Have a Question About This Course?





    Image

    Microsoft Azure Security Certification Training ( AZ-500 )

    Microsoft Azure Security Certification Training ( AZ-500 ) Certification
    The training course on Microsoft Azure Security Certification equips IT Security Professionals with the essential knowledge and skills required for implementing security controls, upholding an organisation's security stance, and recognising as well as addressing security vulnerabilities. The curriculum encompasses security aspects related to identity and access, platform protection, data and applications, as well as security operations.

    Microsoft Azure Security Certification Training ( AZ-500 ) Information

    • Training Prerequisites
    • Successful learners will have prior knowledge and understanding of the following:
    • Security best practices and industry security requirements include depth defence
    • least privileged access
    • role-based access control
    • multi-factor authentication
    • shared responsibility
    • and zero trust model.
    • Be familiar with security protocols such as Virtual Private Networks (VPN)
    • Internet Security Protocol (IPSec)
    • Secure Socket Layer (SSL)
    • and disk and data encryption methods.
    • Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration. Instead
    • the course content builds on that knowledge by adding security-specific information.
    • Have experience with Windows and Linux operating systems and security-specific. Course labs may use PowerShell and the CLI.
    • Before taking this course
    • attendees should complete
    • Microsoft Azure Administrator Training (AZ-104).
    • Certification Information
    • This course can help you prepare for the following Microsoft role-based certification exam — AZ-500: Microsoft Azure Security Technologies

    Need Assistance Finding the Right Training Solution

    Our Consultants are here to assist you

    Key Point of Training Programs

    We have different work process to go step by step for complete our working process in effective way.
    • Objectives

      Secure identities with Microsoft Entra and users and groups.
      Configure and manage hybrid identity.
      Deploy and maintain identity protection and privileged identity in Azure.
      Design and manage an enterprise governance strategy for your security profile.
      Configure and manage network and perimeter security solutions to protect your Azure environment.
      Manage the security of any hosts and containers running in your environment.
      Deploy and configure Azure Key Vault.
      Implement and manage application security features to lock down application access and functionality.
      Implement and maintain storage and database security.
      Configure Azure Monitor and Microsoft Defender for Clouds to protect and monitor security operations.
      Analyse your security with Microsoft Sentinel.

    • Microsoft Azure Security Certification Training ( AZ-500 ) Delivery Format

      In-Person

      Online

    • Microsoft Azure Security Certification Training ( AZ-500 ) Outline

      Module 1: Manage Identity and Access
      Manage Identities in Microsoft Entra ID
      Manage authentication by using Microsoft Entra ID
      Manage authorisation by using Microsoft Entra ID
      Manage application access in Microsoft Entra ID

      Module 2: Secure Networking
      Plan and Implement Security for Virtual Networks
      Plan and Implement Security for Private Access to Azure Resources
      Plan and Implement Security for Public Access to Azure Resources

      Module 3: Secure Compute, Storage, and Databases
      Plan and Implement Advanced Security for Compute
      Plan and Implement Security for Storage
      Plan and Implement Security for Azure SQL Database and Azure SQL Managed Instance

      Module 4: Manage Security Operations
      Plan, Implement, and Manage Governance for Security
      Configure Data Collection in Azure Monitor
      Manage Security Posture by Using Microsoft Defender for Cloud
      Configure and Manage Threat Protection by Using Microsoft Defender for Cloud
      Configure and Manage Security Monitoring and Automation Solutions