Companies Home Search Profile

Microsoft Press- Exam AZ-500 Microsoft Azure Security Technologies

Focused View

8:33:27

97 View
  • 01-Exam AZ-500 Microsoft Azure Security Technologies - Introduction.mp4
    05:34
  • 02-Learning objectives.mp4
    00:56
  • 03-1.1 Create and manage a managed identity for Azure resources.mp4
    08:24
  • 04-1.2 Manage Azure AD groups.mp4
    02:27
  • 05-1.3 Manage Azure AD users.mp4
    02:05
  • 06-1.4 Manage external identities by using Azure AD.mp4
    11:13
  • 07-1.5 Manage administrative units.mp4
    03:35
  • 08-Learning objectives.mp4
    00:45
  • 09-2.1 Configure Azure AD Privileged Identity Management (PIM).mp4
    13:57
  • 10-2.2 Implement Conditional Access policies, including multifactor authentication.mp4
    03:31
  • 11-2.3 Implement Azure AD Identity Protection.mp4
    06:17
  • 12-2.4 Implement passwordless authentication.mp4
    01:51
  • 13-2.5 Configure access reviews.mp4
    06:49
  • 14-Learning objectives.mp4
    00:59
  • 15-3.1 Integrate single sign-on (SSO) and identity providers for authentication.mp4
    10:45
  • 16-3.2 Create an app registration.mp4
    02:40
  • 17-3.3 Configure app registration permission scopes.mp4
    02:24
  • 18-3.4 Manage app registration permission consent.mp4
    01:15
  • 19-3.5 Manage API permissions to Azure subscriptions and resources.mp4
    01:50
  • 20-3.6 Configure an authentication method for a service principal.mp4
    12:11
  • 21-Learning objectives.mp4
    00:48
  • 22-4.1 Configure Azure role permissions for management groups, subscriptions, resource groups, and resources.mp4
    04:11
  • 23-4.2 Interpret role and resource permissions.mp4
    03:39
  • 24-4.3 Assign built-in Azure AD roles.mp4
    07:15
  • 25-4.4 Create and assign custom roles, including Azure roles and Azure AD roles.mp4
    13:11
  • 26-Learning objectives.mp4
    00:40
  • 27-5.1 Secure the connectivity of hybrid networks.mp4
    05:28
  • 28-5.2 Secure the connectivity of virtual networks.mp4
    15:41
  • 29-5.3 Create and configure Azure Firewall.mp4
    02:25
  • 30-5.4 Create and configure Azure Firewall Manager.mp4
    13:31
  • 31-Learning objectives.mp4
    00:40
  • 32-6.1 Create and configure Azure Application Gateway.mp4
    03:26
  • 33-6.2 Create and configure Azure Front Door.mp4
    18:43
  • 34-6.3 Create and configure Web Application Firewall (WAF).mp4
    08:19
  • 35-Learning objectives.mp4
    00:40
  • 36-7.1 Configure a resource firewall, including storage account, Azure SQL, Azure Key Vault, or Azure App Service.mp4
    07:11
  • 37-7.2 Configure network isolation for Web Apps and Azure Functions.mp4
    05:38
  • 38-7.3 Implement Azure service endpoints.mp4
    17:33
  • 39-Learning objectives.mp4
    00:39
  • 40-8.1 Implement Azure Private Endpoints, including integrating with other services.mp4
    07:19
  • 41-8.2 Implement Azure Private Links.mp4
    13:31
  • 42-8.3 Implement Azure DDoS Protection.mp4
    02:59
  • 43-Learning objectives.mp4
    00:32
  • 44-9.1 Configure Azure Endpoint Protection for virtual machines (VMs).mp4
    03:48
  • 45-9.2 Implement and manage security updates for VMs.mp4
    17:11
  • 46-9.3 Configure security for container services.mp4
    03:47
  • 47-9.4 Manage access to Azure Container Registry.mp4
    10:59
  • 48-Learning objectives.mp4
    00:29
  • 49-10.1 Configure security for serverless compute.mp4
    04:57
  • 50-10.2 Configure security for an Azure App Service.mp4
    01:41
  • 51-10.3 Configure encryption at rest.mp4
    03:42
  • 52-10.4 Configure encryption in transit.mp4
    21:55
  • 53-Learning objectives.mp4
    00:34
  • 54-11.1 Configure a custom security policy.mp4
    06:45
  • 55-11.2 Create a policy initiative.mp4
    11:36
  • 56-11.3 Configure security settings and auditing by using Azure Policy.mp4
    11:03
  • 57-Learning objectives.mp4
    00:33
  • 58-12.1 Configure Azure Defender for Servers (not including Microsoft Defender for Endpoint).mp4
    02:54
  • 59-12.2 Evaluate vulnerability scans from Azure Defender.mp4
    02:26
  • 60-12.3 Configure Azure Defender for SQL.mp4
    11:15
  • 61-12.4 Use the Microsoft Threat Modeling Tool.mp4
    10:31
  • 62-Learning objectives.mp4
    00:48
  • 63-13.1 Create and customize alert rules by using Azure Monitor.mp4
    04:20
  • 64-13.2 Configure diagnostic logging and log retention by using Azure Monitor.mp4
    03:27
  • 65-13.3 Monitor security logs by using Azure Monitor.mp4
    20:07
  • 66-13.4 Create and customize alert rules in Azure Sentinel.mp4
    01:50
  • 67-13.5 Configure connectors in Azure Sentinel.mp4
    01:13
  • 68-13.6 Evaluate alerts and incidents in Azure Sentinel.mp4
    07:20
  • 69-Learning objectives.mp4
    00:41
  • 70-14.1 Configure access control for storage accounts.mp4
    02:54
  • 71-14.2 Configure storage account access keys.mp4
    01:23
  • 72-14.3 Configure Azure AD authentication for Azure Storage and Azure Files.mp4
    01:12
  • 73-14.4 Configure delegated access.mp4
    24:09
  • 74-Learning objectives.mp4
    00:57
  • 75-15.1 Enable database authentication by using Azure AD.mp4
    01:43
  • 76-15.2 Enable database auditing.mp4
    12:57
  • 77-15.3 Configure dynamic masking on SQL workloads.mp4
    03:02
  • 78-15.4 Implement database encryption for Azure SQL Database.mp4
    11:52
  • 79-15.5 Implement network isolation for data solutions, including Azure Synapse Analytics and Azure Cosmos DB.mp4
    01:31
  • 80-Learning objectives.mp4
    00:34
  • 81-16.1 Create and configure Key Vault.mp4
    05:53
  • 82-16.2 Configure access to Key Vault.mp4
    02:56
  • 83-16.3 Manage certificates, secrets, and keys.mp4
    13:36
  • 84-16.4 Configure key rotation.mp4
    01:26
  • 85-16.5 Configure backup and recovery of certificates, secrets, and keys.mp4
    05:56
  • 86-Exam AZ-500 Microsoft Azure Security Technologies - Summary.mp4
    02:07
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 86
    • duration 8:33:27
    • English subtitles has
    • Release Date 2023/11/03