The AZ-500: Microsoft Azure Security Technologies course equips IT Security Professionals with essential skills to implement security controls, maintain security posture, and address vulnerabilities in Azure environments. The course covers identity and access security, platform protection, data and application security, and security operations, providing comprehensive training to safeguard Azure-based infrastructures and ensure robust security management.
Instructor
AZ-500: Microsoft Azure Security Technologies Training Course
Curriculum
Master Microsoft Azure Security with the AZ-500 Training. Gain in-depth knowledge and skills to protect cloud environments and become an Azure security expert.
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. The AZ-500: Microsoft Azure Security Technologies journey is designed for IT professionals who are looking to demonstrate their ability to manage security and identity within Azure environments. This journey is ideal for individuals who work in roles such as Azure Security Engineer, System Administrator, or Cloud Security Architect, and who are responsible for implementing security controls, maintaining a secure cloud infrastructure, and responding to security threats.
Audience Profile:
This course is intended for Azure Security Engineers who are preparing for the associated certification exam or are involved in security tasks in their daily work. It is also beneficial for engineers aiming to specialize in securing Azure-based platforms and protecting organizational data.
At Course Completion:
After completing this course, students will be able to:
Describe specialized data classifications on Azure
Identify Azure data protection mechanisms
Implement Azure data encryption methods
Secure internet protocols and how to apply them on Azure
Describe Azure security services and features
Prerequisites:
Successful learners should have:
Knowledge of security best practices and industry requirements, including defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
Familiarity with security protocols such as VPN, IPSec, SSL, and data encryption methods.
Experience deploying Azure workloads; the course builds on existing Azure administration knowledge with a focus on security.
Experience with Windows and Linux operating systems and scripting languages.
Course Outline:
Secure Azure solutions with Azure Active Directory
Configure Azure AD and Azure AD Domain Services for security
Create users and groups that enable secure usage of your tenant
Use MFA to protect user's identities
Configure passwordless security options
Implement Hybrid identity
Deploy Azure AD Connect
Pick and configure the best authentication option for your security needs
Configure password writeback
Deploy Azure AD identity protection
Deploy and configure Identity Protection
Configure MFA for users, groups, and applications
Create Conditional Access policies to ensure your security
Create and follow an access review process
Configure Azure AD privileged identity management
Describe Zero Trust and how it impacts security
Configure and deploy roles using Privileged Identity Management (PIM)
Evaluate the usefulness of each PIM setting as it relates to your security goals
Design an enterprise governance strategy
Explain the shared responsibility model and how it impacts your security configuration
Create Azure policies to protect your solutions
Configure and deploy access to services using RBAC
Implement perimeter security
Define defense in depth
Protect your environment from denial-of-service attacks
Secure your solutions using firewalls and VPNs
Explore your end-to-end perimeter security configuration based on your security posture
Configure network security
Deploy and configure network security groups to protect your Azure solutions
Configure and lockdown service endpoints and private links
Secure your applications with Application Gateway, Web App Firewall, and Front Door
Configure ExpressRoute to help protect your network traffic
Configure and manage host security
Configure and deploy Endpoint Protection
Deploy a privileged access strategy for devices and privileged workstations
Secure your virtual machines and access to them
Deploy Windows Defender
Practice layered security by reviewing and implementing Security Center and Security Benchmarks
Enable Containers security
Define the available security tools for containers in Azure
Configure security settings for containers and Kubernetes services
Lock down network, storage, and identity resources connected to your containers
Deploy RBAC to control access to containers
Deploy and secure Azure Key Vault
Define what a key vault is and how it protects certificates and secrets
Deploy and configure Azure Key Vault
Secure access and administration of your key vault
Store keys and secrets in your key vault
Explore key security considerations like key rotation and backup/recovery
Configure application security features
Register an application in Azure using app registration
Select and configure which Azure AD users can access each application
Configure and deploy web app certificates
Implement storage security
Define data sovereignty and how that is achieved in Azure
Configure Azure Storage access in a secure and managed way
Encrypt your data while it is at rest and in transit
Apply rules for data retention
Configure and manage SQL database security
Configure which users and applications have access to your SQL databases
Block access to your servers using firewalls
Discover, classify, and audit the use of your data
Encrypt and protect your data while it is stored in the database
Configure and manage Azure Monitor
Configure and monitor Azure Monitor
Define metrics and logs you want to track for your Azure applications
Connect data sources to and configure Log Analytics
Create and monitor alerts associated with your solutions security
Enable and manage Microsoft Defender for Cloud
Define the most common types of cyber-attacks
Configure Microsoft Defender for Cloud based on your security posture
Review Secure Score and raise it
Lock down your solutions using Microsoft Defender for Cloud's workload protection
Enable Just-in-Time access and other security features
Configure and monitor Microsoft Sentinel
Explain what Microsoft Sentinel is and how it is used
Deploy Microsoft Sentinel
Connect data to Microsoft Sentinel, like Azure Logs, Azure AD, and others
Track incidents using workbooks, playbooks, and hunting techniques
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. The AZ-500: Microsoft Azure Security Technologies journey is designed for IT professionals who are looking to demonstrate their ability to manage security and identity within Azure environments. This journey is ideal for individuals who work in roles such as Azure Security Engineer, System Administrator, or Cloud Security Architect, and who are responsible for implementing security controls, maintaining a secure cloud infrastructure, and responding to security threats.
Audience Profile:
This course is intended for Azure Security Engineers who are preparing for the associated certification exam or are involved in security tasks in their daily work. It is also beneficial for engineers aiming to specialize in securing Azure-based platforms and protecting organizational data.
At Course Completion:
After completing this course, students will be able to:
Describe specialized data classifications on Azure
Identify Azure data protection mechanisms
Implement Azure data encryption methods
Secure internet protocols and how to apply them on Azure
Describe Azure security services and features
Prerequisites:
Successful learners should have:
Knowledge of security best practices and industry requirements, including defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
Familiarity with security protocols such as VPN, IPSec, SSL, and data encryption methods.
Experience deploying Azure workloads; the course builds on existing Azure administration knowledge with a focus on security.
Experience with Windows and Linux operating systems and scripting languages.
Course Outline:
Secure Azure solutions with Azure Active Directory
Configure Azure AD and Azure AD Domain Services for security
Create users and groups that enable secure usage of your tenant
Use MFA to protect user's identities
Configure passwordless security options
Implement Hybrid identity
Deploy Azure AD Connect
Pick and configure the best authentication option for your security needs
Configure password writeback
Deploy Azure AD identity protection
Deploy and configure Identity Protection
Configure MFA for users, groups, and applications
Create Conditional Access policies to ensure your security
Create and follow an access review process
Configure Azure AD privileged identity management
Describe Zero Trust and how it impacts security
Configure and deploy roles using Privileged Identity Management (PIM)
Evaluate the usefulness of each PIM setting as it relates to your security goals
Design an enterprise governance strategy
Explain the shared responsibility model and how it impacts your security configuration
Create Azure policies to protect your solutions
Configure and deploy access to services using RBAC
Implement perimeter security
Define defense in depth
Protect your environment from denial-of-service attacks
Secure your solutions using firewalls and VPNs
Explore your end-to-end perimeter security configuration based on your security posture
Configure network security
Deploy and configure network security groups to protect your Azure solutions
Configure and lockdown service endpoints and private links
Secure your applications with Application Gateway, Web App Firewall, and Front Door
Configure ExpressRoute to help protect your network traffic
Configure and manage host security
Configure and deploy Endpoint Protection
Deploy a privileged access strategy for devices and privileged workstations
Secure your virtual machines and access to them
Deploy Windows Defender
Practice layered security by reviewing and implementing Security Center and Security Benchmarks
Enable Containers security
Define the available security tools for containers in Azure
Configure security settings for containers and Kubernetes services
Lock down network, storage, and identity resources connected to your containers
Deploy RBAC to control access to containers
Deploy and secure Azure Key Vault
Define what a key vault is and how it protects certificates and secrets
Deploy and configure Azure Key Vault
Secure access and administration of your key vault
Store keys and secrets in your key vault
Explore key security considerations like key rotation and backup/recovery
Configure application security features
Register an application in Azure using app registration
Select and configure which Azure AD users can access each application
Configure and deploy web app certificates
Implement storage security
Define data sovereignty and how that is achieved in Azure
Configure Azure Storage access in a secure and managed way
Encrypt your data while it is at rest and in transit
Apply rules for data retention
Configure and manage SQL database security
Configure which users and applications have access to your SQL databases
Block access to your servers using firewalls
Discover, classify, and audit the use of your data
Encrypt and protect your data while it is stored in the database
Configure and manage Azure Monitor
Configure and monitor Azure Monitor
Define metrics and logs you want to track for your Azure applications
Connect data sources to and configure Log Analytics
Create and monitor alerts associated with your solutions security
Enable and manage Microsoft Defender for Cloud
Define the most common types of cyber-attacks
Configure Microsoft Defender for Cloud based on your security posture
Review Secure Score and raise it
Lock down your solutions using Microsoft Defender for Cloud's workload protection
Enable Just-in-Time access and other security features
Configure and monitor Microsoft Sentinel
Explain what Microsoft Sentinel is and how it is used
Deploy Microsoft Sentinel
Connect data to Microsoft Sentinel, like Azure Logs, Azure AD, and others
Track incidents using workbooks, playbooks, and hunting techniques
SpireTec solutions is the latest technology enabled I.Tmanagement training company specialized in offering 1500+ courses with the state of art training facilities backed by a team of industry experts in various domains with assuring best quality services.
Since SpireTec provides 24X7 training and support for your training needs is very adaptable to your time availabilities and offers customized training programs according to your availability and time zones of your contingent.
Because SpireTec aims for the personal & professional growth of you as individual & corporate as a whole, providing training on the latest and updated versions in the designated domains.
It is preferable but not mandatory to have domain experience in the area of your interest in which you want to opt training, supported by good English communication skills, a good Wi-Fi and computer or laptop system in case you want remote training.
Spire Tec aims and ensure to offer finest and world-class training to the participants by giving them a proper counselling and a guided career path by our industry experts which leads guaranteed success for you in the corporate world.
We offer online training (1-1, Group training), Classroom training, Onsite training with state of art facilities.
We use cookies
Some cookies are essential for this site to function and cannot be turned off. Others are set to help us
understand how our service performs and is used, and to support our marketing efforts.
Learn more in our
Terms &
Privacy Policy.