Companies Home Search Profile

Azure Security Engineer Associate Online Training

Focused View

Bob Salmans

26:59:35

237 View
  • 1. Securing Azure AD Identities .mp4
    08:17
  • 2. Creating Azure AD Users Using PowerShell .mp4
    04:47
  • 3. Bulk Create and Delete Azure AD User Accounts .mp4
    05:27
  • 4. Creating Azure AD Groups .mp4
    12:05
  • 5. Azure AD Identity Protection .mp4
    08:39
  • 6. Implementing Azure AD Identity Protection Policies .mp4
    06:50
  • 1. External Identity Settings .mp4
    04:29
  • 2. Creating an External Identity from the Azure Portal .mp4
    07:37
  • 3. Creating External Identities Using PowerShell .mp4
    05:53
  • 4. Verified IDs .mp4
    12:43
  • 5. Configuring Azure Key Vault for Verifiable IDs .mp4
    03:35
  • 6. Configuring Verified ID .mp4
    05:57
  • 7. Finishing Up With Verified IDs .mp4
    07:03
  • 1. Configuring MFA in Azure AD .mp4
    10:04
  • 2. Managing MFA In Azure AD .mp4
    06:14
  • 3. Implement Passwordless Authentication In Azure AD .mp4
    10:18
  • 4. Implementing Password Protection .mp4
    04:36
  • 5. Single Sign-On Using Hybrid Identities .mp4
    02:28
  • 6. Enforcing Modern Authentication Protocols .mp4
    13:37
  • 1. Roles In Azure .mp4
    08:23
  • 2. Creating Custom Roles in Azure .mp4
    07:24
  • 3. Privileged Identity Management (PIM) .mp4
    10:59
  • 4. Configure Azure AD PIM .mp4
    17:59
  • 5. Conditional Access Policies .mp4
    05:19
  • 6. Creating Conditional Access Policies .mp4
    13:18
  • 1. Managing Access To Enterprise Apps .mp4
    07:32
  • 2. Permission Consent .mp4
    07:05
  • 3. App Registration .mp4
    11:11
  • 4. App Permission .mp4
    08:28
  • 5. Managed Identities .mp4
    08:08
  • 6. App Proxies .mp4
    08:59
  • 7. App Proxy Setup .mp4
    07:49
  • 1. Microsoft Entra .mp4
    09:41
  • 2. Exploring the Entra Portal .mp4
    04:54
  • 3. Microsoft Entra Permissions Management Settings .mp4
    03:53
  • 4. Onboarding Microsoft Entras Permissions Management .mp4
    07:35
  • 5. Microsoft Entras Dashboard And Analytics .mp4
    08:28
  • 6. Entra Remediation and Autopilot .mp4
    11:08
  • 7. Entra Audit, Reports, and Help .mp4
    05:55
  • 8. Entra Settings, Notifications, and User Management .mp4
    04:23
  • 1. Network Security Groups (NSGs) .mp4
    04:33
  • 2. NSG Rules .mp4
    10:00
  • 3. Creating NSGs .mp4
    09:09
  • 4. NSGs and Service Tags .mp4
    06:05
  • 5. Troubleshooting NSGs .mp4
    07:04
  • 6. Application Security Groups (ASGs) .mp4
    05:28
  • 7. Implementing ASGs .mp4
    06:57
  • 1. Configuring IPSec Encryption over Azure ExpressRoute Pt.1 .mp4
    11:06
  • 2. Configure IPSec Encryption over Azure ExpressRoute Pt.2 .mp4
    08:04
  • 3. Configure Firewall Settings for PaaS Resources .mp4
    09:40
  • 4. Using Network Watcher for Monitoring .mp4
    09:35
  • 5. Using Network Monitor for Network Troubleshooting .mp4
    09:08
  • 6. Network Watcher NSG Flow Logging .mp4
    06:19
  • 1. Virtual WAN and Secured Virtual Hubs .mp4
    05:03
  • 2. Deploying Azure Virtual WAN and Secured Virtual Hubs .mp4
    07:50
  • 3. Connecting VNETs to Secured Virtual Hubs .mp4
    07:25
  • 4. VPN Connectivity Into vWAN .mp4
    02:44
  • 5. Configure P2S VPN .mp4
    10:09
  • 6. Configuring Teleworker To Test P2S VPN .mp4
    09:02
  • 7. Configuring S2S VPN .mp4
    09:23
  • 1. VNET Peering .mp4
    04:42
  • 2. Configure VNET Peering .mp4
    06:20
  • 3. VPN Gateway wUser Defined Routes (UDRs) .mp4
    07:25
  • 4. Configuring VPN Gateways .mp4
    05:04
  • 5. Virtual Network Gateway Peering .mp4
    06:09
  • 6. Creating Route Tables .mp4
    03:47
  • 7. Creating User Defined Routes (UDRs) .mp4
    05:55
  • 8. Testing Our Routing .mp4
    07:06
  • 1. Azure SQL Managed Instances .mp4
    06:37
  • 2. Azure SQL Managed Instance Security Features .mp4
    08:18
  • 3. Create an Azure SQL Managed Instance .mp4
    07:19
  • 4. Implement SQL Auditing .mp4
    04:45
  • 5. Implement Always Encrypt .mp4
    07:01
  • 6. Implement Defender for SQL .mp4
    04:53
  • 7. Implement Dynamic Data Masking .mp4
    05:56
  • 8. Implement Transparent Data Encryption (TDE) .mp4
    03:24
  • 1. Virtual Network Service Endpoint .mp4
    08:54
  • 2. Implementing a Virtual Network Service Endpoint .mp4
    09:33
  • 3. Service Endpoint Policies .mp4
    05:59
  • 4. Private Endpoints .mp4
    06:41
  • 5. Implementing Private Endpoints .mp4
    07:09
  • 6. Private Link Service .mp4
    04:40
  • 7. Implementing Private Link Services .mp4
    12:51
  • 1. Network Integration for Azure App Services and Function Apps .mp4
    08:53
  • 2. Implementing Network Integration for Azure App Services .mp4
    08:48
  • 3. Implementing Two-Way Communications for Our Network Integration .mp4
    08:41
  • 4. App Service Environment Security Features .mp4
    03:48
  • 5. Implementing an ASE App .mp4
    04:52
  • 6. App Service Environment Security Features.mp4
    10:13
  • 1. Planning Custom TLS Certificates for Apps and APIs .mp4
    04:54
  • 2. Implementing Custom TLS Certs for Apps and APIs .mp4
    05:59
  • 3. Azure Firewall Services .mp4
    14:53
  • 4. Deploying an Azure Firewall .mp4
    05:27
  • 5. Configuring a Route Table and VNET Peering .mp4
    08:04
  • 6. Creating Firewall Rules .mp4
    13:56
  • 7. Additional Azure Firewall Features .mp4
    04:29
  • 8. Azure Firewall Manager .mp4
    07:21
  • 1. Planning for an Azure Application Gateway .mp4
    05:02
  • 2. Implementing an Azure Application Gateway .mp4
    12:01
  • 3. Azure Front Door and CDNs .mp4
    07:26
  • 4. Implementing Azure Front Door .mp4
    05:36
  • 5. Azure Web Application Firewall .mp4
    10:45
  • 6. Azure DDoS Protection .mp4
    08:34
  • 1. Introducing SQL Encryption Operations .mp4
    01:25
  • 2. Azure Virtual Machine DIsk Encryption .mp4
    15:39
  • 3. Cell Level Encryption .mp4
    12:47
  • 4. Dynamic Data Masking .mp4
    09:07
  • 5. Transparent Data Encryption .mp4
    08:00
  • 6. AlwaysEncrypted Concepts .mp4
    10:52
  • 1. Introducing SQL Authentication .mp4
    01:23
  • 2. Explore the SQL Architecture .mp4
    13:46
  • 3. Create SQL Logins .mp4
    13:52
  • 4. Create SQL Users .mp4
    14:55
  • 5. Create Azure Active Directory Users .mp4
    10:48
  • 1. Working With Azure Policy .mp4
    11:03
  • 2. Azure Blueprints .mp4
    11:39
  • 3. Azure Landing Zone .mp4
    07:50
  • 4. Implementing Azure Key Vault RBAC .mp4
    09:34
  • 5. Azure Dedicated HSMs .mp4
    03:49
  • 6. Key Rotation Policies .mp4
    05:06
  • 7. Key Vault Backups .mp4
    03:28
  • 1. Secure Score and Inventory .mp4
    13:32
  • 2. Security Frameworks in Defender for Cloud .mp4
    07:28
  • 3. Adding Standards and Custom Initiatives within Defender For Cloud .mp4
    05:49
  • 4. Attack Surface Management .mp4
    06:04
  • 5. Defender for External Attack Surface Management (EASM) .mp4
    14:27
  • 1. Configure Defender for Servers .mp4
    04:48
  • 2. Evaluate Vulnerability Scans from Defender for Servers .mp4
    07:38
  • 3. Planning for Defender for Azure SQL Databases .mp4
    04:31
  • 4. Implementing Defender for Azure SQL Database .mp4
    04:41
  • 5. Intro to Azure Monitor .mp4
    11:13
  • 6. Saving Resource Logs .mp4
    10:10
  • 7. Azure Monitor Alerting .mp4
    10:39
  • 8. Additional Azure Monitor Features .mp4
    05:30
  • 1. Introducing Secure Azure Storage Accounts .mp4
    01:09
  • 2. RBAC .mp4
    12:12
  • 3. Shared Access Signatures .mp4
    12:02
  • 4. Shared Access Keys .mp4
    06:06
  • 5. BYOK .mp4
    10:48
  • 6. Data Protection Settings .mp4
    11:44
  • 7. Storage Account Backups .mp4
    06:48
  • 1. Intro to Microsoft Azure Container Registry .mp4
    09:29
  • 2. Compare Features Across Azure Container Registry SKUs .mp4
    11:18
  • 3. Secure Azure Container Registry With Customer-Managed Key .mp4
    08:08
  • 4. Import Images Into Azure Container Registry With PowerShell .mp4
    08:00
  • 5. Secure Azure Container Registry With Private Link .mp4
    06:08
  • 6. Test ACR Private Link Connectivity From Azure Linux VM .mp4
    08:59
  • 7. Apply Azure Policy Compliance Rules to Container Registry .mp4
    09:54
  • 1. Intro to Microsoft Azure Container Apps .mp4
    11:24
  • 2. Deploy Simple Azure Container App With NGINX .mp4
    09:06
  • 3. Create Azure Container App Revisions and Scale .mp4
    08:39
  • 4. Enable Traffic Splitting for Azure Container App Revisions .mp4
    05:38
  • 5. Build Custom Container Image for Azure Container Apps .mp4
    09:16
  • 6. Deploy Custom Container Image to Azure Container Apps .mp4
    07:22
  • 7. Securely Connect Azure Container Apps to Virtual Network .mp4
    09:43
  • 1. Intro to Securing Azure Kubernetes Service .mp4
    10:09
  • 2. Learn About TLS Encryption Security for Azure AKS .mp4
    07:30
  • 3. Azure Container Image Registry vs. Public Registries .mp4
    08:04
  • 4. AKS Logging and Metrics And Policy Controls .mp4
    08:17
  • 5. What is Kubernetes Network Policy in AKS .mp4
    08:10
  • 6. Deploy the AKS Secure Baseline Network Layer .mp4
    12:16
  • 7. Deploy Azure Container Registry and AKS Cluster .mp4
    10:07
  • 1. Intro to Microsoft Azure Secure Remote Access .mp4
    09:10
  • 2. Create Microsoft Azure Bastion Basic SKU Environment .mp4
    09:47
  • 3. Connect to Windows and Linux VMs With Azure Bastion .mp4
    08:33
  • 4. Use Native RDP Client With Azure Bastion Standard .mp4
    13:13
  • 5. Tunnel Linux SSH Connections with Azure Bastion CLI .mp4
    04:41
  • 6. Temporary VM Access With Microsoft Defender Just-in-Time .mp4
    10:55
  • 1. Intro to Microsoft Azure API Management .mp4
    10:30
  • 2. Deploy Azure API Management Instance .mp4
    09:57
  • 3. Create API Definition With Mock Response .mp4
    07:54
  • 4. Test API Management Mock Endpoints .mp4
    05:38
  • 5. Secure Access to API Management Products with Subscription Keys .mp4
    09:55
  • 6. Delegate Access to APIs With Workspaces and RBAC .mp4
    08:18
  • 1. Intro to Microsoft Azure Kubernetes Service Auth .mp4
    07:50
  • 2. Create AKS Cluster With Azure AD Integration .mp4
    06:40
  • 3. Connect Kubectl to AKS Cluster as Administrative User .mp4
    09:07
  • 4. Create Limited Access Azure AD Dev User and VM .mp4
    09:19
  • 5. Deploy Kubernetes Role and RoleBinding Resources .mp4
    10:50
  • 6. Test Kubernetes Access as Limited Dev User .mp4
    07:47
  • 1. Intro to Networking for Azure Kubernetes .mp4
    10:05
  • 2. Understanding the Azure Container Network Interface (CNI) .mp4
    07:28
  • 3. Deploy AKS Clusters With Kubenet and Azure CNI .mp4
    11:19
  • 4. Explore Kubernetes Pods Running on Azure CNI .mp4
    10:19
  • 5. Expose Pods Running on Kubenet via NodePort Service .mp4
    11:02
  • 1. Intro to Storage Disks in Microsoft Azure .mp4
    09:49
  • 2. Default Disk Encryption for Azure Virtual Machines .mp4
    09:52
  • 3. Enable Customer Managed Key With Disk Encryption Set .mp4
    11:21
  • 4. Understanding Encryption at Host for Azure VMs .mp4
    07:25
  • 5. Evaluate Azure Disk Encryption (ADE) for Block Storage .mp4
    05:31
  • 6. Implement Azure Disk Encryption on Linux VM .mp4
    12:37
  • 1. Intro to Microsoft Azure API Management Policies .mp4
    09:52
  • 2. Using the Set Backend Policy for API Management .mp4
    11:49
  • 3. Rewrite URLs With Azure API Management Policy .mp4
    09:56
  • 4. Apply Rate Limit Policy on Azure API Management .mp4
    09:15
  • 5. Define Ruesable Policy Fragments in Azure API Management .mp4
    07:48
  • Description


    This intermediate Microsoft Azure Security Engineer Associate training prepares learners to take the AZ-500 exam, which is the one required exam to earn the Microsoft Certified: Azure Security Engineer Associate certification.

    As if staying on top of security threats to standard networks wasn’t enough of a challenge, more and more companies are adopting software-defined network solutions, which come with their own collection of challenges. This training is designed to help IT professionals earn their Microsoft Certified: Azure Security Engineer Associate by covering concepts of Azure-based security, like configuring Azure Active Directory, managing AD privileged identity management, configuring encryption for data at rest and using Azure Key Vault, plus much more.

    More details


    For anyone who manages their office's IT training, this Azure Security Engineer Associate training can be used for AZ-500 exam prep, on-boarding new security engineers, or as part of a team training plan.

    Azure Security Engineer Associate: What You Need to Know

    This Microsoft Certified: Azure Security Engineer Associate training maps to the AZ-500 Azure security services exam objectives, and covers topics such as:

    • Securing cloud applications in Azure
    • Implementing resource management security
    • Implementing network security and protection
    • Implementing virtual machine host security
    • Managing identity and access with Active Directory
    • Handling platform protection

    Who Should Take Azure Security Engineer Associate Training?

    This Azure Security Engineer Associate training is considered associate-level Microsoft training, which means it was designed for security engineers. This Azure security services skills course is valuable for new IT professionals with at least a year of experience with Azure and experienced security engineers looking to validate their Microsoft skills.

    New or aspiring security engineers. If you’re a new security engineer, or you have hopes to become one, this training can help you focus and specialize your knowledge and experience in the direction of Microsoft Azure services. Providing security on the cloud, and specifically to Microsoft Azure products, means knowing how to handle security alerts, baselines, policies and configurations for many specific tools — all of which this training can prepare you for.

    Experienced security engineers. If you’ve been working as a security engineer for several years, you might worry that associate-level training and certification may be beneath you. But you’d be mistaken: configuring security for Azure services has many complicated nuances that are often foreign to anyone without specific training. With this training you’ll validate any parts of the job you haven’t been exposed to yet and spring forward to bigger challenges with a firm foundation underneath you.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.

    Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.

    Certifications: Microsoft MCSE, Cisco CCNP, Cisco CCDP, Cisco CCNA Security, CISSP, CCSP, GPEN, CISA, CISM, CompTIA Security+, CompTIA CySA+, CompTIA Pentest+

    Areas of expertise: Information security, networking, active directory, Linux

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 196
    • duration 26:59:35
    • Release Date 2023/08/01

    Courses related to Microsoft Azure

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness