure AD Connect to link an on-premises Active Directory with Azure Active Directory. You will examine how Azure AD Connect allows on-premises user credentials to be used for Cloud app authorization. Learners will observe how to modify the Azure AD Connect configuration, and examine both Azure AD Connect and SSO (Seamless Sign-On). Then you will learn how to enable SSO, and to configure an Azure AD custom domain. This course examines different SSO methods, including OpenID Connect and OAuth, to allow user access to on-premises and cloud apps. Learners will examine other tools in AD Connect, including the Azure AD Synchronization Service Manager, and how to force AD sync by using the Synchronization Manager, and you will learn how to sync with PowerShell. Finally, you will learn how to use the Azure AD Connect built-in troubleshooting tool to detect issues that might arise.
10 videos | 34m has Assessment available Badge
Microsoft Azure Security Technologies: Azure AD User Management
Learners can explore numerous methods for creating, securing, and managing Azure AD user credentials in this 16-video course, which helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam. First, you will learn how to enable MFA (multifactor authentication) for some or all Azure AD users to enhance user sign-in security, and learn to configure SSPR (self-service password reset). Next, examine how SSPR allows users to reset their own forgotten passwords, and how password lockout settings prevent brute-force attacks against Azure AD user accounts. Learners will be shown how to create an Azure AD guest user, and how to perform a bulk import to create multiple users at once. You will learn to use the Azure AD portal to enable admin MFA, as well as MFA for individual users, and how to sign in as an MFA enabled user. Finally, you will learn how to use PowerShell and CLI (command-line interface) to manage Azure AD users.
16 videos | 51m has Assessment available Badge
Microsoft Azure Security Technologies: Azure AD Group Management
In this 10-video course, which helps prepare learners AZ-500 Microsoft Azure Security Technologies certification exam, you can explore several methods for creating and managing Azure Active Directory groups. Learners will observe how to use the Azure AD portal to create a static Azure AD group, and to assignment membership to a static group manually. Then you will learn how to configure a static Azure group by using PowerShell to perform standard group management functions, including adding members to or deleting members from a group. Next, examine how to create a dynamic Azure AD group, which determines group membership on the basis of attributes. You will learn how to enable SSGP (Self-Service Management Group) to allow cloud members to provision and deprovision cloud resources. Continue the course by learning how enable owners of groups to determine who may join the group. Finally, you will learn how to manage Azure AD groups by using the CLI (command-line interface).
10 videos | 28m has Assessment available Badge
Microsoft Azure Security Technologies: Network Security
Learners will discover how virtual networks (VNets) can be used to isolate Azure cloud resources and how network security groups (NSGs) allow or deny traffic to or from subnets and virtual machine (VM) network interfaces, in this 17-video course, helping prepare for AZ-500 Microsoft Azure Security Technologies certification exam. The course examines use of Secure Shell (SSH) for managing Linux, remote desktop protocol (RDP) for managing Windows, and jump boxes as central, publicly accessible administrative points. Begin the course by creating an Azure VNet using the graphical user interface (GUI), the command-line interface (CLI), and using PowerShell. Next, an overview of NSGs, and how they can allow or deny network traffic. Create an NSG by using the GUI, the CLI, and using PowerShell. Remotely manage Linux VMs with both SSH and RDP. Deploy a jump box remote management point. Explore how Azure Firewall is used, configure Azure Firewall network rules, application rules, and network address translation (NAT) rules. Finally, learn how to configure a route table entry so that traffic is sent to Azure Firewall.
17 videos | 1h 12m has Assessment available Badge
Microsoft Azure Security Technologies: VPNs
In this course, used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam, you will discover how VPNs provide an encrypted tunnel over the Internet from clients or on-premises networks to the Azure cloud. Explore how to configure a point-to-site or site-to-site VPN and how to connect a Windows 10 device to an Azure VPN. You will begin the 7-video course by receiving an overview of how VPNs allow secure connections to Azure. Next, you will explore how to use PowerShell to generate public key infrastructure (PKI) certificates. To take advantage of Azure VPN connectivity, you need to establish a virtual network gateway in the Azure cloud, which is a configuration that represents a VPN appliance in the Azure cloud. You will do this in order to configure both a point-to-site and site-to-site VPN. In the final tutorial, learners will discover how to connect a Windows 10 device to an Azure VPN. 
7 videos | 28m has Assessment available Badge
Microsoft Azure Security Technologies: Web Application Security
Learners will discover how the design and implementation of a web app in the Azure cloud can determine its security posture in this 11-video course, used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. Begin by learning to identify and understand the common web app security flaws. Then examine how to use the Azure portal to deploy a web application. You will explore how using custom domain names with transport layer security (TLS) bindings allows the use of a custom domain name system (DNS) domain with connectivity over HTTPS. You will learn how to configure web app authentication and how web apps can be backed up and protected by a web application firewall (WAF). You will also examine how API Gateways serve as proxies between the calling of an application programming interface (API) and the API itself and how Application Security Groups organize and protect VMs based on their running workloads.
11 videos | 34m has Assessment available Badge
Microsoft Azure Security Technologies: VM Security
In this course, learners can explore Azure VM security and hardening techniques to reduce the attack surface of Azure VMs. This 21-video course can be used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. Begin with an overview of the steps taken to harden VMs. Then learn how to use roles to limit VM admin access. Next, receive an overview of Linux secure shell (SSH) public key authentication. Learn how to generate SSH keys with PuttyGen; enable SSH public key authentication for Linux VMs; and identify how to harden HDInsights; install an antimalware VM extension. Then learn to manage VM operating systems (OS) updates, and enable VM backup. Next, learn to enable VM inventory and change tracking; enable VM replication to a secondary region; deploy a VM scale set, execute built-in VM run commands, and execute custom VM run commands. View effective VM network security group (NSG) security rules; restore an Azure VM; recognize the steps for restoring files; use the portal to view VM Inventory, and to execute a VM test fallover.
21 videos | 1h 11m has Assessment available Badge
Microsoft Azure Security Technologies: Application Containers
Discover how application containers isolate app files and settings from the operating system (OS) and other apps in this 8-video course. You will also explore how containers can be secured in similar ways to app workloads, including how to apply updates and provide limited access, as part of preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. To begin, learners will examine how application containers can provide app isolation on different networks, and explore how to harden application containers to improve their security posture. Next, learners will take a look at Azure Kubernetes Service (AKS) and how it provides users with container cluster services. You will then learn how to deploy an Azure Docker VM running Ubuntu, an open-source software OS that runs from the desktop. You will conclude the course by discovering how to deploy an Azure container registry, and how to push a Docker image to an Azure container registry.
8 videos | 25m has Assessment available Badge
Microsoft Azure Security Technologies: Azure Key Vault
In this 19-video course, explore Azure key vaults and how they can contain secrets, keys, and certificates, which are used to secure other resources such as VM disks and databases. Examine the key vault access policy and how it controls access to key vault contents in this course, which can be used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. Begin by learning about the purpose of Azure key vaults; recognize how cryptography secures data; identify the public key infrastructure (PKI) certificate lifecycle, and recognize how to differentiate between the secure sockets layer (SSL) and transport layer security (TLS). You will learn how to create a key vault using the graphical user interface (GUI); using the command-line interface (CLI), and using PowerShell. Learn how to configure a key vault access policy; create keys using the GUI, the CLI, and PowerShell. Also, create secrets by using the GUI, the CLI, and using PowerShell. Then move on to key vault certificate creation by using the GUI, the CLI, and PowerShell.  
19 videos | 1h has Assessment available Badge
Microsoft Azure Security Technologies: Azure RBAC & Policies
In this course, discover how to use role-based access control (RBAC) to limit administrative access to Azure resources at the subscription, resource group, and resource levels. This 13-video course explores how Azure policies provide more granularity than RBAC for the deployment and management of Azure resources, in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. To start, .learners receive an overview of RBAC and how roles are used in Azure. Next, you will learn how to create a custom RBAC role and manage RBAC by using the graphical user interface (GUI), using the command-line interface (CLI), and using PowerShell. Identify how policies are used in Azure; configure policies by using the GUI, and using PowerShell. Then explore how to build your own custom Azure policies that you can apply to a subscription or resource group. Take a look at resource locking and the portal by locking an Azure resource by using the GUI and the CLI.
13 videos | 48m has Assessment available Badge
Microsoft Azure Security Technologies: Monitoring, Logging, & Alerts
Learners will discover how to use Log Analytic workspaces to centralize Azure resource logged data from a variety of sources and how to run log queries in this 11-video course. Prepare for the AZ-500 Microsoft Azure Security Technologies certification exam by examining how to configure Azure Monitor centralized alert and notification settings. You will begin by examining how to identify performance and security baselines and how to view and filter Azure Cloud resource activity logs. Next, learn how to create a Log Analytics workspace, which is an Azure resource that must be configured to gain insights about activity and usage of your Azure resources. Then discover how to manage Log Analytics workspace data sources and run log queries. Take a look at using the Azure monitor tool in the portal, in order to have a centralized way of monitoring a variety of aspects of your Azure environment. Then learn about Azure monitor network packet capturing, and capturing Azure VM network traffic; create an action group, and finally, explore how to configure alert notifications.
11 videos | 40m has Assessment available Badge
Microsoft Azure Security Technologies: Azure Security Center
In this 7-video course, you will explore how recommendations from the Azure Security Center, which automatically collects resource security metrics, can be used to improve Azure resource security. You will also examine how playbooks can remediate security issues and can be triggered by alerts. This course can be used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. Begin the course by navigating the Azure Security Center, which has a wealth of security-related information that is specific to the Azure computing environment. Next, examine how to view Azure Security Center security alerts. Then, learners will take a look at Azure Security Center playbooks and learn how to manage both Security Center policies and regulatory compliance, which is an important aspect of cloud computing. You will also discover how to configure just-in-time virtual machine access. In the final tutorial in the course, learners will explore file integrity monitoring and how to enable it. 
7 videos | 22m has Assessment available Badge
Microsoft Azure Security Technologies: Review Course 1
In this 18-video course, learners can explore various techniques for securely implementing and managing Azure resources, while preparing for the AZ-500 Microsoft Azure Security Technologies Certification exam, focusing on security engineers' abilities. Security must be considered when designing, implementing, managing, and monitoring Microsoft Azure usage. In this course, you will examine how to control admin access to storage accounts, how to use custom keys to encrypt cloud data, and how to use a shared access signature to limit storage account access. The course then demonstrates how to use a storage account key for access; how to secure sensitive data by using Azure Information Protection (AIP); and how to organize cloud resources by using tags (cloud resource tagging). Learn about Azure partner SAS Institute, Inc., and their joint efforts. Next, watch demonstrations of how to enable database masking and replication, and how to configure a database backup and restore. Finally, learn to configure Azure SQL firewall and how to enable Azure AD Conditional Access.
9 videos | 23m has Assessment available Badge
Microsoft Azure Security Technologies: Review Course 2
In this 9-video course, learners will explore additional techniques for secure implementation and management of Azure resources, while preparing for the AZ-500 Microsoft Azure Security Technologies certification exam. You will begin the course by examining how to enable Azure AD user multifactor authentication (MFA) and how to configure password lockout. Other topics covered are virtual private networks (VPNs); Transport Layer Security (TLS); just-in-time (JIT) access; and core concepts of Azure security. Then watch a demonstration of how to create a network security group (NSG), and how to control access to virtual networks (VNets). Next, learn how to configure Azure firewall; how to configure site-to-site VPN connectivity; and how to enable web app TLS bindings. The course continues by demonstrating how to harden Azure VMs to reduce the attack surface, and how to create an Azure Key Vault. Finally, you will see how to limit resource access through Azure role-based access control or RBAC (role-based access control) as well as through Azure policies.
9 videos | 26m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 1270 Likes 1270  
Likes 414 Likes 414