Azure Security Administration course with SIMULATIONS

Learn how to expertly administer Microsoft Azure Security with lecture and hands on simulations available 24/7

Ratings: 4.71 / 5.00




Description

We really hope you'll agree, this training is way more than the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Introduction

  • Welcome to the course

  • Understanding the Microsoft Environment

  • Having a Solid Foundation of Active Directory Domains

  • Having a Solid Foundation of RAS, DMZ, and Virtualization

  • Having a Solid Foundation of the Microsoft Cloud Services

  • Questions for John Christopher

Setting up for hands on

  • IMPORTANT Using Assignments in the course

  • Creating a free Azure Account

  • Activating Azure AD P2 license

Azure AD Identity and Access Control Management as part of Microsoft Entra

  • Concepts behind Azure AD, Azure ADDS and Microsoft Entra

  • Creating Azure AD users as well as external identities

  • Using groups for secure identity management

  • Creating and Configuring administrative units

  • Using managed identities for securing Azure resources

  • Concepts of Azure Role Permissions regarding the management hierarchy

  • Using roles for access management in Azure AD

  • Creating and understanding custom roles in Azure Active Directory

  • Just in Time (JIT) administration using Privileged Identity Management (PIM) in Azure AD

  • Implementing Privileged Identity Management (PIM) in Azure

Understanding PowerShell in use with Microsoft Azure

  • Important fundamentals of using PowerShell

  • Getting PowerShell connected to Azure

  • Managing Azure AD with PowerShell

  • CloudShell in Azure

Manage secure access by using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra

  • Concepts of the Zero Trust Model in Azure

  • Concepts of Defense in Depth

  • Implementing Self Service Password Reset in Azure

  • Implementing Multi Factor Authentication (MFA)

  • Protecting accounts using Azure AD Identity Protection

  • Improving security with access reviews in Azure AD

  • Using Conditional Access policies

Securing storage accounts in Microsoft Azure

  • Creating and Configuring a storage account in Azure

  • Storage account access control

  • Using access keys in storage accounts

  • Using Shared Access Signature (SAS) tokens for granting access

  • Configure stored access policies on storage accounts

  • Azure Files identity-based authentication for storage accounts

Securing Microsoft Azure Networking

  • Hybrid Network Security

  • Creating virtual networks with subnets

  • Using Network Security Groups (NSGs) and Application Security Groups (ASGs)

  • Concepts of effective rules in IP filtering with an NSG

  • Using route tables for directing traffic through the Azure Firewall

  • Adding an Azure Firewall for security

  • Configuring Azure DDoS Protection

  • Understanding Azure Application Gateway vs Azure Front Door

  • Creating an Azure Application Gateway

  • Storage account resource firewall settings

Advanced security for virtual machine and container services

  • Installing Endpoint Protection on virtual machines (VMs) using an extension

  • Deploying security updates to VMs

  • Securing container services

  • Security for serverless compute

  • Securing Azure App Services

Securing resources using Microsoft Azure policies

  • Deploying a security policy in Azure

  • Creating policy initiatives

  • Deploying an initiative for Azure auditing

Using Microsoft Azure Defender Services

  • Microsoft Defender for Cloud

  • Microsoft Defender for Servers

  • Using active recommendations in Defender for Cloud to find vulnerabilities

  • Microsoft Defender for SQL

Microsoft Azure Key Vault Management

  • Azure Key Vault creation

  • Managing Azure Key Vault access control

  • Creating Azure Key Vault keys, secrets and certificates

  • Performing key rotation with Azure Key Vault

  • Backing up objects in an Azure Key Vault

Configuring database security in Azure

  • Installing a SQL Database/Server and using SSMS

  • Managing SQL firewall settings for client connections

  • Configuring database authentication

  • Configuring database auditing

  • Enabling dynamic masking on Azure SQL

  • Configuring database encryption for Azure SQL

Microsoft Sentinel

  • Understanding Microsoft Sentinel

  • Adding a log analytics workspace needed for Microsoft Sentinel

  • Using Microsoft Sentinel

Microsoft Azure Monitor

  • Using Azure Monitor to create alerts

  • Diagnostic logging and log retention in Azure Monitor

  • Azure Monitor security logging

Finishing Up

  • Where do I go from here?

What You Will Learn!

  • Learn the concepts and perform hands on activities needed to master Microsoft Azure Security
  • Gain a tremendous amount of knowledge involving Microsoft Azure Security
  • Learn using hands on simulations on how Microsoft Azure Security is administered!
  • Learn how to set up your own test lab for practicing the concepts!

Who Should Attend!

  • IT people interested in learning a tremendous amount about Microsoft Azure Security