وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

AZ-500 Microsoft Azure Security Technologies with SIMS

سرفصل های دوره

Get prepared for the AZ-500 exam with instructor led labs and hands on simulations available 24/7


1 - Introduction
  • 1 - Welcome to the course
  • 2 - Understanding the Microsoft Environment
  • 3 - Having a Solid Foundation of Active Directory Domains
  • 4 - Having a Solid Foundation of RAS DMZ and Virtualization
  • 5 - Having a Solid Foundation of the Microsoft Cloud Services
  • 6 - Order of concepts covered in the course

  • 2 - Setting up for hands on
  • 7 - IMPORTANT Using Assignments in the course
  • 8 - Creating a free Azure Account
  • 9 - Activating Azure AD P2 license

  • 3 - Manage identities in Azure Active Directory Azure AD part of Microsoft Entra
  • 10 - Visualizing directory services including Azure AD Microsoft Entra Azure ADDS
  • 11 - Create and manage a managed identity for Azure resources
  • 12 - Manage Azure AD users and external identities
  • 13 - Manage Azure AD groups
  • 14 - Manage administrative units

  • 4 - Manage secure access by using Azure Active Directory part of Microsoft Entra
  • 15 - Configure Azure AD Privileged Identity Management PIM
  • 16 - Activating a PIM role as a user
  • 17 - Implement Conditional Access policies including multifactor authentication
  • 18 - Implement Azure AD Identity Protection
  • 19 - Implement passwordless authentication
  • 20 - Configure access reviews

  • 5 - Manage Azure using command line tools
  • 21 - Foundational concepts of using PowerShell
  • 22 - Connecting PowerShell to Azure
  • 23 - Working with Azure AD using PowerShell
  • 24 - Working with Azure Cloudshell
  • 25 - Working with Azure CLI Bash
  • 26 - Installing Azure CLI on a local machine

  • 6 - Manage application access
  • 27 - Integrate single sign on SSO and identity providers for authentication
  • 28 - Create an app registration
  • 29 - Configure app registration permission scopes
  • 30 - Manage app registration permission consent
  • 31 - Manage API permissions to Azure subscriptions and resources
  • 32 - Configure an authentication method for a service principal

  • 7 - Manage access control
  • 33 - Visualizing role permissions for management groups subscriptions and more
  • 34 - Interpret role and resource permissions
  • 35 - Assign builtin roles in Microsoft Azure Active Directory part of Microsoft Entra
  • 36 - Create and assign custom roles including Azure roles and Azure AD roles

  • 8 - Implement advanced network security
  • 37 - Secure the connectivity of hybrid networks
  • 37 - Secure-the-connectivity-of-hybrid-networks.png
  • 37 - secure-the-connectivity-of-hybrid-networks.zip
  • 38 - Create and configure virtual networks and subnets
  • 39 - Secure the connectivity of virtual networks
  • 39 - vNets-and-Subnets.png
  • 39 - vnets-and-subnets.zip
  • 40 - Direct traffic through the Azure Firewall
  • 41 - Create and configure Azure Firewall
  • 42 - Create and configure Azure Firewall Manager
  • 43 - App-Gateway-and-Front-Door.pdf
  • 43 - Understanding Azure Application Gateway vs Azure Front Door
  • 44 - Create and configure Azure Application Gateway
  • 45 - Create and configure Azure Front Door and Web Application Firewall WAF
  • 46 - Configure a resource firewall on a storage account
  • 47 - Service-Endpoints-vs-Private-Endpoints.png
  • 47 - Visualizing Azure Service Endpoints and Private Endpoints
  • 47 - service-endpoints-vs-private-endpoints.zip
  • 48 - Implement Azure Service Endpoints and Private Endpoints
  • 49 - Implement Azure DDoS Protection
  • 50 - Deleting resources from previous lessons

  • 9 - Configure advanced security for compute
  • 51 - Configure Endpoint Protection for virtual machines VMs
  • 52 - Implement and manage security updates for VMs
  • 53 - Configure security for container services
  • 54 - Manage access to Azure Container Registry
  • 55 - Configure security for serverless compute
  • 56 - Configure security for an Azure App Service
  • 57 - Configure encryption at rest
  • 58 - Configure encryption in transit

  • 10 - Configure centralized policy management
  • 59 - Configure a custom security policy
  • 60 - Create a policy initiative
  • 61 - Configure security settings and auditing by using Azure Policy

  • 11 - Configure and manage threat protection
  • 62 - Concepts of Microsoft Defender for Cloud
  • 63 - Configure Microsoft Defender for Servers not including Defender for Endpoint
  • 64 - Evaluate for vulnerabilities using Microsoft Defender for Cloud
  • 65 - Configure Microsoft Defender for SQL

  • 12 - Configure and manage security monitoring solutions
  • 66 - Create and customize alert rules by using Azure Monitor
  • 67 - Configure diagnostic logging and log retention by using Azure Monitor
  • 68 - Monitor security logs by using Azure Monitor
  • 69 - Azure-Sentinel.pdf
  • 69 - Understanding Microsoft Sentinel
  • 70 - Create a log analytics workspace needed for Microsoft Sentinel
  • 71 - Implement Microsoft Sentinel

  • 13 - Configure security for storage
  • 72 - Creating a storage account
  • 73 - Configure access control for storage accounts
  • 74 - Configure storage account access keys
  • 75 - Azure-Files-identity-based-authorization-Microsoft-Learn.pdf
  • 75 - Configure Azure Files identitybased authentication for SMB access
  • 76 - Configure delegated access

  • 14 - Configure security for data
  • 77 - Enable a SQL DatabaseServer and connect with SSMS
  • 78 - Configure SQL firewall settings for client connections
  • 79 - Enable database authentication by using Azure AD part of Microsoft Entra
  • 80 - Enable database auditing
  • 81 - Configure dynamic masking on SQL workloads
  • 82 - Implement database encryption for Azure SQL Database
  • 83 - Implement network isolation for data solutions Synapse Analytics Cosmos DB

  • 15 - Configure and manage Azure Key Vault
  • 84 - Create and configure Key Vault
  • 85 - Configure access to Key Vault
  • 86 - Manage certificates secrets and keys
  • 87 - Configure key rotation
  • 88 - Configure backup and recovery of certificates secrets and keys

  • 16 - Finishing Up
  • 89 - BONUS Lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 19410
    حجم: 4772 مگابایت
    مدت زمان: 588 دقیقه
    تاریخ انتشار: 21 شهریور 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید