Microsoft Azure Security Technologies certification 2021 : best practice for Microsoft...

Discussion in 'Free Courses - Promo Codes & Deals' started by admin, Apr 21, 2021.

    
  1. admin

    admin Administrator Staff Member


    Description


    The Microsoft Azure Security Technologies certification is mainly targeted to those candidates who want to build their career in Microsoft Azure domain. The Microsoft Certified – Azure Security Engineer Associate exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Microsoft MCA Azure Security Engineer.

    Manage identity and access

    Manage Azure Active Directory identities

    configure security for service principals

    manage Azure AD directory groups

    manage Azure AD users

    manage administrative units

    configure password writeback

    configure authentication methods including password hash and Pass Through Authentication (PTA), OAuth, and passwordless

    transfer Azure subscriptions between Azure AD tenants

    – Configure secure access by using Azure AD

    monitor privileged access for Azure AD Privileged Identity Management (PIM)

    configure Access Reviews

    activate and configure PIM

    implement Conditional Access policies including Multi-Factor Authentication (MFA)

    configure Azure AD identity protection

    – Manage application access

    create App Registration

    configure App Registration permission scopes

    manage App Registration permission consent

    manage API access to Azure subscriptions and resources

    – Manage access control

    configure subscription and resource permissions

    configure resource group permissions

    configure custom RBAC roles

    identify the appropriate role

    – apply principle of least privilege

    interpret permissions

    – check access

    Implement platform protection

    – Implement advanced network security

    secure the connectivity of virtual networks (VPN authentication, Express Route encryption)

    configure Network Security Groups (NSGs) and Application Security Groups (ASGs)

    create and configure Azure Firewall

    implement Azure Firewall Manager

    configure Azure Front Door service as an Application Gateway

    configure a Web Application Firewall (WAF) on Azure Application Gateway

    configure Azure Bastion

    configure a firewall on a storage account, Azure SQL, KeyVault, or App Service

    implement Service Endpoints

    implement DDoS protection

    – Configure advanced security for compute

    configure endpoint protection

    configure and monitor system updates for VMs

    configure authentication for Azure Container Registry

    configure security for different types of container

    – implement vulnerability management

    – configure isolation for AKS

    – configure security for container registry

    implement Azure Disk Encryption

    configure authentication and security for Azure App Service

    – configure SSL/TLS certs

    – configure authentication for Azure Kubernetes Service

    – configure automatic updates

    Manage security operations

    – Monitor security by using Azure Monitor

    create and customize alerts

    monitor security logs by using Azure Monitor

    configure diagnostic logging and log retention

    – Monitor security by using Azure Security Center

    evaluate vulnerability scans from Azure Security Center

    configure Just in Time VM access by using Azure Security Center

    configure centralized policy management by using Azure Security Center

    configure compliance policies and evaluate for compliance by using Azure Security Center

    configure workflow automation by using Azure Security Center

    – Monitor security by using Azure Sentinel

    create and customize alerts

    configure data sources to Azure Sentinel

    evaluate results from Azure Sentinel

    configure a playbook by using Azure Sentinel

    – Configure security policies

    configure security settings by using Azure Policy

    configure security settings by using Azure Blueprint

    Secure data and applications

    – Configure security for storage

    configure access control for storage accounts

    configure key management for storage accounts

    configure Azure AD authentication for Azure Storage

    configure Azure AD Domain Services authentication for Azure Files

    create and manage Shared Access Signatures (SAS

    – create a shared access policy for a blob or blob container

    configure Storage Service Encryption

    configure Azure Defender for Storage

    – Configure security for databases

    enable database authentication

    enable database auditing

    configure Azure Defender for SQL

    – configure Azure SQL Database Advanced Threat Protection

    implement database encryption

    – implement Azure SQL Database Always Encrypted

    – Configure and manage Key Vault

    manage access to Key Vault

    manage permissions to secrets, certificates, and keys

    – configure RBAC usage in Azure Key Vault

    manage certificates

    manage secrets

    configure key rotation

    backup and restore of Key Vault items

    configure Azure Defender for Key Vault

    Who this course is for:

    • All Levels

    Show more

    Instructor


    Zied Zied
    Jakhlouti
    [​IMG]

    • 3.0 Instructor Rating
    • 9 Reviews
    • 4,973 Students
    • 10 Courses

    Ziad Zied is an Analyst at Vermeg

    Vermeg a private Vermeg software company , specializing in investments in technologically oriented companies , Mr Zied Jakhlouti worked as analyst and knowledge manager Vermeg software company ,Ziad Jakhlouti is a software engineer with extensive experience and management skills

    FINALISED project :

    > Study and implementation of a secure local network with

    messaging (Ubuntu 14: Installation and configuration of servers: DNS

    “Bind”, DHCP “DHCP3-server”, Share “SAMBA”, PROXY “Squid3”,

    WEB “Apache2”, Messaging “PostFixe, Squirrelmail”)

    > Design and development of an application for the management of a car rental agency

    > Creation of an E-commerce website

    > Design and development of a referee assignment application

    Continue reading...
     


Share This Page