Microsoft Azure Security Technologies Course – Az-500
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.87 GB | Duration: 23h 33m
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.87 GB | Duration: 23h 33m
Prepare for Microsoft Azure Security Technologies Course – AZ-500 | Labs | 23+ hours + Quiz
What you'll learn
Understand how to secure your Azure resources
Learn how to implement different security solutions to Azure resources
Configure and secure Azure environments
Learn how to create and manage security solutions
In this course you will learn basic and complex security architectures
This course is designed to prepare you for the exam and real life challenges
Requirements
This course is for beginners, students who want to learn core security Azure services and prepare for AZ-500 exam
Description
Welcome to the new course in which we will introduce you to all the necessary resources that will help you prepare for the challenging Microsoft Azure security technologies course, better known as AZ-500.In combination with the official Microsoft Learn and with the help of this course, you will not only familiarize yourself with the necessary things needed to pass the exam itself, but also prepare yourself for further progress and real life opportunities. Also, in this course you can get acquainted with certain services that are better known in other areas of Azure, i.e. certain services that we met while studying and preparing for other exams or certificates. In this course you will learn to create, manage, work with Azure networking resources. Security is an extremely important topic in understanding the Azure cloud, and in this course we start from the very beginning. It doesn't matter if you are a beginner, or if it is just one of a series of courses that will help you gain the necessary knowledge to obtain a certificate, I will try my best to explain in detail everything that is needed for a given area, as in all my courses, followed by a practical presentation of what is discussed in the theoretical part. Many consider this unnecessary, but you will see for yourself that for a successful passing it is good to know both, the theoretical and practical part. If you think that one of the two parts is too much for you, feel free to skip it and continue with the part that you think is more suitable for you. The choice is exclusively yours, and it is up to me, as the creator of this course, to offer both solutions. Thanks for your understanding and it's time to start the course.
Overview
Section 1: Introduction
Lecture 1 About me
Lecture 2 Introduction
Lecture 3 What is Azure?
Lecture 4 Azure certifications
Lecture 5 How to create Azure free account?
Lecture 6 Tour'd'Azure
Lecture 7 Azure free services
Lecture 8 Why do wee need cloud computing?
Lecture 9 What is a cloud computing?
Section 2: II Secure identity and access
Lecture 10 Few words about Azure Active directory
Lecture 11 What is an Microsoft Entra Id service?
Lecture 12 What is a user in Entra ID service?
Lecture 13 How to create a user in Entra Id service?
Lecture 14 What is a group in Entra Id service?
Lecture 15 How to create a group in Entra Id service?
Lecture 16 What is an Azure resource?
Lecture 17 How to create our first resource?
Lecture 18 What is RBAC?
Lecture 19 Understanding Management group, Subscription, Resource group
Lecture 20 RBAC - subscription level
Lecture 21 RBAC - resource group level
Lecture 22 RBAC - resource level
Lecture 23 Understanding different roles (owner, reader, contributor and user-access admin)
Lecture 24 Is it possible to add multi-role to the user?
Lecture 25 What is a custom role?
Lecture 26 How to create a custom role?
Lecture 27 What is Entra Id role?
Lecture 28 How to add Entra Id role to user?
Lecture 29 How to invite external user?
Lecture 30 Microsoft Entra Id licence and how to assign user to a licence?
Lecture 31 Microsoft Entra dynamic groups
Lecture 32 How to create a dynamic group?
Lecture 33 Microsoft 365 group
Lecture 34 What is MFA?
Lecture 35 Multifactor authentification - sms
Lecture 36 Conditional access
Lecture 37 Conditional access policy - trusted locations
Lecture 38 Passwordless authentification
Lecture 39 Application registration - Entra Id object - calling the Graph API
Lecture 40 Enterprise application
Lecture 41 What is Administrative unit?
Lecture 42 What is Access review?
Lecture 43 How to work with Access review?
Lecture 44 What is Privileged Identity Management (PIM)?
Lecture 45 How to work with Privileged Identity Management (PIM)?
Lecture 46 What is Microsoft Entra Id Connect?
Lecture 47 How to work with Microsoft Entra Id Connect?
Lecture 48 What is Application Proxy?
Lecture 49 More about groups
Lecture 50 M365 - how to restore deleted groups?
Lecture 51 Custom banned passwords
Lecture 52 How to select and edit multiple users with new Edit option in Entra ID service?
Section 3: III Secure networking
Lecture 53 What is Azure virtual network?
Lecture 54 Creating our first virtual network and subnet in Azure
Lecture 55 Deploying a VM to a subnet
Lecture 56 How to install IIS on VM?
Lecture 57 Understanding Network security groups (NSG)
Lecture 58 Creating rules in NSG
Lecture 59 NSG priority rules
Lecture 60 NSG - what to choose subnet or NIC?
Lecture 61 Application security group (ASG)
Lecture 62 What is peering?
Lecture 63 How to create a peering connection?
Lecture 64 User-defined route (UDR)
Lecture 65 What is a Hub and spoke model in Azure?
Lecture 66 Hub and spoke model in Azure
Lecture 67 What is a Point-2-site?
Lecture 68 Point-2-site implementation
Lecture 69 What is Site-2-site?
Lecture 70 Site-2-site implementation
Lecture 71 What is a Vnet-2-Vnet connection?
Lecture 72 Vnet-2-Vnet implementation
Lecture 73 What is Azure virtual WAN?
Lecture 74 What is ExpressRoute?
Lecture 75 Network watcher
Lecture 76 Service endpoint
Lecture 77 Working with storage account and Azure storage explorer
Lecture 78 Understanding databases in Azure
Lecture 79 How to create a Cosmos DB?
Lecture 80 How can we use Cosmos DB and service endpoint?
Lecture 81 What is Azure Key Vault?
Lecture 82 How can we use Azure Key Vault and service endpoint?
Lecture 83 What is Private endpoint?
Lecture 84 Azure web app - private endpoint
Lecture 85 Azure web app - networking
Lecture 86 Azure web app - security
Lecture 87 What is Azure Firewall?
Lecture 88 Azure Firewall - DNAT rules
Lecture 89 Azure Firewall - traffic routing
Lecture 90 Azure Firewall - application rules
Lecture 91 What is Azure Managed instance?
Lecture 92 What is Azure DDOS protection?
Lecture 93 Application gateway
Lecture 94 Azure application gateway - path-based rule
Lecture 95 Azure Front door
Lecture 96 Azure Front door - windows server
Lecture 97 What is Web application firewall (and implementation)?
Section 4: IV Secure compute, storage and databases
Lecture 98 What is Azure SQL database?
Lecture 99 Creating our first SQL database
Lecture 100 Microsoft Entra Id authentification to SQL database
Lecture 101 What is Data Masking?
Lecture 102 Dynamic data masking - implementation
Lecture 103 Azure SQL always encrypted options
Lecture 104 Always encrypted options - implementation
Lecture 105 How to enable database auditing?
Lecture 106 What is transparent data encryption?
Lecture 107 Azure storage service
Lecture 108 What is shared access signature (SAS)?
Lecture 109 Azure storage explorer
Lecture 110 Stored access policies
Lecture 111 Azure file sync
Lecture 112 RBAC and blob service
Lecture 113 Table service - working with SAS
Lecture 114 Queue service - working with Entra Id authentification
Lecture 115 Azure blob - soft delete
Lecture 116 What are containers?
Lecture 117 What is ACI?
Lecture 118 Creating first ACI
Lecture 119 What is ACA?
Lecture 120 Creating first ACA
Lecture 121 What is Azure container registry (ACR)?
Lecture 122 What is Docker?
Lecture 123 How to install Docker and run container on Linux VM?
Lecture 124 What is AKS?
Lecture 125 What is disks in Azure?
Lecture 126 Azure disk encryption types
Section 5: V Secure Azure using Microsoft Defender and Microsoft Sentinel
Lecture 127 How to work with Azure Key Vault?
Lecture 128 Azure storage encryption – customer managed key
Lecture 129 Azure Managed identity
Lecture 130 User-assigned managed identity
Lecture 131 What is Azure policy service?
Lecture 132 Azure policy - remediation
Lecture 133 How to create a custom Azure policy?
Lecture 134 Azure Monitor
Lecture 135 Azure Log analytics
Lecture 136 Azure Log analytics workspace- resource linking
Lecture 137 Microsoft Sentinel
Lecture 138 Microsoft Sentinel - query scheduled rule
Lecture 139 Microsoft defender for cloud
Lecture 140 How to activate trial version for Microsoft defender for cloud?
Lecture 141 Microsoft defender for cloud - recommendations
Lecture 142 Microsoft defender for cloud - regulatory compliance
Lecture 143 Microsoft defender for cloud - servers, storage, databases, containers
Lecture 144 Microsoft defender for cloud - continuous export
Lecture 145 Microsoft defender for cloud - other features
Lecture 146 Microsoft defender for cloud - Just-in-time VM access
Lecture 147 Microsoft defender for cloud - Just-in-time VM request
Lecture 148 Microsoft defender for cloud - final words
Lecture 149 Closing the chapter
Azure beginners, Azure and IT lovers