AZ-500: Implement platform protection
- Offered byMicrosoft
AZ-500: Implement platform protection at Microsoft Overview
Duration | 6 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
AZ-500: Implement platform protection at Microsoft Course details
- Implement perimeter security
- Configure network security
- Configure and manage host security
- Enable Containers security
- Learn how to lock down the infrastructure and network resources that are running in your Azure environment
- This learning path helps prepare you for Exam AZ-500: Microsoft Azure Security Technologies
- Use Azure network capabilities to secure your network and applications from external and internal attacks
- Learn to lock down the devices, virtual machines, and other components that run your applications in Azure
AZ-500: Implement platform protection at Microsoft Curriculum
Implement perimeter security
Introduction
Define defense in depth
Explore virtual network security
Enable Distributed Denial of Service (DDoS) Protection
Configure a distributed denial of service protection implementation
Explore Azure Firewall features
Deploy an Azure Firewall implementation
Configure VPN forced tunneling
Create User Defined Routes and Network Virtual Appliances
Explore hub and spoke topology
Perform try-this exercises
Knowledge check
Summary
Configure network security
Introduction
Explore Network Security Groups (NSG)
Deploy a Network Security Groups implementation
Create Application Security Groups
Enable service endpoints
Configure service endpoint services
Deploy private links
Implement an Azure application gateway
Deploy a web application firewall
Configure and manage Azure front door
Review ExpressRoute
Perform try-this exercises
Knowledge check
Summary
Configure and manage host security
Introduction
Enable endpoint protection
Define a privileged access device strategy
Deploy privileged access workstations
Create virtual machine templates
Enable and secure remote access management
Configure update management
Deploy disk encryption
Deploy and configure Windows Defender
Explore Microsoft Defender for Cloud recommendations
Secure Azure workloads with Azure Security Benchmarks
Perform Try-This exercises
Knowledge check
Summary
Enable Containers security
Introduction
Explore containers
Configure Azure Container Instances security
Manage security for Azure Container Instances (ACI)
Explore the Azure Container Registry (ACR)
Enable Azure Container Registry authentication
Review Azure Kubernetes Service (AKS)
Implement an Azure Kubernetes Service architecture
Configure Azure Kubernetes Service networking
Deploy Azure Kubernetes Service storage
Secure authentication to Azure Kubernetes Service with Active Directory
Manage access to Azure Kubernetes Service using Azure role-based access controls
Knowledge check
Summary