course

NL/EN
This training is available in Dutch and English. More information

Microsoft Azure Security Technologies (AZ-500)

Securing the Azure Cloud

February 10, 2025
- Veenendaal / Remote
4 days
1780 (excl. VAT)

Description

You will study at your own pace in our training center, guided by a certified trainer.

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.

After completing this course, students will be able to:

  • Describe specialized data classifications on Azure
  • Identify Azure data protection mechanisms
  • Implement Azure data encryption methods
  • Secure Internet protocols and how to implement them on Azure
  • Describe Azure security services and features

This course also prepares for exam MS-500 Microsoft Azure Security Technologies and become Microsoft Certified: Azure Security Engineer Associate

Prior Knowledge

Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure

Subjects

Module 1: Manage Identity and Access

This module covers Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.

Lessons

  • Azure Active Directory
  • Azure Identity Protection
  • Enterprise Governance
  • Azure AD Privileged Identity Management
  • Hybrid Identity

Lab : Role-Based Access Control Lab : Azure Policy Lab : Resource Manager Locks Lab : MFA, Conditional Access and AAD Identity Protection Lab : Azure AD Privileged Identity Management Lab : Implement Directory Synchronization

After completing this module, students will be able to:

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
  • Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
  • Implement Azure AD Connect including authentication methods and on-premises directory synchronization.

Module 2: Implement Platform Protection

This module covers perimeter, network, host, and container security.

Lessons

  • Perimeter Security
  • Network Security
  • Host Security
  • Container Security

Lab : Network Security Groups and Application Security Groups Lab : Azure Firewall Lab : Configuring and Securing ACR and AKS

After completing this module, students will be able to:

  • Implement perimeter security strategies including Azure Firewall.
  • Implement network security strategies including Network Security Groups and Application Security Groups.
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.

Module 3: Secure Data and Applications

This module covers Azure Key Vault, application security, storage security, and SQL database security.

Lessons

  • Azure Key Vault
  • Application Security
  • Storage Security
  • SQL Database Security

Lab : Key Vault (Implementing Secure Data by setting up Always Encrypted) Lab : Securing Azure SQL Database Lab : Service Endpoints and Securing Storage

After completing this module, students will be able to:

  • Implement Azure Key Vault including certificates, keys, and secretes.
  • Implement application security strategies including app registration, managed identities, and service endpoints.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.

Module 4: Manage Security Operations

This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.

Lessons

  • Azure Monitor
  • Azure Security Center
  • Azure Sentinel

Lab : Azure Monitor Lab : Azure Security Center Lab : Azure Sentinel

After completing this module, students will be able to:

  • Implement Azure Monitor including connected sources, log analytics, and alerts.
  • Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
  • Implement Azure Sentinel including workbooks, incidents, and playbooks.

Schedule

Start dateDurationLocation
February 10, 2025February 11, 2025February 12, 2025February 13, 2025
4 days
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Sign up
March 17, 2025March 18, 2025March 19, 2025March 20, 2025
4 days
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Sign up
April 14, 2025April 15, 2025April 16, 2025April 17, 2025
4 days
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Veenendaal / Remote
This is a hybrid training and can be followed remotely. More information
Sign up
Keep me posted on new sessions

All courses can also be conducted within your organization as customized or incompany training.

Our training advisors are happy to help you provide personal advice or find Incompany training within your organization.

Certification

The knowledge from this training aligns with these certifications.

"Extremely good teacher"
Sander
  • icon

    Hoge waardering

  • icon

    Praktijkgerichte trainingen

  • icon

    Gecertificeerde trainers

  • icon

    Eigen docenten