وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
3

Azure Security Engineer Associate Online Training

سرفصل های دوره

1 Securing Azure AD Identities
  • 1 Azure AD Accounts
  • 2 Creating Azure AD Users Using PowerShell
  • 3 Bulk Create and Delete Azure AD User Accounts
  • 4 Creating Azure AD Groups
  • 5 Azure AD Identity Protection
  • 6 Implementing Azure AD Identity Protection Policies

  • 2 Securing External Identities and Verifiable Identities
  • 7 External Identity Settings
  • 8 Creating an External Identity from the Azure Portal
  • 9 Creating External Identities Using PowerShell
  • 10 Verified IDs
  • 11 Configuring Azure Key Vault for Verifiable IDs
  • 12 Configuring Verified ID
  • 13 Finishing Up With Verified IDs

  • 3 Managing Azure AD Authentication
  • 14 Configuring MFA in Azure AD
  • 15 Managing MFA In Azure AD
  • 16 Implement Passwordless Authentication In Azure AD
  • 17 Implementing Password Protection
  • 18 Single Sign-On Using Hybrid Identities
  • 19 Enforcing Modern Authentication Protocols

  • 4 Managing Azure AD Authorization
  • 20 Roles In Azure
  • 21 Creating Custom Roles in Azure
  • 22 Privileged Identity Management (PIM)
  • 23 Configure Azure AD PIM
  • 24 Conditional Access Policies
  • 25 Creating Conditional Access Policies

  • 5 Managing Application Access in Azure AD
  • 26 Managing Access To Enterprise Apps
  • 27 Permission Consent
  • 28 App Registration
  • 29 App Permission
  • 30 Managed Identities
  • 31 App Proxies
  • 32 App Proxy Setup

  • 6 Managing Permissions with Microsoft Entra
  • 33 Microsoft Entra
  • 34 Exploring the Entra Portal
  • 35 Microsoft Entra Permissions Management Settings
  • 36 Onboarding Microsoft Entras Permissions Management
  • 37 Microsoft Entras Dashboard & Analytics
  • 38 Entra Remediation and Autopilot
  • 39 Entra Audit, Reports, and Help
  • 40 Entra Settings, Notifications, and User Management

  • 7 Managing Azure Network and Application Security Groups
  • 41 Network Security Groups (NSGs)
  • 42 NSG Rules
  • 43 Creating NSGs
  • 44 NSGs and Service Tags
  • 45 Troubleshooting NSGs
  • 46 Application Security Groups (ASGs)
  • 47 Implementing ASGs

  • 8 Implementing ExpressRoute Encryption, PaaS Firewall Settings
  • 48 Configuring IPSec Encryption over Azure ExpressRoute Pt.1
  • 49 Configure IPSec Encryption over Azure ExpressRoute Pt.2
  • 50 Configure Firewall Settings for PaaS Resources
  • 51 Using Network Watcher for Monitoring
  • 52 Using Network Monitor for Network Troubleshooting
  • 53 Network Watcher NSG Flow Logging

  • 9 Implementing Virtual WAN and Secure VPN Connectivity
  • 54 Virtual WAN and Secured Virtual Hubs
  • 55 Deploying Azure Virtual WAN and Secured Virtual Hubs
  • 56 Connecting VNETs to Secured Virtual Hubs
  • 57 VPN Connectivity Into vWAN
  • 58 Configure P2S VPN
  • 59 Configuring Teleworker To Test P2S VPN
  • 60 Configuring S2S VPN

  • 10 Exploring VNet Peering, VPN Gateways and UDRs
  • 61 VNET Peering
  • 62 Configure VNET Peering
  • 63 VPN Gateway w-User Defined Routes (UDRs)
  • 64 Configuring VPN Gateways
  • 65 Virtual Network Gateway Peering
  • 66 Creating Route Tables
  • 67 Creating User Defined Routes (UDRs)
  • 68 Testing Our Routing

  • 11 Plan and implement network security configurations for an Azure SQL Managed
  • 69 Azure SQL Managed Instances
  • 70 Azure SQL Managed Instance Security Features
  • 71 Create an Azure SQL Managed Instance
  • 72 Implement SQL Auditing
  • 73 Implement Always Encrypt
  • 74 Implement Defender for SQL
  • 75 Implement Dynamic Data Masking
  • 76 Implement Transparent Data Encryption (TDE)

  • 12 Implementing virtual network Service Endpoints
  • 77 Virtual Network Service Endpoint
  • 78 Implementing a Virtual Network Service Endpoint
  • 79 Service Endpoint Policies
  • 80 Private Endpoints
  • 81 Implementing Private Endpoints
  • 82 Private Link Service
  • 83 Implementing Private Link Services

  • 13 Implementing Azure App Service, Azure Functions
  • 84 Network Integration for Azure App Services and Function Apps
  • 85 Implementing Network Integration for Azure App Services
  • 86 Implementing Two-Way Communications for Our Network Integration
  • 87 App Service Environment Security Features
  • 88 Implementing an ASE App
  • 89 App Service Environment Security Features

  • 14 Custom TLS certificates for Apps and Azure Firewall Services
  • 90 Planning Custom TLS Certificates for Apps and APIs
  • 91 Implementing Custom TLS Certs for Apps and APIs
  • 92 Azure Firewall Services
  • 93 Deploying an Azure Firewall
  • 94 Configuring a Route Table and VNET Peering
  • 95 Creating Firewall Rules
  • 96 Additional Azure Firewall Features
  • 97 Azure Firewall Manager

  • 15 Plan and implement security for public access to Azure resources
  • 98 Planning for an Azure Application Gateway
  • 99 Implementing an Azure Application Gateway
  • 100 Azure Front Door and CDNs
  • 101 Implementing Azure Front Door
  • 102 Azure Web Application Firewall
  • 103 Azure DDoS Protection

  • 16 Configure Azure SQL Encryption and Data Protection
  • 104 Introducing SQL Encryption Operations
  • 105 Azure Virtual Machine DIsk Encryption
  • 106 Cell Level Encryption
  • 107 Dynamic Data Masking
  • 108 Transparent Data Encryption
  • 109 AlwaysEncrypted Concepts

  • 17 Configure Azure SQL Authentication
  • 110 Introducing SQL Authentication
  • 111 Explore the SQL Architecture
  • 112 Create SQL Logins
  • 113 Create SQL Users
  • 114 Create Azure Active Directory Users

  • 18 Plan, implement, and manage governance for Azure security
  • 115 Working With Azure Policy
  • 116 Azure Blueprints
  • 117 Azure Landing Zone
  • 118 Implementing Azure Key Vault RBAC
  • 119 Azure Dedicated HSMs
  • 120 Key Rotation Policies
  • 121 Key Vault Backups

  • 19 Manage security posture by using Microsoft Defender for Cloud
  • 122 Secure Score and Inventory
  • 123 Security Frameworks in Defender for Cloud
  • 124 Adding Standards and Custom Initiatives within Defender For Cloud
  • 125 Attack Surface Management
  • 126 Defender for External Attack Surface Management (EASM)

  • 20 Managing Defender for ServersAzure SQL and using Azure Monitor
  • 127 Configure Defender for Servers
  • 128 Evaluate Vulnerability Scans from Defender for Servers
  • 129 Planning for Defender for Azure SQL Databases
  • 130 Implementing Defender for Azure SQL Database
  • 131 Intro to Azure Monitor
  • 132 Saving Resource Logs
  • 133 Azure Monitor Alerting
  • 134 Additional Azure Monitor Features

  • 21 Secure Data in Azure Storage Accounts
  • 135 Introducing Secure Azure Storage Accounts
  • 136 RBAC
  • 137 Shared Access Signatures
  • 138 Shared Access Keys
  • 139 BYOK
  • 140 Data Protection Settings
  • 141 Storage Account Backups

  • 22 Secure Microsoft Azure Container Registry
  • 142 Intro to Microsoft Azure Container Registry
  • 143 Compare Features Across Azure Container Registry SKUs
  • 144 Secure Azure Container Registry With Customer-Managed Key
  • 145 Import Images Into Azure Container Registry With PowerShell
  • 146 Secure Azure Container Registry With Private Link
  • 147 Test ACR Private Link Connectivity From Azure Linux VM
  • 148 Apply Azure Policy Compliance Rules to Container Registry

  • 23 Understand and Secure Azure Container Apps
  • 149 Intro to Microsoft Azure Container Apps
  • 150 Deploy Simple Azure Container App With NGINX
  • 151 Create Azure Container App Revisions and Scale
  • 152 Enable Traffic Splitting for Azure Container App Revisions
  • 153 Build Custom Container Image for Azure Container Apps
  • 154 Deploy Custom Container Image to Azure Container Apps
  • 155 Securely Connect Azure Container Apps to Virtual Network

  • 24 Overview of Securing Azure Kubernetes Service
  • 156 Intro to Securing Azure Kubernetes Service
  • 157 Learn About TLS Encryption Security for Azure AKS
  • 158 Azure Container Image Registry vs. Public Registries
  • 159 AKS Logging and Metrics & Policy Controls
  • 160 What is Kubernetes Network Policy in AKS-
  • 161 Deploy the AKS Secure Baseline Network Layer
  • 162 Deploy Azure Container Registry and AKS Cluster

  • 25 Securely Exposing Remote Access to Azure Networks
  • 163 Intro to Microsoft Azure Secure Remote Access
  • 164 Create Microsoft Azure Bastion Basic SKU Environment
  • 165 Connect to Windows and Linux VMs With Azure Bastion
  • 166 Use Native RDP Client With Azure Bastion Standard
  • 167 Tunnel Linux SSH Connections with Azure Bastion CLI
  • 168 Temporary VM Access With Microsoft Defender Just-in-Time

  • 26 Applied Security for Microsoft Azure API Management
  • 169 Intro to Microsoft Azure API Management
  • 170 Deploy Azure API Management Instance
  • 171 Create API Definition With Mock Response
  • 172 Test API Management Mock Endpoints
  • 173 Secure Access to API Management Products with Subscription Keys
  • 174 Delegate Access to APIs With Workspaces and RBAC

  • 27 Authentication for Microsoft Azure Kubernetes Service
  • 175 Intro to Microsoft Azure Kubernetes Service Auth
  • 176 Create AKS Cluster With Azure AD Integration
  • 177 Connect Kubectl to AKS Cluster as Administrative User
  • 178 Create Limited Access Azure AD Dev User and VM
  • 179 Deploy Kubernetes Role and RoleBinding Resources
  • 180 Test Kubernetes Access as Limited Dev User

  • 28 Implement Networking for Azure Kubernetes Service
  • 181 Intro to Networking for Azure Kubernetes
  • 182 Understanding the Azure Container Network Interface (CNI)
  • 183 Deploy AKS Clusters With Kubenet and Azure CNI
  • 184 Explore Kubernetes Pods Running on Azure CNI
  • 185 Expose Pods Running on Kubenet via NodePort Service

  • 29 Configure Disk Encryption in Microsoft Azure
  • 186 Intro to Storage Disks in Microsoft Azure
  • 187 Default Disk Encryption for Azure Virtual Machines
  • 188 Enable Customer Managed Key With Disk Encryption Set
  • 189 Understanding Encryption at Host for Azure VMs
  • 190 Evaluate Azure Disk Encryption (ADE) for Block Storage
  • 191 Implement Azure Disk Encryption on Linux VM

  • 30 Hands-on With Azure API Management Policies
  • 192 Intro to Microsoft Azure API Management Policies
  • 193 Using the Set Backend Policy for API Management
  • 194 Rewrite URLs With Azure API Management Policy
  • 195 Apply Rate Limit Policy on Azure API Management
  • 196 Define Ruesable Policy Fragments in Azure API Management
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 28000
    حجم: 14908 مگابایت
    مدت زمان: 1620 دقیقه
    تاریخ انتشار: ۱۹ دی ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید