Get in Touch

Course Outline

Module 1: Manage Identity and Access

This module addresses Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.

Lessons

  • Azure Active Directory
  • Azure Identity Protection
  • Enterprise Governance
  • Azure AD Privileged Identity Management
  • Hybrid Identity

Lab : Role-Based Access Control

Lab : Azure Policy

Lab : Resource Manager Locks

Lab : MFA, Conditional Access and AAD Identity Protection

Lab : Azure AD Privileged Identity Management

Lab : Implement Directory Synchronization

After completing this module, students will be able to:

  • Implement enterprise governance strategies, including role-based access control, Azure policies, and resource locks.
  • Deploy an Azure AD infrastructure comprising users, groups, and multi-factor authentication.
  • Configure Azure AD Identity Protection, including risk policies, conditional access, and access reviews.
  • Set up Azure AD Privileged Identity Management for Azure AD roles and Azure resources.
  • Implement Azure AD Connect, covering authentication methods and on-premises directory synchronization.

Module 2: Implement Platform Protection

This module covers perimeter, network, host, and container security.

Lessons

  • Perimeter Security
  • Network Security
  • Host Security
  • Container Security

Lab : Network Security Groups and Application Security Groups

Lab : Azure Firewall

Lab : Configuring and Securing ACR and AKS

After completing this module, students will be able to:

  • Deploy perimeter security strategies, such as Azure Firewall.
  • Establish network security strategies, including Network Security Groups and Application Security Groups.
  • Enforce host security strategies, including endpoint protection, remote access management, update management, and disk encryption.
  • Secure container environments, including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.

Module 3: Secure Data and Applications

This module covers Azure Key Vault, application security, storage security, and SQL database security.

Lessons

  • Azure Key Vault
  • Application Security
  • Storage Security
  • SQL Database Security

Lab : Key Vault (Implementing Secure Data by setting up Always Encrypted)

Lab : Securing Azure SQL Database

Lab : Service Endpoints and Securing Storage

After completing this module, students will be able to:

  • Utilize Azure Key Vault for managing certificates, keys, and secrets.
  • Implement application security strategies, including app registration, managed identities, and service endpoints.
  • Secure storage using shared access signatures, blob retention policies, and Azure Files authentication.
  • Secure databases through authentication, data classification, dynamic data masking, and Always Encrypted.

Module 4: Manage Security Operations

This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.

Lessons

  • Azure Monitor
  • Azure Security Center
  • Azure Sentinel

Lab : Azure Monitor

Lab : Azure Security Center

Lab : Azure Sentinel

After completing this module, students will be able to:

  • Deploy Azure Monitor for connected sources, log analytics, and alerts.
  • Configure Azure Security Center with policies, recommendations, and just-in-time virtual machine access.
  • Set up Azure Sentinel, including workbooks, incidents, and playbooks.

Requirements

Successful learners should possess prior knowledge and understanding of:

  • Security best practices and industry security requirements, such as defense in depth, least privilege access, role-based access control, multi-factor authentication, shared responsibility, and the zero trust model.
  • Security protocols, including Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), and disk and data encryption methods.
  • Some experience in deploying Azure workloads. This course does not cover the basics of Azure administration; rather, it builds upon that existing knowledge by adding security-specific information.
  • Experience with Windows and Linux operating systems and scripting languages. Course labs may utilize PowerShell and the CLI.
 28 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories