Azure Security Administration course with SIMULATIONS
Learn how to expertly administer Microsoft Azure Security with lecture and hands on simulations available 24/7
Description
We really hope you'll agree, this training is way more than the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
Welcome to the course
Understanding the Microsoft Environment
Having a Solid Foundation of Active Directory Domains
Having a Solid Foundation of RAS, DMZ, and Virtualization
Having a Solid Foundation of the Microsoft Cloud Services
Questions for John Christopher
Setting up for hands on
IMPORTANT Using Assignments in the course
Creating a free Azure Account
Activating Azure AD P2 license
Azure AD Identity and Access Control Management as part of Microsoft Entra
Concepts behind Azure AD, Azure ADDS and Microsoft Entra
Creating Azure AD users as well as external identities
Using groups for secure identity management
Creating and Configuring administrative units
Using managed identities for securing Azure resources
Concepts of Azure Role Permissions regarding the management hierarchy
Using roles for access management in Azure AD
Creating and understanding custom roles in Azure Active Directory
Just in Time (JIT) administration using Privileged Identity Management (PIM) in Azure AD
Implementing Privileged Identity Management (PIM) in Azure
Understanding PowerShell in use with Microsoft Azure
Important fundamentals of using PowerShell
Getting PowerShell connected to Azure
Managing Azure AD with PowerShell
CloudShell in Azure
Manage secure access by using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
Concepts of the Zero Trust Model in Azure
Concepts of Defense in Depth
Implementing Self Service Password Reset in Azure
Implementing Multi Factor Authentication (MFA)
Protecting accounts using Azure AD Identity Protection
Improving security with access reviews in Azure AD
Using Conditional Access policies
Securing storage accounts in Microsoft Azure
Creating and Configuring a storage account in Azure
Storage account access control
Using access keys in storage accounts
Using Shared Access Signature (SAS) tokens for granting access
Configure stored access policies on storage accounts
Azure Files identity-based authentication for storage accounts
Securing Microsoft Azure Networking
Hybrid Network Security
Creating virtual networks with subnets
Using Network Security Groups (NSGs) and Application Security Groups (ASGs)
Concepts of effective rules in IP filtering with an NSG
Using route tables for directing traffic through the Azure Firewall
Adding an Azure Firewall for security
Configuring Azure DDoS Protection
Understanding Azure Application Gateway vs Azure Front Door
Creating an Azure Application Gateway
Storage account resource firewall settings
Advanced security for virtual machine and container services
Installing Endpoint Protection on virtual machines (VMs) using an extension
Deploying security updates to VMs
Securing container services
Security for serverless compute
Securing Azure App Services
Securing resources using Microsoft Azure policies
Deploying a security policy in Azure
Creating policy initiatives
Deploying an initiative for Azure auditing
Using Microsoft Azure Defender Services
Microsoft Defender for Cloud
Microsoft Defender for Servers
Using active recommendations in Defender for Cloud to find vulnerabilities
Microsoft Defender for SQL
Microsoft Azure Key Vault Management
Azure Key Vault creation
Managing Azure Key Vault access control
Creating Azure Key Vault keys, secrets and certificates
Performing key rotation with Azure Key Vault
Backing up objects in an Azure Key Vault
Configuring database security in Azure
Installing a SQL Database/Server and using SSMS
Managing SQL firewall settings for client connections
Configuring database authentication
Configuring database auditing
Enabling dynamic masking on Azure SQL
Configuring database encryption for Azure SQL
Microsoft Sentinel
Understanding Microsoft Sentinel
Adding a log analytics workspace needed for Microsoft Sentinel
Using Microsoft Sentinel
Microsoft Azure Monitor
Using Azure Monitor to create alerts
Diagnostic logging and log retention in Azure Monitor
Azure Monitor security logging
Finishing Up
Where do I go from here?
What You Will Learn!
- Learn the concepts and perform hands on activities needed to master Microsoft Azure Security
- Gain a tremendous amount of knowledge involving Microsoft Azure Security
- Learn using hands on simulations on how Microsoft Azure Security is administered!
- Learn how to set up your own test lab for practicing the concepts!
Who Should Attend!
- IT people interested in learning a tremendous amount about Microsoft Azure Security