وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Azure Security Engineer Associate Online Training

سرفصل های دوره

This intermediate Microsoft Azure Security Engineer Associate training prepares learners to take the AZ-500 exam, which is the one required exam to earn the Microsoft Certified: Azure Security Engineer Associate certification.

As if staying on top of security threats to standard networks wasn’t enough of a challenge, more and more companies are adopting software-defined network solutions, which come with their own collection of challenges. This training is designed to help IT professionals earn their Microsoft Certified: Azure Security Engineer Associate by covering concepts of Azure-based security, like configuring Azure Active Directory, managing AD privileged identity management, configuring encryption for data at rest and using Azure Key Vault, plus much more.


1. Securing Azure AD Identities
  • 1. Securing Azure AD Identities
  • 2. Creating Azure AD Users Using PowerShell
  • 3. Bulk Create and Delete Azure AD User Accounts
  • 4. Creating Azure AD Groups
  • 5. Azure AD Identity Protection
  • 6. Implementing Azure AD Identity Protection Policies

  • 2. Securing External Identities and Verifiable Identities
  • 1. External Identity Settings
  • 2. Creating an External Identity from the Azure Portal
  • 3. Creating External Identities Using PowerShell
  • 4. Verified IDs
  • 5. Configuring Azure Key Vault for Verifiable IDs
  • 6. Configuring Verified ID
  • 7. Finishing Up With Verified IDs

  • 3. Managing Azure AD Authentication
  • 1. Configuring MFA in Azure AD
  • 2. Managing MFA In Azure AD
  • 3. Implement Passwordless Authentication In Azure AD
  • 4. Implementing Password Protection
  • 5. Single Sign-On Using Hybrid Identities
  • 6. Enforcing Modern Authentication Protocols

  • 4. Managing Azure AD Authorization
  • 1. Roles In Azure
  • 2. Creating Custom Roles in Azure
  • 3. Privileged Identity Management (PIM)
  • 4. Configure Azure AD PIM
  • 5. Conditional Access Policies
  • 6. Creating Conditional Access Policies

  • 5. Managing Application Access in Azure AD
  • 1. Managing Access To Enterprise Apps
  • 2. Permission Consent
  • 3. App Registration
  • 4. App Permission
  • 5. Managed Identities
  • 6. App Proxies
  • 7. App Proxy Setup

  • 6. Managing Permissions with Microsoft Entra
  • 1. Microsoft Entra
  • 2. Exploring the Entra Portal
  • 3. Microsoft Entra Permissions Management Settings
  • 4. Onboarding Microsoft Entras Permissions Management
  • 5. Microsoft Entras Dashboard And Analytics
  • 6. Entra Remediation and Autopilot
  • 7. Entra Audit, Reports, and Help
  • 8. Entra Settings, Notifications, and User Management

  • 7. Managing Azure Network and Application Security Groups
  • 1. Network Security Groups (NSGs)
  • 2. NSG Rules
  • 3. Creating NSGs
  • 4. NSGs and Service Tags
  • 5. Troubleshooting NSGs
  • 6. Application Security Groups (ASGs)
  • 7. Implementing ASGs

  • 8. Implementing ExpressRoute Encryption, PaaS Firewall Settings and Using Network Watcher
  • 1. Configuring IPSec Encryption over Azure ExpressRoute Pt.1
  • 2. Configure IPSec Encryption over Azure ExpressRoute Pt.2
  • 3. Configure Firewall Settings for PaaS Resources
  • 4. Using Network Watcher for Monitoring
  • 5. Using Network Monitor for Network Troubleshooting
  • 6. Network Watcher NSG Flow Logging

  • 9. Implementing Virtual WAN and Secure VPN Connectivity
  • 1. Virtual WAN and Secured Virtual Hubs
  • 2. Deploying Azure Virtual WAN and Secured Virtual Hubs
  • 3. Connecting VNETs to Secured Virtual Hubs
  • 4. VPN Connectivity Into vWAN
  • 5. Configure P2S VPN
  • 6. Configuring Teleworker To Test P2S VPN
  • 7. Configuring S2S VPN

  • 10. Exploring VNet Peering, VPN Gateways and UDRs
  • 1. VNET Peering
  • 2. Configure VNET Peering
  • 3. VPN Gateway wUser Defined Routes (UDRs)
  • 4. Configuring VPN Gateways
  • 5. Virtual Network Gateway Peering
  • 6. Creating Route Tables
  • 7. Creating User Defined Routes (UDRs)
  • 8. Testing Our Routing

  • 11. Plan and implement network security configurations for an Azure SQL Managed Instance
  • 1. Azure SQL Managed Instances
  • 2. Azure SQL Managed Instance Security Features
  • 3. Create an Azure SQL Managed Instance
  • 4. Implement SQL Auditing
  • 5. Implement Always Encrypt
  • 6. Implement Defender for SQL
  • 7. Implement Dynamic Data Masking
  • 8. Implement Transparent Data Encryption (TDE)

  • 12. Implementing virtual network Service Endpoints, Private Endpoints, and Private Link Services
  • 1. Virtual Network Service Endpoint
  • 2. Implementing a Virtual Network Service Endpoint
  • 3. Service Endpoint Policies
  • 4. Private Endpoints
  • 5. Implementing Private Endpoints
  • 6. Private Link Service
  • 7. Implementing Private Link Services

  • 13. Implementing Azure App Service, Azure Functions, and App Service Environments (ASE)
  • 1. Network Integration for Azure App Services and Function Apps
  • 2. Implementing Network Integration for Azure App Services
  • 3. Implementing Two-Way Communications for Our Network Integration
  • 4. App Service Environment Security Features
  • 5. Implementing an ASE App
  • 6. App Service Environment Security Features

  • 14. Custom TLS certificates for Apps and Azure Firewall Services
  • 1. Planning Custom TLS Certificates for Apps and APIs
  • 2. Implementing Custom TLS Certs for Apps and APIs
  • 3. Azure Firewall Services
  • 4. Deploying an Azure Firewall
  • 5. Configuring a Route Table and VNET Peering
  • 6. Creating Firewall Rules
  • 7. Additional Azure Firewall Features
  • 8. Azure Firewall Manager

  • 15. Plan and implement security for public access to Azure resources
  • 1. Planning for an Azure Application Gateway
  • 2. Implementing an Azure Application Gateway
  • 3. Azure Front Door and CDNs
  • 4. Implementing Azure Front Door
  • 5. Azure Web Application Firewall
  • 6. Azure DDoS Protection

  • 16. Configure Azure SQL Encryption and Data Protection
  • 1. Introducing SQL Encryption Operations
  • 2. Azure Virtual Machine DIsk Encryption
  • 3. Cell Level Encryption
  • 4. Dynamic Data Masking
  • 5. Transparent Data Encryption
  • 6. AlwaysEncrypted Concepts

  • 17. Configure Azure SQL Authentication
  • 1. Introducing SQL Authentication
  • 2. Explore the SQL Architecture
  • 3. Create SQL Logins
  • 4. Create SQL Users
  • 5. Create Azure Active Directory Users

  • 18. Plan, implement, and manage governance for Azure security
  • 1. Working With Azure Policy
  • 2. Azure Blueprints
  • 3. Azure Landing Zone
  • 4. Implementing Azure Key Vault RBAC
  • 5. Azure Dedicated HSMs
  • 6. Key Rotation Policies
  • 7. Key Vault Backups

  • 19. Manage security posture by using Microsoft Defender for Cloud
  • 1. Secure Score and Inventory
  • 2. Security Frameworks in Defender for Cloud
  • 3. Adding Standards and Custom Initiatives within Defender For Cloud
  • 4. Attack Surface Management
  • 5. Defender for External Attack Surface Management (EASM)

  • 20. Managing Defender for ServersAzure SQL and using Azure Monitor
  • 1. Configure Defender for Servers
  • 2. Evaluate Vulnerability Scans from Defender for Servers
  • 3. Planning for Defender for Azure SQL Databases
  • 4. Implementing Defender for Azure SQL Database
  • 5. Intro to Azure Monitor
  • 6. Saving Resource Logs
  • 7. Azure Monitor Alerting
  • 8. Additional Azure Monitor Features

  • 21. Secure Data in Azure Storage Accounts
  • 1. Introducing Secure Azure Storage Accounts
  • 2. RBAC
  • 3. Shared Access Signatures
  • 4. Shared Access Keys
  • 5. BYOK
  • 6. Data Protection Settings
  • 7. Storage Account Backups

  • 22. Secure Microsoft Azure Container Registry
  • 1. Intro to Microsoft Azure Container Registry
  • 2. Compare Features Across Azure Container Registry SKUs
  • 3. Secure Azure Container Registry With Customer-Managed Key
  • 4. Import Images Into Azure Container Registry With PowerShell
  • 5. Secure Azure Container Registry With Private Link
  • 6. Test ACR Private Link Connectivity From Azure Linux VM
  • 7. Apply Azure Policy Compliance Rules to Container Registry

  • 23. Understand and Secure Azure Container Apps
  • 1. Intro to Microsoft Azure Container Apps
  • 2. Deploy Simple Azure Container App With NGINX
  • 3. Create Azure Container App Revisions and Scale
  • 4. Enable Traffic Splitting for Azure Container App Revisions
  • 5. Build Custom Container Image for Azure Container Apps
  • 6. Deploy Custom Container Image to Azure Container Apps
  • 7. Securely Connect Azure Container Apps to Virtual Network

  • 24. Overview of Securing Azure Kubernetes Service
  • 1. Intro to Securing Azure Kubernetes Service
  • 2. Learn About TLS Encryption Security for Azure AKS
  • 3. Azure Container Image Registry vs. Public Registries
  • 4. AKS Logging and Metrics And Policy Controls
  • 5. What is Kubernetes Network Policy in AKS
  • 6. Deploy the AKS Secure Baseline Network Layer
  • 7. Deploy Azure Container Registry and AKS Cluster

  • 25. Securely Exposing Remote Access to Azure Networks
  • 1. Intro to Microsoft Azure Secure Remote Access
  • 2. Create Microsoft Azure Bastion Basic SKU Environment
  • 3. Connect to Windows and Linux VMs With Azure Bastion
  • 4. Use Native RDP Client With Azure Bastion Standard
  • 5. Tunnel Linux SSH Connections with Azure Bastion CLI
  • 6. Temporary VM Access With Microsoft Defender Just-in-Time

  • 26. Applied Security for Microsoft Azure API Management
  • 1. Intro to Microsoft Azure API Management
  • 2. Deploy Azure API Management Instance
  • 3. Create API Definition With Mock Response
  • 4. Test API Management Mock Endpoints
  • 5. Secure Access to API Management Products with Subscription Keys
  • 6. Delegate Access to APIs With Workspaces and RBAC

  • 27. Authentication for Microsoft Azure Kubernetes Service
  • 1. Intro to Microsoft Azure Kubernetes Service Auth
  • 2. Create AKS Cluster With Azure AD Integration
  • 3. Connect Kubectl to AKS Cluster as Administrative User
  • 4. Create Limited Access Azure AD Dev User and VM
  • 5. Deploy Kubernetes Role and RoleBinding Resources
  • 6. Test Kubernetes Access as Limited Dev User

  • 28. Implement Networking for Azure Kubernetes Service
  • 1. Intro to Networking for Azure Kubernetes
  • 2. Understanding the Azure Container Network Interface (CNI)
  • 3. Deploy AKS Clusters With Kubenet and Azure CNI
  • 4. Explore Kubernetes Pods Running on Azure CNI
  • 5. Expose Pods Running on Kubenet via NodePort Service

  • 29. Configure Disk Encryption in Microsoft Azure
  • 1. Intro to Storage Disks in Microsoft Azure
  • 2. Default Disk Encryption for Azure Virtual Machines
  • 3. Enable Customer Managed Key With Disk Encryption Set
  • 4. Understanding Encryption at Host for Azure VMs
  • 5. Evaluate Azure Disk Encryption (ADE) for Block Storage
  • 6. Implement Azure Disk Encryption on Linux VM

  • 30. Hands-on With Azure API Management Policies
  • 1. Intro to Microsoft Azure API Management Policies
  • 2. Using the Set Backend Policy for API Management
  • 3. Rewrite URLs With Azure API Management Policy
  • 4. Apply Rate Limit Policy on Azure API Management
  • 5. Define Ruesable Policy Fragments in Azure API Management
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 17462
    حجم: 17772 مگابایت
    مدت زمان: 1620 دقیقه
    تاریخ انتشار: 13 مرداد 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید