Durată: 4 zile
Certificare: Azure Security Engineer Associate
This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data.
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.
Secure Azure solutions with Azure Active Directory
Implement Hybrid identity
Deploy Azure AD identity protection
Configure Azure AD privileged identity management
Design an enterprise governance strategy
Implement perimeter security
Configure network security
Configure and manage host security
Enable Containers security
Deploy and secure Azure Key Vault
Configure application security features
Implement storage security
Configure and manage SQL database security
Configure and manage Azure Monitor
Enable and manage Microsoft Defender for Cloud
Configure and monitor Microsoft Sentinel
Secure Azure solutions with Azure Active Directory
Implement Hybrid identity
Deploy Azure AD identity protection
Configure Azure AD privileged identity management
Design an enterprise governance strategy
Implement perimeter security
Configure network security
Configure and manage host security
Enable Containers security
Deploy and secure Azure Key Vault
Configure application security features
Implement storage security
Configure and manage SQL database security
Configure and manage Azure Monitor
Enable and manage Microsoft Defender for Cloud
Configure and monitor Microsoft Sentinel
This Microsoft Official Course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities.