Microsoft Azure (AZ-500)
Focused View
25:59:03
9 View
1. Overview.mp4
04:17
2. Create App Registration.mp4
26:42
3. Configure App Registration permission scopes.mp4
24:23
4. Manage App Registration permission consent.mp4
23:03
5. Configure Multi-Factor Authentication settings.mp4
24:02
6. Manage Azure AD directory groups.mp4
25:33
7. Manage Azure AD Users.mp4
22:54
8. Install and Configure Azure AD Connect.mp4
25:55
9. Configure authentication methods.mp4
16:29
10. Implement Conditional Access policies.mp4
22:42
11. Configure Azure AD identity protection.mp4
25:21
12. Activate Privileged Identity Management.mp4
23:20
13. Monitor Privileged Access.mp4
21:38
14. Configure Access Reviews.mp4
25:57
15. Transfer Azure subs between Azure AD tenants.mp4
16:29
16. Manage API access Azure subscriptions, resources.mp4
13:49
17. Configure virtual network connectivity.mp4
25:30
18. Create, Configure Network, App Security Groups.mp4
12:56
19. Steps to Create and Configure NSGs and ASGs.mp4
21:48
20. Create and configure Azure Firewall.mp4
23:37
21. Configure Resource Firewall.mp4
17:44
22. Create and configure Azure Front Door service.mp4
23:53
23. Configure remote access management.mp4
23:54
24. Configure baseline.mp4
25:55
25. Configure endpoint security within the VM.mp4
21:53
26. Configure VM Security and Configure Baseline.mp4
21:49
27. Harden VMs in Azure.mp4
19:42
28. Configure system updates for VMs in Azure.mp4
23:46
29. Configure networking.mp4
22:32
30. Configure authentication.mp4
20:44
31. Configure container isolation.mp4
24:22
32. Configure AKS Security.mp4
23:52
33. Configure container registry.mp4
24:40
34. Implement vulnerability management.mp4
14:50
35. Create Azure resource locks.mp4
22:26
36. Managing security policies, groups, roles, perms.mp4
20:05
37. Configure Azure Monitor.mp4
20:59
38. Configure diagnostic logging and log retention.mp4
24:53
39. Configure vulnerability scanning.mp4
14:33
40. Alerts - create, customize, review and respond.mp4
23:00
41. Configure playbook security event Azure Sentinel.mp4
23:10
42. Investigate escalated security incidents.mp4
20:56
43. Configure data classification.mp4
24:15
44. Configure data retention.mp4
20:35
45. Configure data sovereignty.mp4
19:53
46. Enable database authentication.mp4
20:09
47. Enable database auditing.mp4
13:26
48. Configure Azure SQL Database ATP.mp4
20:26
49. Configure access control for storage accounts.mp4
22:32
50. Configure key management for storage accounts.mp4
25:37
51. Configure Azure AD DS auth for Azure Files.mp4
22:03
52. Create and manage Shared Access Signatures (SAS).mp4
24:22
53. Configure security for HDInsight.mp4
16:01
54. Configure security for Cosmos DB.mp4
19:09
55. Configure security for Azure Data Lake.mp4
20:22
56. Implement Azure SQL DB Always Encrypted.mp4
22:14
57. Implement database encryption.mp4
13:20
58. Implement Storage Service Encryption.mp4
14:09
59. Implement disk encryption.mp4
23:38
60. Configure SSL TLS certs.mp4
22:41
61. Configure Azure services to protect web apps.mp4
19:07
62. Create an application security baseline.mp4
14:57
63. Manage access to Key Vault.mp4
22:59
64. Manage certificates.mp4
22:23
65. Manage secrets.mp4
16:00
66. Configure key rotation.mp4
18:52
67. Spotlight Key Vault Soft Delete, Purge Protection.mp4
23:11
68. Configure security for service principals.mp4
19:57
69. Secure the connectivity of virtual networks.mp4
21:18
70. Configure a WAF on Azure Application Gateway.mp4
24:11
71. Configure Azure Bastion.mp4
22:52
72. Implement Service Endpoints.mp4
17:22
73. Implement DDoS.mp4
21:43
74. Shared access policy for a blob or blob container.mp4
23:16
More details
User Reviews
Rating
average 0
Focused display
Category

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 74
- duration 25:59:03
- Release Date 2024/04/26