AZ-500 Microsoft Azure Security Technologies with SIMS
What you'll learn
- Learn the concepts and perform hands on activities needed to pass the AZ-500 exam
- Gain a tremendous amount of knowledge involving securing Microsoft Azure Services
- Get loads of hands on experience with securing Microsoft Azure Services
- Utilize hands on simulations that can be access anytime, anywhere!
Requirements
- Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more than the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
Welcome to the course
Understanding the Microsoft Environment
Having a Solid Foundation of Active Directory Domains
Having a Solid Foundation of RAS, DMZ, and Virtualization
Having a Solid Foundation of the Microsoft Cloud Services
Order of concepts covered in the course
Questions for John Christopher
Setting up for hands on
IMPORTANT Using Assignments in the course
Creating a free Azure Account
Activating Azure AD P2 license
Manage identities in Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
Visualizing directory services, including Azure AD, Microsoft Entra & Azure ADDS
Create and manage a managed identity for Azure resources
Manage Azure AD users and external identities
Manage Azure AD groups
Manage administrative units
Manage secure access by using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
Configure Azure AD Privileged Identity Management (PIM)
Activating a PIM role as a user
Implement Conditional Access policies, including multifactor authentication
Implement Azure AD Identity Protection
Implement passwordless authentication
Configure access reviews
Manage Azure using command line tools
Foundational concepts of using PowerShell
Connecting PowerShell to Azure
Working with Azure AD using PowerShell
Working with Azure Cloudshell
Working with Azure CLI / Bash
Installing Azure CLI on a local machine
Manage application access
Integrate single sign on (SSO) and identity providers for authentication
Create an app registration
Configure app registration permission scopes
Manage app registration permission consent
Manage API permissions to Azure subscriptions and resources
Configure an authentication method for a service principal
Manage access control
Visualizing Azure role permissions for management groups, subscriptions, resource groups, and resources
Interpret role and resource permissions
Assign built-in roles in Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
Create and assign custom roles, including Azure roles and Azure AD roles
Implement advanced network security
Secure the connectivity of hybrid networks
Create and configure virtual networks and subnets
Secure the connectivity of virtual networks
Direct traffic through the Azure Firewall
Create and configure Azure Firewall
Create and configure Azure Firewall Manager
Understanding Azure Application Gateway vs Azure Front Door
Create and configure Azure Application Gateway
Create and configure Azure Front Door and Web Application Firewall (WAF)
Configure a resource firewall on a storage account
Visualizing Azure Service Endpoints and Private Endpoints
Implement Azure Service Endpoints and Private Endpoints
Implement Azure DDoS Protection
Deleting resources from previous lessons
Configure advanced security for compute
Configure Endpoint Protection for virtual machines (VMs)
Implement and manage security updates for VMs
Configure security for container services
Manage access to Azure Container Registry
Configure security for serverless compute
Configure security for an Azure App Service
Configure encryption at rest
Configure encryption in transit
Configure centralized policy management
Configure a custom security policy
Create a policy initiative
Configure security settings and auditing by using Azure Policy
Configure and manage threat protection
Concepts of Microsoft Defender for Cloud
Configure Microsoft Defender for Servers (not including Microsoft Defender for Endpoint)
Evaluate for vulnerabilities using Microsoft Defender for Cloud
Configure Microsoft Defender for SQL
Configure and manage security monitoring solutions
Create and customize alert rules by using Azure Monitor
Configure diagnostic logging and log retention by using Azure Monitor
Monitor security logs by using Azure Monitor
Understanding Microsoft Sentinel
Create a log analytics workspace needed for Microsoft Sentinel
Implement Microsoft Sentinel
Configure security for storage
Creating a storage account
Configure access control for storage accounts
Configure storage account access keys
Configure Azure Files identity-based authentication for SMB access
Configure delegated access
Configure security for data
Enable a SQL Database/Server and connect with SSMS
Configure SQL firewall settings for client connections
Enable database authentication by using Microsoft Azure AD, part of Microsoft Entra
Enable database auditing
Configure dynamic masking on SQL workloads
Implement database encryption for Azure SQL Database
Implement network isolation for data solutions, including Synapse Analytics & Cosmos DB
Configure and manage Azure Key Vault
Create and configure Key Vault
Configure access to Key Vault
Manage certificates, secrets, and keys
Configure key rotation
Configure backup and recovery of certificates, secrets, and keys
Finishing Up
Where do I go from here?
Who this course is for:
- IT people interested in learning and passing the Microsoft AZ-500 exam!
- IT people interested in learning a tremendous amount about security in Microsoft Azure Services!
Instructor
John Christopher is a Technical Instructor that has been in the business for 25 years. His first experience with information technology occurred in the early 90s when he ran an MS-DOS based BBS(Bulletin Board System) as a System Operator. In the late 90s, after working with Windows NT 3.50 performing backups for Regal Group, he decided to get Windows NT Microsoft Certified.
In 1998 he got his first Microsoft Certified Systems Engineer and Microsoft Certified Trainer certification. Shortly after getting certified, he began working as a Junior Administrator and Instructor for Knowledge Alliance. From there John was able to become one of the first people in the world to gain an MCSE for the Windows 2000 operating system and he began teaching full time for a company called Productivity Point International. At Productivity Point, John got Citrix Metaframe certified and began teaching Citrix along with Microsoft classes. Productivity Point began experiencing financial troubles and John moved on to work with another training company in 2001
For many years at the training company in Atlanta John was the network administrator and held the title of Senior Technical Instructor for the company. John designed and administered their network from the ground up, going from a single floor in a single building, to multiple floors in multiple buildings and locations. He furthered his certifications, gaining the MCSE for 2003, 2008(MCITP), 2012, A+, Network+, Security+, Exchange, and CCNA. Along with his Network admin duties, John taught hundreds of students during his 11 years for the company. During all his years of training, John has had the honor of doing lots of classes with the military, along with quite a few classes within on-site military bases. In 2012, he decided to break away from the company he had been working for and do consulting and contract teaching. Currently, John gets hired by many different training companies to teach technical training classes all over the United States. He is also hired as a consultant to go into companies and work on their networks and implement, along with troubleshoot real world scenarios.