Microsoft Azure Security Technologies (AZ-500)
- Code training M-AZ500
- Duur 4 dagen
Andere trainingsmethoden
Ga naar:
Methode
Deze training is in de volgende formats beschikbaar:
-
Klassikale training
Klassikaal leren
-
Virtueel leren
Virtueel leren
Vraag deze training aan in een andere lesvorm.
Trainingsbeschrijving
Naar bovenData
Naar boven-
- Methode: Klassikale training
- Datum: 19-22 mei, 2025
- Locatie: Nieuwegein (Iepenhoeve 5)
- Taal: Engels
-
- Methode: Virtueel leren
- Datum: 19-22 mei, 2025
- Locatie: Virtueel-en-klassikaal
- Taal: Engels
-
- Methode: Virtueel leren
- Datum: 16-19 juni, 2025
- Locatie: Virtueel-en-klassikaal
- Taal: Engels
-
- Methode: Klassikale training
- Datum: 07-10 juli, 2025
- Locatie: Nieuwegein (Iepenhoeve 5)
-
- Methode: Virtueel leren
- Datum: 07-10 juli, 2025
- Locatie: Virtueel-en-klassikaal
-
- Methode: Virtueel leren
- Datum: 11-14 augustus, 2025
- Locatie: Virtueel-en-klassikaal
- Taal: Engels
Doelgroep
Naar bovenTrainingsdoelstellingen
Naar boven- Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
- Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
- Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
- Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
- Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
- Implement perimeter security strategies including Azure Firewall.
- Implement network security strategies including Network Security Groups and Application Security Groups.
- Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
- Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
- Implement Azure Key Vault including certificates, keys, and secretes.
- Implement application security strategies including app registration, managed identities, and service endpoints.
- Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
- Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
- Implement Azure Monitor including connected sources, log analytics, and alerts.
- Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
- Implement Azure Sentinel including workbooks, incidents, and playbooks.
Inhoud training
Naar bovenThis module covers Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.
- Azure Active Directory
- Azure Identity Protection
- Enterprise Governance
- Azure AD Privileged Identity Management
- Hybrid Identity
- Lab : Role-Based Access Control
- Lab : Azure Policy
- Lab : Resource Manager Locks
- Lab : MFA, Conditional Access and AAD Identity Protection
- Lab : Azure AD Privileged Identity Management
- Lab : Implement Directory Synchronization
After completing this module, students will be able to:
- Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
- Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
- Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
- Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
- Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
This module covers perimeter, network, host, and container security.
- Perimeter Security
- Network Security
- Host Security
- Container Security
- Lab : Network Security Groups and Application Security Groups
- Lab : Azure Firewall
- Lab : Configuring and Securing ACR and AKS
After completing this module, students will be able to:
- Implement perimeter security strategies including Azure Firewall.
- Implement network security strategies including Network Security Groups and Application Security Groups.
- Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
- Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
This module covers Azure Key Vault, application security, storage security, and SQL database security.
- Azure Key Vault
- Application Security
- Storage Security
- SQL Database Security
- Lab : Key Vault (Implementing Secure Data by setting up Always Encrypted)
- Lab : Securing Azure SQL Database
- Lab : Service Endpoints and Securing Storage
After completing this module, students will be able to:
- Implement Azure Key Vault including certificates, keys, and secretes.
- Implement application security strategies including app registration, managed identities, and service endpoints.
- Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
- Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.
- Azure Monitor
- Azure Security Center
- Azure Sentinel
- Lab : Azure Monitor
- Lab : Azure Security Center
- Lab : Azure Sentinel
After completing this module, students will be able to:
- Implement Azure Monitor including connected sources, log analytics, and alerts.
- Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
- Implement Azure Sentinel including workbooks, incidents, and playbooks.
Voorkennis
Naar boven- Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
- Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
- Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
- Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.
You are able to gain the prerequisite knowledge by attending course M-AZ104, Azure Administrator.
Gerelateerde producten
Naar boven- #000000