Microsoft Azure Security Technologies (AZ-500) (Updated 2022)
Focused View
26:40:12
10 View
1. Overview.mp4
04:40
2. Managed Identity for Azure Resources.mp4
27:29
3. Manage Azure AD Groups.mp4
26:22
4. Manage Azure AD Users.mp4
23:12
5. Manage External Identities Using Azure AD.mp4
17:45
6. Manage Administrative Units.mp4
17:20
7. Configure Azure AD Privileged Identity Management (PIM).mp4
26:33
8. Implement Conditional Access Policies.mp4
27:03
9. Implement Azure AD Identity Protection.mp4
26:21
10. Implement Passwordless Authentication.mp4
16:00
11. Configure Access Reviews.mp4
28:26
12. Integrate Single Sign-On (SSO) & Multiple Identity Providers.mp4
27:25
13. Create an App Registration.mp4
22:17
14. Configure App Registration Permission Scopes.mp4
27:28
15. Manage App Registration Permission Consent.mp4
24:41
16. Manage API Permissions.mp4
16:49
17. Authentication Methods for a Service Principal.mp4
17:54
18. Configure Azure Role Permissions.mp4
22:18
19. Interpret Role & Resource Permissions.mp4
19:52
20. Assign Built-in Azure AD Roles.mp4
18:06
21. Create & Assign Custom Roles.mp4
16:25
22. Secure the Connectivity of Hybrid Networks.mp4
27:02
23. Secure the Connectivity of Virtual Networks.mp4
27:28
24. Create & Configure Azure Firewall.mp4
26:30
25. Create & Configure Azure Firewall Manager.mp4
25:54
26. Create & Configure Azure Application Gateway.mp4
28:51
27. Create & Configure Azure Front Door.mp4
28:09
28. Create & Configure Web Application Firewall (WAF).mp4
25:35
29. Configure a Resource Firewall.mp4
27:36
30. Network Isolation for Web Apps & Azure Functions.mp4
26:03
31. Implement Azure Service Endpoints.mp4
23:34
32. Implement Azure Private Endpoints.mp4
18:38
33. Implement Azure Private Links.mp4
20:16
34. Implement Azure DDoS Protection.mp4
25:45
35. Configure Endpoint Protection for VMs.mp4
25:30
36. Implement & Manage Security Updates for VMs.mp4
26:28
37. Configure Security of Container Services.mp4
22:12
38. Manage Access to Azure Container Registry.mp4
23:56
39. Configure Security for Serverless Compute.mp4
24:11
40. Configure Security for an Azure App Service.mp4
24:58
41. Configure Encryption at Rest.mp4
26:23
42. Configure Encryption in Transit.mp4
11:37
43. Configure a Custom Security Policy.mp4
26:30
44. Create a Policy Initiative.mp4
25:07
45. Using Azure Policy.mp4
23:47
46. Configure Microsoft Defender for Servers.mp4
26:36
47. Evaluate Vulnerability Scans.mp4
27:07
48. Configure Microsoft Defender for SQL.mp4
20:13
49. Microsoft Threat Modeling Tool.mp4
16:30
50. Alert Rules Using Azure Monitor.mp4
28:27
51. Configure Logging for Azure Monitor.mp4
22:56
52. Monitor Security Logs Using Azure Monitor.mp4
22:45
53. Alert Rules in Microsoft Sentinel.mp4
27:39
54. Connectors in Microsoft Sentinel.mp4
24:49
55. Alerts & Incidents in Microsoft Sentinel.mp4
26:13
56. Access Control for Storage Accounts.mp4
27:01
57. Key Management for Access Keys.mp4
23:46
58. Delegated Access.mp4
19:21
59. Configure Azure AD Authentication for Azure Storage & Files.mp4
16:21
60. Database Authentication Using Azure AD.mp4
27:04
61. Enable Database Auditing.mp4
22:04
62. Dynamic Masking on SQL Workloads.mp4
24:26
63. Database Encryption for Azure SQL Database.mp4
22:22
64. Network Isolation for Data Solutions.mp4
25:56
65. Create & Configure Key Vault.mp4
25:31
66. Configure Access to Key Vault.mp4
19:26
67. Manage Certificates & Secrets & Keys.mp4
23:25
68. Configure Key Rotation.mp4
13:06
69. Configure Backup & Recovery.mp4
20:42
More details
User Reviews
Rating
average 0
Focused display
Category

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 69
- duration 26:40:12
- Release Date 2024/04/26