Microsoft Azure Security Technologies (AZ-500)

Tijdsduur
Locatie
Op locatie
Startdatum en plaats

Microsoft Azure Security Technologies (AZ-500)

Info Support
Logo van Info Support
Opleiderscore: starstarstarstarstar_border 8,3 Info Support heeft een gemiddelde beoordeling van 8,3 (uit 15 ervaringen)

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Startdata en plaatsen
placeVeenendaal
26 jan. 2026 tot 29 jan. 2026
Toon rooster
event 26 januari 2026, 09:00-16:00, Veenendaal
event 27 januari 2026, 09:00-16:00, Veenendaal
event 28 januari 2026, 09:00-16:00, Veenendaal
event 29 januari 2026, 09:00-16:00, Veenendaal
placeVeenendaal
23 feb. 2026 tot 26 feb. 2026
Toon rooster
event 23 februari 2026, 09:00-16:00, Veenendaal
event 24 februari 2026, 09:00-16:00, Veenendaal
event 25 februari 2026, 09:00-16:00, Veenendaal
event 26 februari 2026, 09:00-16:00, Veenendaal
placeVeenendaal
16 mrt. 2026 tot 19 mrt. 2026
Toon rooster
event 16 maart 2026, 09:00-16:00, Veenendaal
event 17 maart 2026, 09:00-16:00, Veenendaal
event 18 maart 2026, 09:00-16:00, Veenendaal
event 19 maart 2026, 09:00-16:00, Veenendaal
placeVeenendaal
20 apr. 2026 tot 23 apr. 2026
Toon rooster
event 20 april 2026, 09:00-16:00, Veenendaal
event 21 april 2026, 09:00-16:00, Veenendaal
event 22 april 2026, 09:00-16:00, Veenendaal
event 23 april 2026, 09:00-16:00, Veenendaal
Beschrijving

Meer weten over de onderwerpen die aan bod komen en de vereiste voorkennis? Neem vrijblijvend contact met ons op.

Securing the Azure Cloud

Description

You will study at your own pace in our training center, guided by a certified trainer.

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.

After completing this course, students will be able to:

  • Describe specialized data classifications on Azure
  • Identify Azure dat…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Microsoft Azure, IT Beveiliging / Security, Cloud Computing, VMware vCloud en Skype.

Meer weten over de onderwerpen die aan bod komen en de vereiste voorkennis? Neem vrijblijvend contact met ons op.

Securing the Azure Cloud

Description

You will study at your own pace in our training center, guided by a certified trainer.

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.

After completing this course, students will be able to:

  • Describe specialized data classifications on Azure
  • Identify Azure data protection mechanisms
  • Implement Azure data encryption methods
  • Secure Internet protocols and how to implement them on Azure
  • Describe Azure security services and features

This course also prepares for exam MS-500 Microsoft Azure Security Technologies and become Microsoft Certified: Azure Security Engineer Associate

Learning Goals

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks. [Apply]
  • Implementan Entra ID infrastructure including users, groups, and multi-factor authentication. [Apply]
  • Implement Entra ID Identity Protection including risk policies, conditional access, and access reviews. [Apply]
  • Implement Entra ID Connect including authentication methods and on-premises directory synchronization. [Apply]
  • Implement perimeter security strategies including Azure Firewall. [Apply]
  • Implement network security strategies including Network Security Groups and Application Security Groups. [Apply]
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption. [Apply]
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes. [Apply]
  • Implement Azure Key Vault including certificates, keys, and secretes. [Apply]
  • Implement application security strategies including app registration, managed identities, and service endpoints. [Apply]
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication [Apply]
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted. [Apply]
  • Operate Azure Monitor including connected sources, log analytics, and alerts. [Apply]
  • Operate Azure Security Center including policies, recommendations, and just in time virtual machine access. [Apply]
  • Operate Azure Sentinel including workbooks, incidents, and playbooks. [Apply]

Subjects

Module 1: Manage Identity and Access

This module covers Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.

Lessons

  • Azure Active Directory
  • Azure Identity Protection
  • Enterprise Governance
  • Azure AD Privileged Identity Management
  • Hybrid Identity

Lab : Role-Based Access Control Lab : Azure Policy Lab : Resource Manager Locks Lab : MFA, Conditional Access and AAD Identity Protection Lab : Azure AD Privileged Identity Management Lab : Implement Directory Synchronization

After completing this module, students will be able to:

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
  • Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
  • Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
Module 2: Implement Platform Protection

This module covers perimeter, network, host, and container security.

Lessons

  • Perimeter Security
  • Network Security
  • Host Security
  • Container Security

Lab : Network Security Groups and Application Security Groups Lab : Azure Firewall Lab : Configuring and Securing ACR and AKS

After completing this module, students will be able to:

  • Implement perimeter security strategies including Azure Firewall.
  • Implement network security strategies including Network Security Groups and Application Security Groups.
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
Module 3: Secure Data and Applications

This module covers Azure Key Vault, application security, storage security, and SQL database security.

Lessons

  • Azure Key Vault
  • Application Security
  • Storage Security
  • SQL Database Security

Lab : Key Vault (Implementing Secure Data by setting up Always Encrypted) Lab : Securing Azure SQL Database Lab : Service Endpoints and Securing Storage

After completing this module, students will be able to:

  • Implement Azure Key Vault including certificates, keys, and secretes.
  • Implement application security strategies including app registration, managed identities, and service endpoints.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
Module 4: Manage Security Operations

This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.

Lessons

  • Azure Monitor
  • Azure Security Center
  • Azure Sentinel

Lab : Azure Monitor Lab : Azure Security Center Lab : Azure Sentinel

After completing this module, students will be able to:

  • Implement Azure Monitor including connected sources, log analytics, and alerts.
  • Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
  • Implement Azure Sentinel including workbooks, incidents, and playbooks.
Blijf op de hoogte van nieuwe ervaringen
Er zijn nog geen ervaringen.
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)
We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.