1.1 Concepts of defense
1.2 Layers of security
1.3 Security requirements and compliance
2.1 Introduction to Azure Active Directory
2.2 Azure AD tenants
2.3 Password reset
2.4 AD Connect and its implementation
2.5 Using AD Connect Health for monitoring
2.6 MFA and SSO
2.7 Protection of identity
2.8 Registration of apps
2.9 Creating service principals
2.10 Privileged Identity Management (PIM)
2.11 RBAC
2.12 Activating a PIM role
3.1 Using portals to build a network
3.2 Utilizing PowerShell and building subnets and VNets
3.3 Connectivity and peering in VNet
3.4 Routing
3.5 DNS: Private and public
3.6 DNS and the Internet
3.7 Network security groups (NSGs)
3.8 Network Watcher
3.9 Building and configuring NSGs
3.10 Services of load balancing in Azure
3.11 Configuring App Gateway
3.12 Azure Firewall and Front Door
3.13 Distributed Denial of Service (DDoS) and its configuration
3.14 Azure Bastion
4.1 Virtual machines (VMs)
4.2 Deploying a VM using PowerShell and the portal
4.3 Zones and sets and their availability
4.4 VM Storage
4.5 Disk caching
4.6 Encryption of disk in Azure
4.7 Key vault creation for disk encryption
4.8 Management of virtual machines
4.9 Azure Security Center
5.1 Installation of Git and Docker
5.2 Azure Kubernetes Service (AKS)
5.3 Building Azure Container Registry
5.4 Developing a Kubernetes cluster
5.5 Using Kubernetes to run applications
5.6 Securing the Container Registry
5.7 Security and scanning of a container
6.1 Implementing RBAC
6.2 Azure Policy
6.3 Implementing Azure Region Policy
6.4 Subscription policies
6.5 Resource locks and their implementation
6.6 Alerts and Azure Monitor
6.7 Log analytics
6.8 Introduction to Azure Security Center
6.9 Preventing, predicting, and responding to threats
7.1 SQL services in Azure
7.2 Developing a SQL database in Azure
7.3 Strategies of caching
7.4 Auditing design
7.5 Long-term retention of SQL backup
7.6 Cosmos DB, along with its levels of consistency
7.7 Data Lake store in Azure
7.8 Data types
8.1 Storage accounts
8.2 Using the portal to build a storage account
8.3 Utilizing Azure Storage and Storage Explorer
8.4 SAS development and management
8.5 Encryption keys
Structure your learning and get a certificate to prove it.
Apply NowYou need to make use of role-based access control (RBAC), Azure policy, and other services of Azure to implement resource management in your organization.
As an Azure Security professional, you must configure, secure, and isolate the Azure networks in your company and implement Azure network security for your organization.
Azure professionals are among the highest in-demand cloud professionals in the world today. Top organizations, such as Microsoft, Capgemini, Morgan Stanley, Cognizant, etc are hiring these professionals. The trainers of this AZ-500 online training have at least 8–12 years of working experience in Azure. They aim to make you proficient in Azure and its significant uses.
We will provide you online support throughout the AZ-500 online training, even after you complete the training, wherein our team will clear your doubts. Moreover, we will provide a lifetime free upgrade of the courseware so that you can access the latest version of the technologies. You will also work on industry-specific projects and get job assistance from us. Finally, you will receive Azure Security course completion certification from us once you complete the Azure Security certification training and execute the projects successfully, this exposure helps you to clear your azure security engineer associate certification.
Some of the other related Azure programs are on Microsoft Azure, Azure Fundamentals, Azure Data Engineer, AZ-204, Azure Masters, Azure Solutions Architect, and Azure DevOps.
If you are looking for some free resources on Azure Security Technologies then read our blogs on Interview Questions, Tutorial and everything to know about Microsoft Azure.
At Wisdom Educations, you can enroll in either the instructor-led online training or self-paced training. Apart from this, Wisdom Educations also offers corporate training for organizations to upskill their workforce. All trainers at Wisdom Educations have 12+ years of relevant industry experience, and they have been actively working as consultants in the same domain, which has made them subject matter experts. Go through the sample videos to check the quality of our trainers.
Wisdom Educations is offering the 24/7 query resolution, and you can raise a ticket with the dedicated support team at anytime. You can avail of the email support for all your queries. If your query does not get resolved through email, we can also arrange one-on-one sessions with our trainers. You would be glad to know that you can contact Wisdom Educations support even after the completion of the training. We also do not put a limit on the number of tickets you can raise for query resolution and doubt clearance