Tags
Language
Tags
April 2025
Su Mo Tu We Th Fr Sa
30 31 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 1 2 3
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Microsoft Azure Security Technologies Course – Az-500

Posted By: ELK1nG
Microsoft Azure Security Technologies Course – Az-500

Microsoft Azure Security Technologies Course – Az-500
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.87 GB | Duration: 23h 33m

Prepare for Microsoft Azure Security Technologies Course – AZ-500 | Labs | 23+ hours + Quiz

What you'll learn

Understand how to secure your Azure resources

Learn how to implement different security solutions to Azure resources

Configure and secure Azure environments

Learn how to create and manage security solutions

In this course you will learn basic and complex security architectures

This course is designed to prepare you for the exam and real life challenges

Requirements

This course is for beginners, students who want to learn core security Azure services and prepare for AZ-500 exam

Description

Welcome to the new course in which we will introduce you to all the necessary resources that will help you prepare for the challenging Microsoft Azure security technologies course, better known as AZ-500.In combination with the official Microsoft Learn and with the help of this course, you will not only familiarize yourself with the necessary things needed to pass the exam itself, but also prepare yourself for further progress and real life opportunities. Also, in this course you can get acquainted with certain services that are better known in other areas of Azure, i.e. certain services that we met while studying and preparing for other exams or certificates. In this course you will learn to create, manage, work with Azure networking resources. Security is an extremely important topic in understanding the Azure cloud, and in this course we start from the very beginning.  It doesn't matter if you are a beginner, or if it is just one of a series of courses that will help you gain the necessary knowledge to obtain a certificate, I will try my best to explain in detail everything that is needed for a given area, as in all my courses, followed by a practical presentation of what is discussed in the theoretical part. Many consider this unnecessary, but you will see for yourself that for a successful passing it is good to know both, the theoretical and practical part. If you think that one of the two parts is too much for you, feel free to skip it and continue with the part that you think is more suitable for you. The choice is exclusively yours, and it is up to me, as the creator of this course, to offer both solutions. Thanks for your understanding and it's time to start the course.

Overview

Section 1: Introduction

Lecture 1 About me

Lecture 2 Introduction

Lecture 3 What is Azure?

Lecture 4 Azure certifications

Lecture 5 How to create Azure free account?

Lecture 6 Tour'd'Azure

Lecture 7 Azure free services

Lecture 8 Why do wee need cloud computing?

Lecture 9 What is a cloud computing?

Section 2: II Secure identity and access

Lecture 10 Few words about Azure Active directory

Lecture 11 What is an Microsoft Entra Id service?

Lecture 12 What is a user in Entra ID service?

Lecture 13 How to create a user in Entra Id service?

Lecture 14 What is a group in Entra Id service?

Lecture 15 How to create a group in Entra Id service?

Lecture 16 What is an Azure resource?

Lecture 17 How to create our first resource?

Lecture 18 What is RBAC?

Lecture 19 Understanding Management group, Subscription, Resource group

Lecture 20 RBAC - subscription level

Lecture 21 RBAC - resource group level

Lecture 22 RBAC - resource level

Lecture 23 Understanding different roles (owner, reader, contributor and user-access admin)

Lecture 24 Is it possible to add multi-role to the user?

Lecture 25 What is a custom role?

Lecture 26 How to create a custom role?

Lecture 27 What is Entra Id role?

Lecture 28 How to add Entra Id role to user?

Lecture 29 How to invite external user?

Lecture 30 Microsoft Entra Id licence and how to assign user to a licence?

Lecture 31 Microsoft Entra dynamic groups

Lecture 32 How to create a dynamic group?

Lecture 33 Microsoft 365 group

Lecture 34 What is MFA?

Lecture 35 Multifactor authentification - sms

Lecture 36 Conditional access

Lecture 37 Conditional access policy - trusted locations

Lecture 38 Passwordless authentification

Lecture 39 Application registration - Entra Id object - calling the Graph API

Lecture 40 Enterprise application

Lecture 41 What is Administrative unit?

Lecture 42 What is Access review?

Lecture 43 How to work with Access review?

Lecture 44 What is Privileged Identity Management (PIM)?

Lecture 45 How to work with Privileged Identity Management (PIM)?

Lecture 46 What is Microsoft Entra Id Connect?

Lecture 47 How to work with Microsoft Entra Id Connect?

Lecture 48 What is Application Proxy?

Lecture 49 More about groups

Lecture 50 M365 - how to restore deleted groups?

Lecture 51 Custom banned passwords

Lecture 52 How to select and edit multiple users with new Edit option in Entra ID service?

Section 3: III Secure networking

Lecture 53 What is Azure virtual network?

Lecture 54 Creating our first virtual network and subnet in Azure

Lecture 55 Deploying a VM to a subnet

Lecture 56 How to install IIS on VM?

Lecture 57 Understanding Network security groups (NSG)

Lecture 58 Creating rules in NSG

Lecture 59 NSG priority rules

Lecture 60 NSG - what to choose subnet or NIC?

Lecture 61 Application security group (ASG)

Lecture 62 What is peering?

Lecture 63 How to create a peering connection?

Lecture 64 User-defined route (UDR)

Lecture 65 What is a Hub and spoke model in Azure?

Lecture 66 Hub and spoke model in Azure

Lecture 67 What is a Point-2-site?

Lecture 68 Point-2-site implementation

Lecture 69 What is Site-2-site?

Lecture 70 Site-2-site implementation

Lecture 71 What is a Vnet-2-Vnet connection?

Lecture 72 Vnet-2-Vnet implementation

Lecture 73 What is Azure virtual WAN?

Lecture 74 What is ExpressRoute?

Lecture 75 Network watcher

Lecture 76 Service endpoint

Lecture 77 Working with storage account and Azure storage explorer

Lecture 78 Understanding databases in Azure

Lecture 79 How to create a Cosmos DB?

Lecture 80 How can we use Cosmos DB and service endpoint?

Lecture 81 What is Azure Key Vault?

Lecture 82 How can we use Azure Key Vault and service endpoint?

Lecture 83 What is Private endpoint?

Lecture 84 Azure web app - private endpoint

Lecture 85 Azure web app - networking

Lecture 86 Azure web app - security

Lecture 87 What is Azure Firewall?

Lecture 88 Azure Firewall - DNAT rules

Lecture 89 Azure Firewall - traffic routing

Lecture 90 Azure Firewall - application rules

Lecture 91 What is Azure Managed instance?

Lecture 92 What is Azure DDOS protection?

Lecture 93 Application gateway

Lecture 94 Azure application gateway - path-based rule

Lecture 95 Azure Front door

Lecture 96 Azure Front door - windows server

Lecture 97 What is Web application firewall (and implementation)?

Section 4: IV Secure compute, storage and databases

Lecture 98 What is Azure SQL database?

Lecture 99 Creating our first SQL database

Lecture 100 Microsoft Entra Id authentification to SQL database

Lecture 101 What is Data Masking?

Lecture 102 Dynamic data masking - implementation

Lecture 103 Azure SQL always encrypted options

Lecture 104 Always encrypted options - implementation

Lecture 105 How to enable database auditing?

Lecture 106 What is transparent data encryption?

Lecture 107 Azure storage service

Lecture 108 What is shared access signature (SAS)?

Lecture 109 Azure storage explorer

Lecture 110 Stored access policies

Lecture 111 Azure file sync

Lecture 112 RBAC and blob service

Lecture 113 Table service - working with SAS

Lecture 114 Queue service - working with Entra Id authentification

Lecture 115 Azure blob - soft delete

Lecture 116 What are containers?

Lecture 117 What is ACI?

Lecture 118 Creating first ACI

Lecture 119 What is ACA?

Lecture 120 Creating first ACA

Lecture 121 What is Azure container registry (ACR)?

Lecture 122 What is Docker?

Lecture 123 How to install Docker and run container on Linux VM?

Lecture 124 What is AKS?

Lecture 125 What is disks in Azure?

Lecture 126 Azure disk encryption types

Section 5: V Secure Azure using Microsoft Defender and Microsoft Sentinel

Lecture 127 How to work with Azure Key Vault?

Lecture 128 Azure storage encryption – customer managed key

Lecture 129 Azure Managed identity

Lecture 130 User-assigned managed identity

Lecture 131 What is Azure policy service?

Lecture 132 Azure policy - remediation

Lecture 133 How to create a custom Azure policy?

Lecture 134 Azure Monitor

Lecture 135 Azure Log analytics

Lecture 136 Azure Log analytics workspace- resource linking

Lecture 137 Microsoft Sentinel

Lecture 138 Microsoft Sentinel - query scheduled rule

Lecture 139 Microsoft defender for cloud

Lecture 140 How to activate trial version for Microsoft defender for cloud?

Lecture 141 Microsoft defender for cloud - recommendations

Lecture 142 Microsoft defender for cloud - regulatory compliance

Lecture 143 Microsoft defender for cloud - servers, storage, databases, containers

Lecture 144 Microsoft defender for cloud - continuous export

Lecture 145 Microsoft defender for cloud - other features

Lecture 146 Microsoft defender for cloud - Just-in-time VM access

Lecture 147 Microsoft defender for cloud - Just-in-time VM request

Lecture 148 Microsoft defender for cloud - final words

Lecture 149 Closing the chapter

Azure beginners, Azure and IT lovers