Companies Home Search Profile

AZ-500 Microsoft Azure Security Technologies with SIMS

Focused View

John Christopher

9:47:29

59 View
  • 1 - Welcome to the course.mp4
    03:32
  • 2 - Understanding the Microsoft Environment.mp4
    01:50
  • 3 - Having a Solid Foundation of Active Directory Domains.mp4
    10:34
  • 4 - Having a Solid Foundation of RAS DMZ and Virtualization.mp4
    13:13
  • 5 - Having a Solid Foundation of the Microsoft Cloud Services.mp4
    12:27
  • 6 - Order of concepts covered in the course.mp4
    01:29
  • 7 - IMPORTANT Using Assignments in the course.mp4
    05:34
  • 8 - Creating a free Azure Account.mp4
    07:01
  • 9 - Activating Azure AD P2 license.mp4
    02:15
  • 10 - Visualizing directory services including Azure AD Microsoft Entra Azure ADDS.mp4
    07:40
  • 11 - Create and manage a managed identity for Azure resources.mp4
    10:58
  • 12 - Manage Azure AD users and external identities.mp4
    15:16
  • 13 - Manage Azure AD groups.mp4
    11:33
  • 14 - Manage administrative units.mp4
    06:25
  • 15 - Configure Azure AD Privileged Identity Management PIM.mp4
    08:38
  • 16 - Activating a PIM role as a user.mp4
    04:36
  • 17 - Implement Conditional Access policies including multifactor authentication.mp4
    07:33
  • 18 - Implement Azure AD Identity Protection.mp4
    05:30
  • 19 - Implement passwordless authentication.mp4
    05:48
  • 20 - Configure access reviews.mp4
    07:49
  • 21 - Foundational concepts of using PowerShell.mp4
    18:08
  • 22 - Connecting PowerShell to Azure.mp4
    06:15
  • 23 - Working with Azure AD using PowerShell.mp4
    10:27
  • 24 - Working with Azure Cloudshell.mp4
    04:47
  • 25 - Working with Azure CLI Bash.mp4
    04:06
  • 26 - Installing Azure CLI on a local machine.mp4
    02:35
  • 27 - Integrate single sign on SSO and identity providers for authentication.mp4
    03:24
  • 28 - Create an app registration.mp4
    07:08
  • 29 - Configure app registration permission scopes.mp4
    04:48
  • 30 - Manage app registration permission consent.mp4
    04:35
  • 31 - Manage API permissions to Azure subscriptions and resources.mp4
    01:53
  • 32 - Configure an authentication method for a service principal.mp4
    05:10
  • 33 - Visualizing role permissions for management groups subscriptions and more.mp4
    07:59
  • 34 - Interpret role and resource permissions.mp4
    09:57
  • 35 - Assign builtin roles in Microsoft Azure Active Directory part of Microsoft Entra.mp4
    01:27
  • 36 - Create and assign custom roles including Azure roles and Azure AD roles.mp4
    21:05
  • 37 - Secure the connectivity of hybrid networks.mp4
    07:06
  • 37 - Secure-the-connectivity-of-hybrid-networks.png
  • 37 - secure-the-connectivity-of-hybrid-networks.zip
  • 38 - Create and configure virtual networks and subnets.mp4
    08:48
  • 39 - Secure the connectivity of virtual networks.mp4
    19:21
  • 39 - vNets-and-Subnets.png
  • 39 - vnets-and-subnets.zip
  • 40 - Direct traffic through the Azure Firewall.mp4
    04:19
  • 41 - Create and configure Azure Firewall.mp4
    21:28
  • 42 - Create and configure Azure Firewall Manager.mp4
    02:55
  • 43 - App-Gateway-and-Front-Door.pdf
  • 43 - Understanding Azure Application Gateway vs Azure Front Door.mp4
    05:09
  • 44 - Create and configure Azure Application Gateway.mp4
    15:24
  • 45 - Create and configure Azure Front Door and Web Application Firewall WAF.mp4
    10:20
  • 46 - Configure a resource firewall on a storage account.mp4
    02:07
  • 47 - Service-Endpoints-vs-Private-Endpoints.png
  • 47 - Visualizing Azure Service Endpoints and Private Endpoints.mp4
    05:40
  • 47 - service-endpoints-vs-private-endpoints.zip
  • 48 - Implement Azure Service Endpoints and Private Endpoints.mp4
    02:16
  • 49 - Implement Azure DDoS Protection.mp4
    03:39
  • 50 - Deleting resources from previous lessons.mp4
    00:58
  • 51 - Configure Endpoint Protection for virtual machines VMs.mp4
    07:33
  • 52 - Implement and manage security updates for VMs.mp4
    06:32
  • 53 - Configure security for container services.mp4
    07:01
  • 54 - Manage access to Azure Container Registry.mp4
    05:40
  • 55 - Configure security for serverless compute.mp4
    07:23
  • 56 - Configure security for an Azure App Service.mp4
    06:13
  • 57 - Configure encryption at rest.mp4
    03:07
  • 58 - Configure encryption in transit.mp4
    04:11
  • 59 - Configure a custom security policy.mp4
    11:00
  • 60 - Create a policy initiative.mp4
    03:34
  • 61 - Configure security settings and auditing by using Azure Policy.mp4
    02:13
  • 62 - Concepts of Microsoft Defender for Cloud.mp4
    06:12
  • 63 - Configure Microsoft Defender for Servers not including Defender for Endpoint.mp4
    02:28
  • 64 - Evaluate for vulnerabilities using Microsoft Defender for Cloud.mp4
    03:14
  • 65 - Configure Microsoft Defender for SQL.mp4
    02:59
  • 66 - Create and customize alert rules by using Azure Monitor.mp4
    05:53
  • 67 - Configure diagnostic logging and log retention by using Azure Monitor.mp4
    04:16
  • 68 - Monitor security logs by using Azure Monitor.mp4
    05:32
  • 69 - Azure-Sentinel.pdf
  • 69 - Understanding Microsoft Sentinel.mp4
    09:28
  • 70 - Create a log analytics workspace needed for Microsoft Sentinel.mp4
    00:40
  • 71 - Implement Microsoft Sentinel.mp4
    14:49
  • 72 - Creating a storage account.mp4
    10:12
  • 73 - Configure access control for storage accounts.mp4
    11:19
  • 74 - Configure storage account access keys.mp4
    03:38
  • 75 - Azure-Files-identity-based-authorization-Microsoft-Learn.pdf
  • 75 - Configure Azure Files identitybased authentication for SMB access.mp4
    06:54
  • 76 - Configure delegated access.mp4
    08:16
  • 77 - Enable a SQL DatabaseServer and connect with SSMS.mp4
    10:15
  • 78 - Configure SQL firewall settings for client connections.mp4
    01:44
  • 79 - Enable database authentication by using Azure AD part of Microsoft Entra.mp4
    07:26
  • 80 - Enable database auditing.mp4
    03:12
  • 81 - Configure dynamic masking on SQL workloads.mp4
    02:37
  • 82 - Implement database encryption for Azure SQL Database.mp4
    04:36
  • 83 - Implement network isolation for data solutions Synapse Analytics Cosmos DB.mp4
    04:19
  • 84 - Create and configure Key Vault.mp4
    04:01
  • 85 - Configure access to Key Vault.mp4
    02:26
  • 86 - Manage certificates secrets and keys.mp4
    05:28
  • 87 - Configure key rotation.mp4
    02:03
  • 88 - Configure backup and recovery of certificates secrets and keys.mp4
    02:08
  • 89 - BONUS Lecture.mp4
    04:02
  • Description


    Get prepared for the AZ-500 exam with instructor led labs and hands on simulations available 24/7

    What You'll Learn?


    • Learn the concepts and perform hands on activities needed to pass the AZ-500 exam
    • Gain a tremendous amount of knowledge involving securing Microsoft Azure Services
    • Get loads of hands on experience with securing Microsoft Azure Services
    • Utilize hands on simulations that can be access anytime, anywhere!

    Who is this for?


  • IT people interested in learning and passing the Microsoft AZ-500 exam!
  • IT people interested in learning a tremendous amount about security in Microsoft Azure Services!
  • What You Need to Know?


  • Willingness to put in the time and practice the steps shown in the course
  • More details


    Description

    We really hope you'll agree, this training is way more than the average course on Udemy!

    Have access to the following:

    • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

    • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

    • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

    TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

    Introduction

    • Welcome to the course

    • Understanding the Microsoft Environment

    • Having a Solid Foundation of Active Directory Domains

    • Having a Solid Foundation of RAS, DMZ, and Virtualization

    • Having a Solid Foundation of the Microsoft Cloud Services

    • Order of concepts covered in the course

    • Questions for John Christopher

    Setting up for hands on

    • IMPORTANT Using Assignments in the course

    • Creating a free Azure Account

    • Activating Azure AD P2 license

    Manage identities in Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra

    • Visualizing directory services, including Azure AD, Microsoft Entra & Azure ADDS

    • Create and manage a managed identity for Azure resources

    • Manage Azure AD users and external identities

    • Manage Azure AD groups

    • Manage administrative units

    Manage secure access by using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra

    • Configure Azure AD Privileged Identity Management (PIM)

    • Activating a PIM role as a user

    • Implement Conditional Access policies, including multifactor authentication

    • Implement Azure AD Identity Protection

    • Implement passwordless authentication

    • Configure access reviews

    Manage Azure using command line tools

    • Foundational concepts of using PowerShell

    • Connecting PowerShell to Azure

    • Working with Azure AD using PowerShell

    • Working with Azure Cloudshell

    • Working with Azure CLI / Bash

    • Installing Azure CLI on a local machine

    Manage application access

    • Integrate single sign on (SSO) and identity providers for authentication

    • Create an app registration

    • Configure app registration permission scopes

    • Manage app registration permission consent

    • Manage API permissions to Azure subscriptions and resources

    • Configure an authentication method for a service principal

    Manage access control

    • Visualizing Azure role permissions for management groups, subscriptions, resource groups, and resources

    • Interpret role and resource permissions

    • Assign built-in roles in Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra

    • Create and assign custom roles, including Azure roles and Azure AD roles

    Implement advanced network security

    • Secure the connectivity of hybrid networks

    • Create and configure virtual networks and subnets

    • Secure the connectivity of virtual networks

    • Direct traffic through the Azure Firewall

    • Create and configure Azure Firewall

    • Create and configure Azure Firewall Manager

    • Understanding Azure Application Gateway vs Azure Front Door

    • Create and configure Azure Application Gateway

    • Create and configure Azure Front Door and Web Application Firewall (WAF)

    • Configure a resource firewall on a storage account

    • Visualizing Azure Service Endpoints and Private Endpoints

    • Implement Azure Service Endpoints and Private Endpoints

    • Implement Azure DDoS Protection

    • Deleting resources from previous lessons

    Configure advanced security for compute

    • Configure Endpoint Protection for virtual machines (VMs)

    • Implement and manage security updates for VMs

    • Configure security for container services

    • Manage access to Azure Container Registry

    • Configure security for serverless compute

    • Configure security for an Azure App Service

    • Configure encryption at rest

    • Configure encryption in transit

    Configure centralized policy management

    • Configure a custom security policy

    • Create a policy initiative

    • Configure security settings and auditing by using Azure Policy

    Configure and manage threat protection

    • Concepts of Microsoft Defender for Cloud

    • Configure Microsoft Defender for Servers (not including Microsoft Defender for Endpoint)

    • Evaluate for vulnerabilities using Microsoft Defender for Cloud

    • Configure Microsoft Defender for SQL

    Configure and manage security monitoring solutions

    • Create and customize alert rules by using Azure Monitor

    • Configure diagnostic logging and log retention by using Azure Monitor

    • Monitor security logs by using Azure Monitor

    • Understanding Microsoft Sentinel

    • Create a log analytics workspace needed for Microsoft Sentinel

    • Implement Microsoft Sentinel

    Configure security for storage

    • Creating a storage account

    • Configure access control for storage accounts

    • Configure storage account access keys

    • Configure Azure Files identity-based authentication for SMB access

    • Configure delegated access

    Configure security for data

    • Enable a SQL Database/Server and connect with SSMS

    • Configure SQL firewall settings for client connections

    • Enable database authentication by using Microsoft Azure AD, part of Microsoft Entra

    • Enable database auditing

    • Configure dynamic masking on SQL workloads

    • Implement database encryption for Azure SQL Database

    • Implement network isolation for data solutions, including Synapse Analytics & Cosmos DB

    Configure and manage Azure Key Vault

    • Create and configure Key Vault

    • Configure access to Key Vault

    • Manage certificates, secrets, and keys

    • Configure key rotation

    • Configure backup and recovery of certificates, secrets, and keys

    Finishing Up

    • Where do I go from here?

    Who this course is for:

    • IT people interested in learning and passing the Microsoft AZ-500 exam!
    • IT people interested in learning a tremendous amount about security in Microsoft Azure Services!

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    John Christopher
    John Christopher
    Instructor's Courses
    John Christopher is a Technical Instructor that has been in the business for over 20 years. His first experience with information technology occurred in the early 90s when he ran an MS-DOS based BBS(Bulletin Board System) as a System Operator. In the late 90s, after working with Windows NT 3.50 performing backups for Regal Group, he decided to get Windows NT Microsoft Certified.In 1998 he got his first Microsoft Certified Systems Engineer and Microsoft Certified Trainer certification. Shortly after getting certified, he began working as a Junior Administrator and Instructor for Knowledge Alliance in Atlanta GA. From there John was able to become one of the first people in the world to gain an MCSE for the Windows 2000 operating system and he began teaching full time for a company called Productivity Point International. At Productivity Point, John got Citrix Metaframe certified and began teaching Citrix along with Microsoft classes. Productivity Point began experiencing financial troubles and John moved on to work with another training company, located in Atlanta GA. in 2001.For many years at the training company in Atlanta John was the network administrator and held the title of Senior Technical Instructor for the company. John designed and administered their network from the ground up, going from a single floor in a single building, to multiple floors in multiple buildings and locations. He furthered his certifications, gaining the MCSE for 2003, 2008(MCITP), 2012, A+, Network+, Security+, Exchange, and CCNA. Along with his Network admin duties, John taught hundreds of students during his 11 years for the company. During all his years of training, John has had the honor of doing lots of classes with the military, along with quite a few classes within on-site military bases. In 2012, he decided to break away from company he had been working for and do consulting and contract teaching. Currently, John gets hired by many different training companies to teach technical training classes all over the United States. He is also hired as a consultant to go into companies and work on their networks and implement, along with troubleshoot real world scenarios.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 89
    • duration 9:47:29
    • English subtitles has
    • Release Date 2023/09/11