AZ-500 Microsoft Azure Security Technologies

AZ-500 Microsoft Azure Security Technologies

Course Summary

In this course, you will gain the knowledge and skills needed to implement security controls, maintain security posture, and identify and remediate vulnerabilities using various security tools.
This course covers the configuration and deployment of security solutions for N-tier architecture in the cloud.

Course Objective

After completing this course, students will be able to:

  • Describe specialized data classifications on Azure
  • Identify Azure’s data protection mechanisms
  • Implement Azure methods for data encryption
  • Secure Internet protocols and how to implement them on Azure
  • Describe Azure security services and features
Target Audience

Participants should have at least one year of hands-on experience securing Azure workloads and experience with security controls for Azure workloads.

Prerequisites

Before attending this course, it is strongly recommended that you acquire knowledge equivalent to that assessed as part of the Microsoft Azure Administrator Associate certification.

Trainer

We provide the course in cooperation with QA.

Course Details

Module 1: Managing identity and access

Gone are the days when security focused on strong perimeter defenses to keep out malicious hackers.
Everything outside the perimeter was treated as hostile, while the organization’s systems inside the wall were trusted.
Today’s security strategy involves starting from the point of intrusion and using the Zero Trust model.
Security professionals no longer focus on perimeter defense.
Modern organizations must be able to support access to data and services from both inside and outside the corporate firewall.
This module will serve as a roadmap as you begin to build more security into your Azure solutions.

Lessons

  • Configuring Azure AD PIM
  • Configure and manage Azure Key Vault
  • Configuring Azure AD for Azure workloads
  • Security of an Azure subscription

After completing this module, participants will be able to:

  • Understand the Zero Trust model.
  • Configure Azure Active Directory for workloads.
  • Configure Azure AD Privileged Identity Management.
  • Configure Azure tenant security.
  • Configure and manage Key Vault.

Module 2: Implementing platform protection

We know that security is the most important thing in the cloud and how important it is that you find accurate and up-to-date information about Azure security.
One of the best reasons to use Azure for your applications and services is to take advantage of its wide range of security tools and features.
These tools and features help make it possible to create secure solutions on the secure Azure platform.

Lessons

  • Understanding security in the cloud
  • Azure network
  • Securing the network
  • Implementation of host security
  • Implementing platform security
  • Implementing subscription security

After completing this module, participants will be able to:

  • Implementing network security.
  • Implementing host security.
  • Configure security for containers.
  • Implement Azure Resource Manager security.

Module 3: Securing data and applications

Azure Security for Data and Applications is a comprehensive solution that helps organizations take full advantage of cloud applications while retaining control and gaining better visibility into operations.
It also increases the protection of critical data in cloud applications.
With tools that help uncover Shadow IT, assess risks, enforce policies, investigate activities, and stop threats, organizations can confidently move to the cloud while retaining control of critical data.

Lessons

  • Configure security policies to manage data
  • Configuring data infrastructure security
  • Configure encryption for data at rest
  • Understanding application security
  • Implementing security for the application lifecycle
  • Secure applications
  • Configure security policies to manage data.
  • Configure security for data infrastructure.
  • Configure encryption for data at rest.
  • Implement security for application delivery.
  • Configure application security.

Module 4: Managing security operations

Azure provides security mechanisms to help administrators managing Azure cloud services and virtual machines.
These mechanisms include: Authentication and role-based access control.
Monitoring, logging, and auditing.
Certificates and encrypted communications.
A web management portal.

Lessons

  • Configuring security services
  • Configure security policies using Azure Security Center
  • Managing safety alerts
  • Responding to and addressing security issues
  • Creating baselines for security

After completing this module, participants will be able to:

  • Configure security services.
  • Configure security policies.
  • Managing safety alerts.

Course Overview

34500 kr

4 days

Advanced

Can’t find a (suitable) date, but are interested in the course? Send in an expression of interest and we will do what we can to find a suitable opportunity.

Customized Courses

The course can be adapted from several perspectives:

  • Content and focus area
  • Extent and scope
  • Delivery approach

In interaction with the course leader, we ensure that the course meets your needs.

Send an expression of interest for the training

Send an expression of interest for the training