Training Content
1
Course - Beginner - 4m
AZ-500 Exam Preparation: Introduction
This introduction to the Microsoft
Azure Security Technologies learning path gives an overview of the requirements
for the Microsoft AZ-500 exam and how they will be covered.
2
Course - Advanced - 1h 41m
Designing for Azure Identity
Management
In this course, you'll learn how to
implement and deploy identity management on Azure to better protect your
organization with this expertly instructed training content.
3
Course - Intermediate - 24m
Implementing Multi-Factor
Authentication on Azure
In this course, you'll learn how to
implement Multi-Factor Authentication on Azure.
4
Course - Intermediate - 41m
Implementing Azure Active Directory
Privileged Identity Management
This course explains what Azure AD
Privileged Identity Management is and what it offers and works through the
deployment of PIM and how it works with multi-factor authentication.
5
Course - Intermediate - 1h
Configuring Azure VM and Container
Security
This course explains how to configure
security for your containers and virtual machines in Microsoft Azure.
6
Course - Beginner - 38m
Managing Azure Subscriptions and
Resource Groups
In this course, you'll learn how to
manage subscriptions and resource groups in Azure.
7
Course - Intermediate - 19m
Managing Role-Based Access Control on
Azure
In this course, you'll learn about
Azure Role-Based Access Control and gain skills to allow you to manage access
to resources in Azure.
8
Hands-on Lab - Beginner - 1h 15m
Manage Access to Azure With
Role-Based Access Control
Learn Role Based access control for
the Microsoft Azure Cloud
9
Course - Intermediate - 55m
Analyzing Resource Utilization on
Azure
This course looks into how to capture
log data and metrics from Azure services and feed this information into different
locations for processing.
10
Hands-on Lab - Beginner - 1h 30m
Monitoring Resources with Azure
Monitor
Learn to leverage Azure Monitor to
diagnose application and infrastructure with logs, query logs with Azure log
queries, and leverage alerts and action groups
11
Course - Beginner - 1h 11m
Managing Azure Data Protection and
Security Compliance
In this course, you'll learn how to
create and manage encryption keys in Azure, prevent and respond to security
threats to Azure resources, and configure access to Azure applications.
12
Hands-on Lab - Beginner - 2h
Secure Your Cloud with Azure Security
Center
Take advantage of automatic security
audits and recommendations to secure your cloud with Azure Security Center in
this Lab.
13
Course - Intermediate - 1h 26m
Implementing Azure Network Security
Through a combination of both theory
and practical demonstrations, this course teaches how to implement Azure
network security.
14
Hands-on Lab - Beginner - 55m
Deploying and Configuring Azure
Firewall
Follow along with this hands-on lab
and learn how to deploy and configure Azure Firewall and create route tables.
15
Course - Intermediate - 1h
Configuring Azure Application and
Data Security
This course covers the protection of
your data from external and internal threats.
16
Hands-on Lab - Advanced - 1h 30m
Best Practices for Deploying SSL/TLS
(Azure Cloud Shell Version)
Learn about SSL/TLS best practices
and a variety of tools in the SSL/TLS toolkit to help ensure your deployments
are configured as you expect them to be.
17
Course - Intermediate - 50m
Microsoft Azure Security Solutions
This course provides you with a basic
understanding of all of the key security options and features available in
Microsoft Azure.
18
Hands-on Lab - Intermediate - 2h
Azure Key Vault and Disk Encryption
Learn about Azure Key Vault to store
keys/secrets used for encrypting an Azure Virtual Machine in a hands-on Lab
environment
19
Course - Beginner - 2m
AZ-500 Exam Preparation: Summary
This brief video provides a review of
what you've learned throughout the Microsoft Azure Security Technologies
learning path.
20
Exam - 2h 30m
Cert Prep: Microsoft Azure Security
Technologies (AZ-500)
Cert Prep: Microsoft Azure Security
Technologies (AZ-500)
8 comments:
https://www.youtube.com/watch?v=t9dDZRFiSJU
https://www.youtube.com/watch?v=Aor5ikbxVJs
https://www.youtube.com/watch?v=RSiYvksk8cY&list=PLhLKc18P9YODINxsjyo_osTnK0jytTC4H
https://www.youtube.com/watch?v=Snzv4JSBdqg
https://www.youtube.com/watch?v=9JKFZMldbJA
https://www.youtube.com/watch?v=4-Ux5CpUK-8
https://www.youtube.com/watch?v=t32lBR6Rfto
<a href="https://azure.microsoft.com/en-us/overview/iot/security/></a>
https://docs.microsoft.com/en-us/learn/modules/azure-well-architected-security/
https://www.youtube.com/watch?v=HxYeH8goDtA
https://azuremarketplace.microsoft.com/en-us/marketplace/consulting-services/bjss.bjss-waf
https://k21academy.com/microsoft-azure/data-engineer/5-pillars-of-azure-well-architected-framework/
https://docs.microsoft.com/en-us/azure/architecture/
https://docs.microsoft.com/en-us/azure/security/fundamentals/best-practices-and-patterns
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/security/security-top-10
https://docs.microsoft.com/en-us/azure/security/
https://docs.microsoft.com/en-us/azure/security/fundamentals/end-to-end
https://docs.microsoft.com/en-us/learn/paths/secure-your-cloud-apps/
https://azure.microsoft.com/en-us/overview/iot/security/
https://www.capgemini.com/2020/10/microsoft-azure-well-architected-framework/
https://www.linkedin.com/pulse/part-12-microsoft-azure-well-architected-framework-sam-fariborz/
https://www.linkedin.com/pulse/part-24-microsoft-azure-well-architected-framework-sam-fariborz/
https://docs.microsoft.com/en-us/learn/roles/security-engineer
https://docs.microsoft.com/en-us/learn/browse/?roles=security-engineer
https://docs.microsoft.com/en-us/learn/certifications/roles/security-engineer
https://docs.microsoft.com/en-us/learn/
https://docs.microsoft.com/en-us/learn/azure/
https://docs.microsoft.com/en-us/learn/modules/secure-your-azure-sql-database/
https://docs.microsoft.com/en-us/learn/certifications/courses/browse/?roles=security-engineer
https://www.youtube.com/watch?v=DU6c12s5660
https://wa.aws.amazon.com/wat.pillar.security.en.html
https://aws.amazon.com/architecture/well-architected/?wa-lens-whitepapers.sort-by=item.additionalFields.sortDate&wa-lens-whitepapers.sort-order=desc
https://aws.amazon.com/blogs/security/how-to-approach-threat-modeling/
https://aws.amazon.com/blogs/security/how-to-approach-threat-modeling/
https://www.youtube.com/watch?v=mYhOiEvk9y4
Post a Comment