![AZ-500: Microsoft Azure Security Course](https://www.lsatraining.co.uk/en-uk/wp-content/uploads/2024/06/az-500course.png)
Overview
![Microsoft Azure Security](https://www.lsatraining.co.uk/en-uk/wp-content/uploads/2024/06/az-500course.png)
About Course
Enhance Your Career with Microsoft Azure Security Training from LSA Training!
Are you ready to advance your career in cyber security? LSA Training offers an exclusive Microsoft Azure Security training program designed to equip you with the skills needed to excel in today’s competitive job market. Plus, with placement assistance from our recruitment arm, LSA Recruit, your path to success is clear and achievable.
Our Recruitment company details and open roles:https://lsarecruit.zohorecruit.in/careers
Duration: 1month ( Mon to fri, Sat & Sun 9am to 2pm )
- Course Description
- Course Content
- Labs
- Highlights
Audience Profile:
Candidates for this exam should have subject matter expertise implementing Azure security controls that protect identity, access, data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure. Responsibilities for an Azure Security Engineer include managing the security posture, identifying and remediating vulnerabilities, performing threat modeling, implementing threat protection, and responding to security incident escalations. Azure Security Engineers often serve as part of a larger team to plan and implement cloud-based management and security. Candidates for this exam should have practical experience in administration of Azure and hybrid environments. Candidates should have experience with infrastructure as code, security operations processes, cloud capabilities, and Azure services.
Skills Measured:
NOTE: The bullets that follow each of the skills measured are intended to illustrate how we are assessing that skill. This list is NOT definitive or exhaustive.
NOTE: Most questions cover features that are General Availability (GA). The exam may contain questions on Preview features if those features are commonly used.
Placement assistance program through LSA Recruit:
- Determine the scope of the placement assistance program: The placement assistance program will help LSA Training students find suitable job opportunities in their desired industry sectors and job roles.
- Identify the target audience: The target audience for the placement assistance program will be LSA Training students who have successfully completed their training.
- Develop a database of potential employers: A database of potential employers should be created based on the industry sectors and job roles that are relevant to the students' skills and interests.
- Establish partnerships with employers: Partnerships should be established with potential employers to facilitate the job placement process. This may include establishing direct relationships with employers, attending career fairs, and participating in industry-specific events.
- Develop a candidate profile: A candidate profile should be created that outlines the skills, knowledge, experience, and qualifications of the LSA Training students.
- Provide career advice and coaching: Career advice and coaching services should be provided to the LSA Training students to help them prepare for job interviews, develop resumes, and improve their professional skills.
- Match candidates with potential employers: LSA Recruit should match the LSA Training students with potential employers based on their candidate profile and the requirements of the job vacancies.
- Arrange interviews: LSA Recruit should arrange interviews between the LSA Training students and potential employers.
- Provide feedback to the students: LSA Recruit should provide feedback to the LSA Training students after the interviews to help them improve their job search skills.
- Monitor success rate: The success rate of the placement assistance program should be monitored based on the number of LSA Training students who find employment opportunities and the feedback from both the students and employers.
By following these steps, you can create a comprehensive placement assistance program through LSA Recruit that will help LSA Training students find suitable job opportunities in their desired industry sectors and job roles.
For more details on Recruitment: www.Lsarecruit.co.uk
Contact Us: +44 02039501453
Mail Us: Careers@Lsarecruit.co.uk
Manage Azure Active Directory (Azure AD) identities.
- create and manage a managed identity for Azure resources.
- manage Azure AD groups.
- manage Azure AD users.
- manage external identities by using Azure AD
- manage administrative units.
Manage secure access by using Azure AD
- configure Azure AD Privileged Identity Management (PIM)
- implement Conditional Access policies, including multifactor authentication.
- implement Azure AD Identity Protection
- implement password less authentication.
- configure access reviews.
Manage application access.
- integrate single sign-on (SSO) and identity providers for authentication.
- create an app registration.
- configure app registration permission scopes.
- manage app registration permission consent.
- manage API permissions to Azure subscriptions and resources.
- configure an authentication method for a service principal
Manage access control
- configure Azure role permissions for management groups, subscriptions, resource
- groups, and resources
- interpret role and resource permissions
- assign built-in Azure AD roles
- create and assign custom roles, including Azure roles and Azure AD roles
Implement advanced network security
- secure the connectivity of hybrid networks
- secure the connectivity of virtual networks
- create and configure Azure Firewall
- create and configure Azure Firewall Manager
- create and configure Azure Application Gateway
- create and configure Azure Front Door
- create and configure Web Application Firewall (WAF)
- configure a resource firewall, including storage account, Azure SQL, Azure Key Vault, or Azure App Service
- configure network isolation for Web Apps and Azure Functions
- implement Azure Service Endpoints
- implement Azure Private Endpoints, including integrating with other services
- implement Azure Private Links
- implement Azure DDoS Protection
Configure advanced security for compute
- configure Azure Endpoint Protection for virtual machines (VMs)
- Implement and manage security updates for VMs
- configure security for container services
- manage access to Azure Container Registry
- configure security for serverless compute
- configure security for an Azure App Service
- configure encryption at rest
- configure encryption in transit
Configure centralized policy management
- configure a custom security policy
- create a policy initiative
- configure security settings and auditing by using Azure Policy
Configure and manage threat protection
- configure Azure Defender for Servers (not including Microsoft Defender for Endpoint)
- evaluate vulnerability scans from Azure Defender
- configure Azure Defender for SQL
- use the Microsoft Threat Modeling Tool
Configure and manage security monitoring solutions
- create and customize alert rules by using Azure Monitor
- configure diagnostic logging and log retention by using Azure Monitor
- monitor security logs by using Azure Monitor
- create and customize alert rules in Azure Sentinel
- configure connectors in Azure Sentinel
- evaluate alerts and incidents in Azure Sentinel
Configure security for storage
- configure access control for storage accounts
- configure storage account access keys
- configure Azure AD authentication for Azure Storage and Azure Files
- configure delegated access
Configure security for data
- enable database authentication by using Azure AD
- enable database auditing
- configure dynamic masking on SQL workloads
- implement database encryption for Azure SQL Database
- implement network isolation for data solutions, including Azure Synapse Analytics and Azure Cosmos DB
Configure and manage Azure Key Vault
- create and configure Key Vault
- configure access to Key Vault
- manage certificates, secrets, and keys
- configure key rotation
- configure backup and recovery of certificates, secrets, and keys
Labs:
- Lab 01: Role-Based Access Control
- Lab 02: Network Security Groups and Application Security Groups
- Lab 03: Azure Firewall
- Lab 04: Configuring and Securing ACR and AKS
- Lab 05: Securing Azure SQL Database
- Lab 06: Service Endpoints and Securing Storage
- Lab 07: Key Vault (Implementing Secure Data by setting up Always Encrypted)
- Lab 08: Azure Monitor
- Lab 09: Microsoft Defender for Cloud
- Lab 10: Microsoft Sentinel
Training Highlights
Interactive Learning: Enhanced interaction between students and faculty, as well as among students.
Comprehensive Materials: Detailed presentations with soft copy materials available for reference at any time.
Practical and Job-Oriented Training: Focus on practical skills with hands-on practice using software tools and real-time project scenarios.
Preparation for Interviews: Includes mock interviews, group discussions, and interview-related questions.
Cloud-Based Test Lab: Access to a cloud-based test lab for practicing software tools as needed.
Real-Time Project Domains: Discussions on real-time project domains to provide relevant context and experience.
Current Market Relevance: Teaching methods, tools, and topics are selected based on the current competitive job market.
Additional Course Benefits
Hands-On Experience: Gain practical experience with industry-relevant tools and techniques.
Real-Time Project Work: Work on real-time projects to build your portfolio and practical knowledge.
Interview-Based Training: Tailored training to help you excel in job interviews.
Expected Salary/Pay Package Guidance:
Contractors: £400 to £600 per day, depending on experience and skill set.
Permanent Positions: £50,000 to £100,000 per annum, based on experience and skills.