وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

AZ-500 Microsoft Azure Security Technologies with SIMS

سرفصل های دوره

Get prepared for the AZ-500 exam with instructor led labs and hands on simulations available 24/7


1 - Introduction
  • 1 - Welcome to the course
  • 2 - Understanding the Microsoft Environment
  • 3 - Having a Solid Foundation of Active Directory Domains
  • 4 - Having a Solid Foundation of RAS DMZ and Virtualization
  • 5 - Having a Solid Foundation of the Microsoft Cloud Services
  • 6 - Order of concepts covered in the course

  • 2 - Setting up for hands on
  • 7 - IMPORTANT Using Assignments in the course
  • 8 - Creating a free Azure Account
  • 9 - Activating Azure AD P2 license

  • 3 - Manage identities in Azure Active Directory Azure AD part of Microsoft Entra
  • 10 - Visualizing directory services including Azure AD Microsoft Entra Azure ADDS
  • 11 - Create and manage a managed identity for Azure resources
  • 12 - Manage Azure AD users and external identities
  • 13 - Manage Azure AD groups
  • 14 - Manage administrative units

  • 4 - Manage secure access by using Azure Active Directory part of Microsoft Entra
  • 15 - Configure Azure AD Privileged Identity Management PIM
  • 16 - Activating a PIM role as a user
  • 17 - Implement Conditional Access policies including multifactor authentication
  • 18 - Implement Azure AD Identity Protection
  • 19 - Implement passwordless authentication
  • 20 - Configure access reviews

  • 5 - Manage Azure using command line tools
  • 21 - Foundational concepts of using PowerShell
  • 22 - Connecting PowerShell to Azure
  • 23 - Working with Azure AD using PowerShell
  • 24 - Working with Azure Cloudshell
  • 25 - Working with Azure CLI Bash
  • 26 - Installing Azure CLI on a local machine

  • 6 - Manage application access
  • 27 - Integrate single sign on SSO and identity providers for authentication
  • 28 - Create an app registration
  • 29 - Configure app registration permission scopes
  • 30 - Manage app registration permission consent
  • 31 - Manage API permissions to Azure subscriptions and resources
  • 32 - Configure an authentication method for a service principal

  • 7 - Manage access control
  • 33 - Visualizing role permissions for management groups subscriptions and more
  • 34 - Interpret role and resource permissions
  • 35 - Assign builtin roles in Microsoft Azure Active Directory part of Microsoft Entra
  • 36 - Create and assign custom roles including Azure roles and Azure AD roles

  • 8 - Implement advanced network security
  • 37 - Secure the connectivity of hybrid networks
  • 37 - Secure-the-connectivity-of-hybrid-networks.png
  • 37 - secure-the-connectivity-of-hybrid-networks.zip
  • 38 - Create and configure virtual networks and subnets
  • 39 - Secure the connectivity of virtual networks
  • 39 - vNets-and-Subnets.png
  • 39 - vnets-and-subnets.zip
  • 40 - Direct traffic through the Azure Firewall
  • 41 - Create and configure Azure Firewall
  • 42 - Create and configure Azure Firewall Manager
  • 43 - App-Gateway-and-Front-Door.pdf
  • 43 - Understanding Azure Application Gateway vs Azure Front Door
  • 44 - Create and configure Azure Application Gateway
  • 45 - Create and configure Azure Front Door and Web Application Firewall WAF
  • 46 - Configure a resource firewall on a storage account
  • 47 - Service-Endpoints-vs-Private-Endpoints.png
  • 47 - Visualizing Azure Service Endpoints and Private Endpoints
  • 47 - service-endpoints-vs-private-endpoints.zip
  • 48 - Implement Azure Service Endpoints and Private Endpoints
  • 49 - Implement Azure DDoS Protection
  • 50 - Deleting resources from previous lessons

  • 9 - Configure advanced security for compute
  • 51 - Configure Endpoint Protection for virtual machines VMs
  • 52 - Implement and manage security updates for VMs
  • 53 - Configure security for container services
  • 54 - Manage access to Azure Container Registry
  • 55 - Configure security for serverless compute
  • 56 - Configure security for an Azure App Service
  • 57 - Configure encryption at rest
  • 58 - Configure encryption in transit

  • 10 - Configure centralized policy management
  • 59 - Configure a custom security policy
  • 60 - Create a policy initiative
  • 61 - Configure security settings and auditing by using Azure Policy

  • 11 - Configure and manage threat protection
  • 62 - Concepts of Microsoft Defender for Cloud
  • 63 - Configure Microsoft Defender for Servers not including Defender for Endpoint
  • 64 - Evaluate for vulnerabilities using Microsoft Defender for Cloud
  • 65 - Configure Microsoft Defender for SQL

  • 12 - Configure and manage security monitoring solutions
  • 66 - Create and customize alert rules by using Azure Monitor
  • 67 - Configure diagnostic logging and log retention by using Azure Monitor
  • 68 - Monitor security logs by using Azure Monitor
  • 69 - Azure-Sentinel.pdf
  • 69 - Understanding Microsoft Sentinel
  • 70 - Create a log analytics workspace needed for Microsoft Sentinel
  • 71 - Implement Microsoft Sentinel

  • 13 - Configure security for storage
  • 72 - Creating a storage account
  • 73 - Configure access control for storage accounts
  • 74 - Configure storage account access keys
  • 75 - Azure-Files-identity-based-authorization-Microsoft-Learn.pdf
  • 75 - Configure Azure Files identitybased authentication for SMB access
  • 76 - Configure delegated access

  • 14 - Configure security for data
  • 77 - Enable a SQL DatabaseServer and connect with SSMS
  • 78 - Configure SQL firewall settings for client connections
  • 79 - Enable database authentication by using Azure AD part of Microsoft Entra
  • 80 - Enable database auditing
  • 81 - Configure dynamic masking on SQL workloads
  • 82 - Implement database encryption for Azure SQL Database
  • 83 - Implement network isolation for data solutions Synapse Analytics Cosmos DB

  • 15 - Configure and manage Azure Key Vault
  • 84 - Create and configure Key Vault
  • 85 - Configure access to Key Vault
  • 86 - Manage certificates secrets and keys
  • 87 - Configure key rotation
  • 88 - Configure backup and recovery of certificates secrets and keys

  • 16 - Finishing Up
  • 89 - BONUS Lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 19410
    حجم: 4772 مگابایت
    مدت زمان: 588 دقیقه
    تاریخ انتشار: ۲۱ شهریور ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید