Audience
Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.
$2,750.00
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.
20 in stock
Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.
If you are a beginner in the field of security or cloud, then doing the AZ-900 Microsoft Azure Fundamentals which is a good start for understanding Azure foundational concepts. No mandatory prerequisite exam before the AZ-500 exam.
After completing this course, students will be able to:
• Describe specialized data classifications on Azure
• Identify Azure data protection mechanisms
• Implement Azure data encryption methods
• Secure Internet protocols and how to implement them on Azure
• Describe Azure security services and features
Module 1: Identity and Access
• Azure Active Directory
• Hybrid Identity
• Azure Identity Protection
• Azure AD Privileged Identity Management
• Enterprise Governance
Lab : Role-Based Access Control
Lab: Azure Policy
Lab: Resource Manager Locks
Lab: MFA, Conditional Access and AAD Identity Protection
Lab: Azure AD Privileged Identity Management
Lab: Implement Directory Synchronization
Module 2: Platform Protection
• Understand cloud security
• Build a network
• Secure network
• Implement host security
• Implement platform security
• Implement subscription security
Lab: Configuring and Securing ACR and AKS
Lab: Azure Firewall
Lab: Network Security Groups and Application Security Groups
After completing this module, students will be able to:
• Implement perimeter security strategies including Azure Firewall.
• Implement network security strategies including Network Security Groups and Application Security Groups.
• Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
• Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
Module 3: Security Operations
• Configure security services
• Configure security policies by using Azure Security Center
• Manage security alerts
• Respond to and remediate security issues
• Create security baselines
Lab: Key Vault (Implementing Secure Data by setting up Always Encrypted)
Lab: Securing Azure SQL Database
Lab: Service Endpoints and Securing Storage
After completing this module, students will be able to:
Implement Azure Key Vault including certificates, keys, and secretes.
• Implement application security strategies including app registration, managed identities, and service endpoints.
• Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
• Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
Module 4: Data and applications
• Configure security policies to manage data
• Configure security for data infrastructure
• Configure encryption for data at rest
• Understand application security
• Implement security for application lifecycle
• Secure applications
• Configure and manage Azure Key Vault
Lab: Azure Sentinel
Lab: Azure Security Center
Lab: Azure Monitor
After completing this module, students will be able to:
• Implement Azure Monitor including connected sources, log analytics, and alerts.
• Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
• Implement Azure Sentinel including workbooks, incidents, and playbooks
Click on the following link to see the current Course Schedule
Our minimum class-size is 3 for this course.
If there are no scheduled dates for this course, it can be customized to suit the time and skill needs of clients and it can be held online, at a rented location or at your premises.
Click on the following link below to arrange for a custom course: Enquire about a course date.
Properly securing resources while making them available to users that require access is a constant concern within an IT and cloud environment. This course will explore how to manage identities, provide role-based access, and secure data within an Azure ecosystem.
CANCELLATION POLICY – There is never a fee for cancelling seven business days before a class for any reason. Data Vision Systems reserves the right to cancel any course due to insufficient registration or other extenuating circumstances. Participants will be advised prior to doing so.
Reviews
There are no reviews yet.