Microsoft Azure Security Technologies – AZ-500T00

  • Home
  • Services
  • Microsoft Azure Security Technologies – AZ-500T00

Microsoft Azure
Security Technologies AZ500

Introduction

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

In this module, you will learn how to secure identities with Azure Active Directory, and implement users and groups.

Lessons

  • Azure Active Directory
  • Users and Groups

Lab : Manage Azure Active Directory Identities

After completing this module, students will be able to:

  • Secure and manage identities with Azure Active Directory.
  • Implement and manage users and groups.

In this module, you will learn about managing your subscriptions and accounts, implementing Azure policies, and using Role-Based Access Control.

Lessons

  • Subscriptions and Accounts
  • Azure Policy
  • Role-based Access Control (RBAC)

Lab : Manage Subscriptions and RBAC

Lab : Manage Governance via Azure Policy

After completing this module, students will be able to:

  • Implement and manage Azure subscriptions and accounts.
  • Implement Azure Policy, including custom policies.
  • Use RBAC to assign permissions.

In this module, you will learn about the tools an Azure Administrator uses to manage their infrastructure. This includes the Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager Templates. This module includes:

Lessons

  • Azure Administrator Tools
  • ARM Templates

Lab : Manage Azure resources by Using the Azure Portal

Lab : Manage Azure resources by Using ARM Templates

Lab : Manage Azure resources by Using Azure PowerShell (optional)

Lab : Manage Azure resources by Using Azure CLI (optional)

After completing this module, students will be able to:

  • Use the Azure Portal and Cloud Shell.
  • Use Azure PowerShell and CLI.
  • Use ARM Templates to deploy resources.

In this module, you will learn about basic virtual networking concepts like virtual networks and subnetting, IP addressing, network security groups, Azure Firewall, and Azure DNS.

Lessons

  • Virtual Networks
  • Network Security groups
  • Azure Firewall
  • Azure DNS

Lab : Implement Virtual Networking

After completing this module, students will be able to:

  • Implement virtual networks and subnets.
  • Configure network security groups.
  • Configure Azure Firewall.
  • Configure private and public DNS zones.

In this module, you will learn about intersite connectivity features including VNet Peering, Virtual Network Gateways, and Site-to-Site Connections.

Lessons

  • VNet Peering
  • VPN Gateway Connections
  • ExpressRoute and Virtual WAN

Lab : Implement Intersite Connectivity

After completing this module, students will be able to:

  • Configure VNet Peering.
  • Configure VPN gateways.
  • Choose the appropriate intersite connectivity solution.

In this module, you will learn about network traffic strategies including network routing and service endpoints, Azure Load Balancer, and Azure Application Gateway.

Lessons

  • Network Routing and Endpoints
  • Azure Load Balancer
  • Azure Application Gateway

Lab : Implement Traffic Management

After completing this module, students will be able to:

  • Configure network routing including custom routes and service endpoints.
  • Configure an Azure Load Balancer.
  • Configure and Azure Application Gateway.
  • Configure Network Watcher.

In this module, you will learn about basic storage features including storage accounts, blob storage, Azure files and File Sync, storage security, and storage tools.

Lessons

  • Storage Accounts
  • Blob Storage
  • Storage Security
  • Azure Files and File Sync
  • Managing Storage

Lab : Manage Azure storage

After completing this module, students will be able to:

  • Create Azure storage accounts.
  • Configure blob containers.
  • Secure Azure storage.
  • Configure Azure files shares and file sync.
  • Manage storage with tools such as Storage Explorer.

In this module, you will learn about Azure virtual machines including planning, creating, availability and extensions.

Lessons

  • Creating Virtual Machines
  • Virtual Machine Availability
  • Virtual Machine Extensions

Lab : Manage virtual machines

After completing this module, students will be able to:

  • Plan for virtual machine implementations.
  • Create virtual machines.
  • Configure virtual machine availability, including scale sets.
  • Use virtual machine extensions.

In this module, you will learn how to administer serverless computing features like Azure App Service, Azure Container Instances, and Kubernetes.

Lessons

  • Azure App Service Plans
  • Azure App Service
  • Container Services
  • Azure Kubernetes Service

Lab : Implement Web Apps

Lab : Implement Azure Container Instances

Lab : Implement Azure Kubernetes Service

After completing this module, students will be able to:

  • Create an app service plan.
  • Create a web app.
  • Implement Azure Container Instances.
  • Implement Azure Kubernetes Service.

In this module, you will learn about backing up files and folders, and virtual machine backups.

Lessons

  • File and Folder Backups
  • Virtual Machine Backups

Lab : Implement Data Protection

After completing this module, students will be able to:

  • Backup and restore file and folders.
  • Backup and restore virtual machines.

In this module, you will learn about monitoring your Azure infrastructure including Azure Monitor, alerting, and log analytics.

Lessons

  • Azure Monitor
  • Azure Alerts
  • Log Analytics

Lab : Implement Monitoring

After completing this module, students will be able to:

  • Use Azure Monitor.
  • Create Azure alerts.
  • Query using Log Analytics.

Audience Profile

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

Outcomes

After completing this course, students will be able to:

Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
Implement perimeter security strategies including Azure Firewall.
Implement network security strategies including Network Security Groups and Application Security Groups.
Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
Implement Azure Key Vault including certificates, keys, and secretes.
Implement application security strategies including app registration, managed identities, and service endpoints.
Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
Implement Azure Monitor including connected sources, log analytics, and alerts.
Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
Implement Azure Sentinel including workbooks, incidents, and playbooks.

Prerequisites

Successful learners will have prior knowledge and understanding of:

Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.

Related trainings

Training Delivery and Pricing

AZ-500T100

4 Day – (32 Hours)

Live Interactive Training via Microsoft Teams

Schedule your training

Contact

  • No 4, De Vos Avenue, Colombo 4, WP 4 Sri Lanka.
  • 077 5 36 67 33
    076 9 24 64 94
  • info@syscare.lk

Brochures

Find Us