AZ-500: Microsoft Azure Security Technologies



-13% Off
Cyber security

Course Curriculum

1.1 Concepts of defense
1.2 Layers of security
1.3 Security requirements and compliance

2.1 Introduction to Azure Active Directory
2.2 Azure AD tenants
2.3 Password reset
2.4 AD Connect and its implementation
2.5 Using AD Connect Health for monitoring
2.6 MFA and SSO
2.7 Protection of identity
2.8 Registration of apps
2.9 Creating service principals
2.10 Privileged Identity Management (PIM)
2.11 RBAC
2.12 Activating a PIM role

3.1 Using portals to build a network
3.2 Utilizing PowerShell and building subnets and VNets
3.3 Connectivity and peering in VNet
3.4 Routing
3.5 DNS: Private and public
3.6 DNS and the Internet
3.7 Network security groups (NSGs)
3.8 Network Watcher
3.9 Building and configuring NSGs
3.10 Services of load balancing in Azure
3.11 Configuring App Gateway
3.12 Azure Firewall and Front Door
3.13 Distributed Denial of Service (DDoS) and its configuration
3.14 Azure Bastion

4.1 Virtual machines (VMs)
4.2 Deploying a VM using PowerShell and the portal
4.3 Zones and sets and their availability
4.4 VM Storage
4.5 Disk caching
4.6 Encryption of disk in Azure
4.7 Key vault creation for disk encryption
4.8 Management of virtual machines
4.9 Azure Security Center

5.1 Installation of Git and Docker
5.2 Azure Kubernetes Service (AKS)
5.3 Building Azure Container Registry
5.4 Developing a Kubernetes cluster
5.5 Using Kubernetes to run applications
5.6 Securing the Container Registry
5.7 Security and scanning of a container

6.1 Implementing RBAC
6.2 Azure Policy
6.3 Implementing Azure Region Policy
6.4 Subscription policies
6.5 Resource locks and their implementation
6.6 Alerts and Azure Monitor
6.7 Log analytics
6.8 Introduction to Azure Security Center
6.9 Preventing, predicting, and responding to threats

7.1 SQL services in Azure
7.2 Developing a SQL database in Azure
7.3 Strategies of caching
7.4 Auditing design
7.5 Long-term retention of SQL backup
7.6 Cosmos DB, along with its levels of consistency
7.7 Data Lake store in Azure
7.8 Data types

8.1 Storage accounts
8.2 Using the portal to build a storage account
8.3 Utilizing Azure Storage and Storage Explorer
8.4 SAS development and management
8.5 Encryption keys

Course Description

Participants who take part in Microsoft Azure Security Technologies AZ-500 training will learn about:

  • How to describe specialized data classifications on Azure
  • Managing Azure identities and access
  • Identifying Azure data protection mechanisms
  • Securing data and applications on Azure
  • Describing Azure security services and features
  • Securing internet protocols and implementing them on Azure


Frequently Asked Questions (FAQs):

CertOcean is offering you the most updated, relevant, and high-value real-world projects as part of the training program. This way, you can implement the learning that you have acquired in real-world industry setup. All training comes with multiple projects that thoroughly test your skills, learning, and practical knowledge, making you completely industry-ready.

You will work on highly exciting projects in the domains of high technology, ecommerce, marketing, sales, networking, banking, insurance, etc. After completing the projects successfully, your skills will be equal to 6 months of rigorous industry experience.

If in any case, you miss a session then you can go through a recorded version of Live session which will be available on your learning portal. We also give you the opportunity to re-take this course FREE for the next 1 year.

All you need is good internet connection ( we recommend 0.5 MB or 512 KB ) with (headset preferably) and leave the rest on us.

Yes, We provide step by step guide to creating a FREE Trial Microsoft AZURE Cloud account using your own login id and password.

Yes, it includes the exam fee

Course Rating