وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Azure Security Engineer Associate Online Training

سرفصل های دوره

1 Securing Azure AD Identities
  • 1 Azure AD Accounts
  • 2 Creating Azure AD Users Using PowerShell
  • 3 Bulk Create and Delete Azure AD User Accounts
  • 4 Creating Azure AD Groups
  • 5 Azure AD Identity Protection
  • 6 Implementing Azure AD Identity Protection Policies

  • 2 Securing External Identities and Verifiable Identities
  • 7 External Identity Settings
  • 8 Creating an External Identity from the Azure Portal
  • 9 Creating External Identities Using PowerShell
  • 10 Verified IDs
  • 11 Configuring Azure Key Vault for Verifiable IDs
  • 12 Configuring Verified ID
  • 13 Finishing Up With Verified IDs

  • 3 Managing Azure AD Authentication
  • 14 Configuring MFA in Azure AD
  • 15 Managing MFA In Azure AD
  • 16 Implement Passwordless Authentication In Azure AD
  • 17 Implementing Password Protection
  • 18 Single Sign-On Using Hybrid Identities
  • 19 Enforcing Modern Authentication Protocols

  • 4 Managing Azure AD Authorization
  • 20 Roles In Azure
  • 21 Creating Custom Roles in Azure
  • 22 Privileged Identity Management (PIM)
  • 23 Configure Azure AD PIM
  • 24 Conditional Access Policies
  • 25 Creating Conditional Access Policies

  • 5 Managing Application Access in Azure AD
  • 26 Managing Access To Enterprise Apps
  • 27 Permission Consent
  • 28 App Registration
  • 29 App Permission
  • 30 Managed Identities
  • 31 App Proxies
  • 32 App Proxy Setup

  • 6 Managing Permissions with Microsoft Entra
  • 33 Microsoft Entra
  • 34 Exploring the Entra Portal
  • 35 Microsoft Entra Permissions Management Settings
  • 36 Onboarding Microsoft Entras Permissions Management
  • 37 Microsoft Entras Dashboard & Analytics
  • 38 Entra Remediation and Autopilot
  • 39 Entra Audit, Reports, and Help
  • 40 Entra Settings, Notifications, and User Management

  • 7 Managing Azure Network and Application Security Groups
  • 41 Network Security Groups (NSGs)
  • 42 NSG Rules
  • 43 Creating NSGs
  • 44 NSGs and Service Tags
  • 45 Troubleshooting NSGs
  • 46 Application Security Groups (ASGs)
  • 47 Implementing ASGs

  • 8 Implementing ExpressRoute Encryption, PaaS Firewall Settings
  • 48 Configuring IPSec Encryption over Azure ExpressRoute Pt.1
  • 49 Configure IPSec Encryption over Azure ExpressRoute Pt.2
  • 50 Configure Firewall Settings for PaaS Resources
  • 51 Using Network Watcher for Monitoring
  • 52 Using Network Monitor for Network Troubleshooting
  • 53 Network Watcher NSG Flow Logging

  • 9 Implementing Virtual WAN and Secure VPN Connectivity
  • 54 Virtual WAN and Secured Virtual Hubs
  • 55 Deploying Azure Virtual WAN and Secured Virtual Hubs
  • 56 Connecting VNETs to Secured Virtual Hubs
  • 57 VPN Connectivity Into vWAN
  • 58 Configure P2S VPN
  • 59 Configuring Teleworker To Test P2S VPN
  • 60 Configuring S2S VPN

  • 10 Exploring VNet Peering, VPN Gateways and UDRs
  • 61 VNET Peering
  • 62 Configure VNET Peering
  • 63 VPN Gateway w-User Defined Routes (UDRs)
  • 64 Configuring VPN Gateways
  • 65 Virtual Network Gateway Peering
  • 66 Creating Route Tables
  • 67 Creating User Defined Routes (UDRs)
  • 68 Testing Our Routing

  • 11 Plan and implement network security configurations for an Azure SQL Managed
  • 69 Azure SQL Managed Instances
  • 70 Azure SQL Managed Instance Security Features
  • 71 Create an Azure SQL Managed Instance
  • 72 Implement SQL Auditing
  • 73 Implement Always Encrypt
  • 74 Implement Defender for SQL
  • 75 Implement Dynamic Data Masking
  • 76 Implement Transparent Data Encryption (TDE)

  • 12 Implementing virtual network Service Endpoints
  • 77 Virtual Network Service Endpoint
  • 78 Implementing a Virtual Network Service Endpoint
  • 79 Service Endpoint Policies
  • 80 Private Endpoints
  • 81 Implementing Private Endpoints
  • 82 Private Link Service
  • 83 Implementing Private Link Services

  • 13 Implementing Azure App Service, Azure Functions
  • 84 Network Integration for Azure App Services and Function Apps
  • 85 Implementing Network Integration for Azure App Services
  • 86 Implementing Two-Way Communications for Our Network Integration
  • 87 App Service Environment Security Features
  • 88 Implementing an ASE App
  • 89 App Service Environment Security Features

  • 14 Custom TLS certificates for Apps and Azure Firewall Services
  • 90 Planning Custom TLS Certificates for Apps and APIs
  • 91 Implementing Custom TLS Certs for Apps and APIs
  • 92 Azure Firewall Services
  • 93 Deploying an Azure Firewall
  • 94 Configuring a Route Table and VNET Peering
  • 95 Creating Firewall Rules
  • 96 Additional Azure Firewall Features
  • 97 Azure Firewall Manager

  • 15 Plan and implement security for public access to Azure resources
  • 98 Planning for an Azure Application Gateway
  • 99 Implementing an Azure Application Gateway
  • 100 Azure Front Door and CDNs
  • 101 Implementing Azure Front Door
  • 102 Azure Web Application Firewall
  • 103 Azure DDoS Protection

  • 16 Configure Azure SQL Encryption and Data Protection
  • 104 Introducing SQL Encryption Operations
  • 105 Azure Virtual Machine DIsk Encryption
  • 106 Cell Level Encryption
  • 107 Dynamic Data Masking
  • 108 Transparent Data Encryption
  • 109 AlwaysEncrypted Concepts

  • 17 Configure Azure SQL Authentication
  • 110 Introducing SQL Authentication
  • 111 Explore the SQL Architecture
  • 112 Create SQL Logins
  • 113 Create SQL Users
  • 114 Create Azure Active Directory Users

  • 18 Plan, implement, and manage governance for Azure security
  • 115 Working With Azure Policy
  • 116 Azure Blueprints
  • 117 Azure Landing Zone
  • 118 Implementing Azure Key Vault RBAC
  • 119 Azure Dedicated HSMs
  • 120 Key Rotation Policies
  • 121 Key Vault Backups

  • 19 Manage security posture by using Microsoft Defender for Cloud
  • 122 Secure Score and Inventory
  • 123 Security Frameworks in Defender for Cloud
  • 124 Adding Standards and Custom Initiatives within Defender For Cloud
  • 125 Attack Surface Management
  • 126 Defender for External Attack Surface Management (EASM)

  • 20 Managing Defender for ServersAzure SQL and using Azure Monitor
  • 127 Configure Defender for Servers
  • 128 Evaluate Vulnerability Scans from Defender for Servers
  • 129 Planning for Defender for Azure SQL Databases
  • 130 Implementing Defender for Azure SQL Database
  • 131 Intro to Azure Monitor
  • 132 Saving Resource Logs
  • 133 Azure Monitor Alerting
  • 134 Additional Azure Monitor Features

  • 21 Secure Data in Azure Storage Accounts
  • 135 Introducing Secure Azure Storage Accounts
  • 136 RBAC
  • 137 Shared Access Signatures
  • 138 Shared Access Keys
  • 139 BYOK
  • 140 Data Protection Settings
  • 141 Storage Account Backups

  • 22 Secure Microsoft Azure Container Registry
  • 142 Intro to Microsoft Azure Container Registry
  • 143 Compare Features Across Azure Container Registry SKUs
  • 144 Secure Azure Container Registry With Customer-Managed Key
  • 145 Import Images Into Azure Container Registry With PowerShell
  • 146 Secure Azure Container Registry With Private Link
  • 147 Test ACR Private Link Connectivity From Azure Linux VM
  • 148 Apply Azure Policy Compliance Rules to Container Registry

  • 23 Understand and Secure Azure Container Apps
  • 149 Intro to Microsoft Azure Container Apps
  • 150 Deploy Simple Azure Container App With NGINX
  • 151 Create Azure Container App Revisions and Scale
  • 152 Enable Traffic Splitting for Azure Container App Revisions
  • 153 Build Custom Container Image for Azure Container Apps
  • 154 Deploy Custom Container Image to Azure Container Apps
  • 155 Securely Connect Azure Container Apps to Virtual Network

  • 24 Overview of Securing Azure Kubernetes Service
  • 156 Intro to Securing Azure Kubernetes Service
  • 157 Learn About TLS Encryption Security for Azure AKS
  • 158 Azure Container Image Registry vs. Public Registries
  • 159 AKS Logging and Metrics & Policy Controls
  • 160 What is Kubernetes Network Policy in AKS-
  • 161 Deploy the AKS Secure Baseline Network Layer
  • 162 Deploy Azure Container Registry and AKS Cluster

  • 25 Securely Exposing Remote Access to Azure Networks
  • 163 Intro to Microsoft Azure Secure Remote Access
  • 164 Create Microsoft Azure Bastion Basic SKU Environment
  • 165 Connect to Windows and Linux VMs With Azure Bastion
  • 166 Use Native RDP Client With Azure Bastion Standard
  • 167 Tunnel Linux SSH Connections with Azure Bastion CLI
  • 168 Temporary VM Access With Microsoft Defender Just-in-Time

  • 26 Applied Security for Microsoft Azure API Management
  • 169 Intro to Microsoft Azure API Management
  • 170 Deploy Azure API Management Instance
  • 171 Create API Definition With Mock Response
  • 172 Test API Management Mock Endpoints
  • 173 Secure Access to API Management Products with Subscription Keys
  • 174 Delegate Access to APIs With Workspaces and RBAC

  • 27 Authentication for Microsoft Azure Kubernetes Service
  • 175 Intro to Microsoft Azure Kubernetes Service Auth
  • 176 Create AKS Cluster With Azure AD Integration
  • 177 Connect Kubectl to AKS Cluster as Administrative User
  • 178 Create Limited Access Azure AD Dev User and VM
  • 179 Deploy Kubernetes Role and RoleBinding Resources
  • 180 Test Kubernetes Access as Limited Dev User

  • 28 Implement Networking for Azure Kubernetes Service
  • 181 Intro to Networking for Azure Kubernetes
  • 182 Understanding the Azure Container Network Interface (CNI)
  • 183 Deploy AKS Clusters With Kubenet and Azure CNI
  • 184 Explore Kubernetes Pods Running on Azure CNI
  • 185 Expose Pods Running on Kubenet via NodePort Service

  • 29 Configure Disk Encryption in Microsoft Azure
  • 186 Intro to Storage Disks in Microsoft Azure
  • 187 Default Disk Encryption for Azure Virtual Machines
  • 188 Enable Customer Managed Key With Disk Encryption Set
  • 189 Understanding Encryption at Host for Azure VMs
  • 190 Evaluate Azure Disk Encryption (ADE) for Block Storage
  • 191 Implement Azure Disk Encryption on Linux VM

  • 30 Hands-on With Azure API Management Policies
  • 192 Intro to Microsoft Azure API Management Policies
  • 193 Using the Set Backend Policy for API Management
  • 194 Rewrite URLs With Azure API Management Policy
  • 195 Apply Rate Limit Policy on Azure API Management
  • 196 Define Ruesable Policy Fragments in Azure API Management
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 28000
    حجم: 14908 مگابایت
    مدت زمان: 1620 دقیقه
    تاریخ انتشار: 19 دی 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید