Topics
Skill: Manage Identity and Access
Part 1: Manage Microsoft Entra Identities
Session 1: Securing Microsoft Entra Users and Groups
- Configuring security measures for users and groups
- Best practices for external identity management
Session 2: Implementing Microsoft Entra ID Protection
- Enabling and monitoring identity protection features
- Managing and responding to identity-related threats
Part 2: Manage Microsoft Entra Authentication
Session 3: Implementing Multi-Factor Authentication (MFA)
- Configuring MFA for users and applications
- Monitoring and troubleshooting MFA usage
Session 4: Configuring Advanced Authentication Methods
- Setting up passwordless authentication
- Enabling Microsoft Entra Verified ID
Session 5: Implementing Single Sign-On (SSO)
- Configuring SSO for enterprise applications
Integrating SSO with external identity providers
Part 3: Manage Microsoft Entra Authorization
Session 6: Configuring Role-Based Access
- Assigning built-in roles for Microsoft Entra and Azure
- Creating and managing custom roles
Session 7: Managing Privileged Identity Management (PIM)
- Configuring role assignments and access reviews
Implementing Conditional Access policies for enhanced security
Part 4: Manage Microsoft Entra Application Access
Session 8: Managing Application Access
- Configuring app registrations and permission scopes
- Managing OAuth permissions and service principals
Session 9: Securing Application Proxy and Managed Identities
- Setting up Application Proxy with authentication
- Using managed identities for secure resource access
Skill: Secure Networking
Part 1: Plan and Implement Security for Virtual Networks
Session 10: Configuring Network Security Groups (NSGs) and Application Security Groups (ASGs)
- Planning and implementing NSGs and ASGs for resource isolation
- Monitoring and troubleshooting network security settings
Session 11: Configuring Secure Virtual Network Connectivity
Implementing secured virtual WAN and Virtual Hub configurations
Planning user-defined routes, peering, and VPN gateways
Part 2: Plan and Implement Security for Private Access to Azure Resources
Session 12: Implementing Private Endpoints and Service Endpoints
- Planning private endpoint configurations
- Configuring service endpoints for secure access
Session 13: Securing Network Integration for Azure Services
- Implementing network security for App Services and Azure Functions
Configuring private access for Azure SQL Managed Instances
Part 3: Plan and Implement Security for Public Access to Azure Resources
Session 14: Configuring Security Features for Public Access
- Enabling TLS for Azure App Services and API Management
- Configuring Azure Firewall, Application Gateway, and Front Door
Implementing Web Application Firewall (WAF) and DDoS Protection
Skill: Secure Compute, Storage, and Databases
Part 1: Plan and Implement Advanced Security for Compute
Session 15: Securing Virtual Machines and Kubernetes
- Configuring remote access using Azure Bastion and JIT
- Securing AKS clusters and monitoring security
Session 16: Encrypting Data and Securing Containers
- Configuring Azure Disk Encryption and encryption at host
Managing access and security for Azure Container Registry
Part 2: Plan and Implement Security for Storage
Session 17: Configuring Secure Access to Storage Accounts
- Managing access control for Azure Files, Blobs, Tables, and Queues
- Implementing storage policies, versioning, and soft delete
Session 18: Implementing Advanced Storage Security
- Enabling double encryption and Bring Your Own Key (BYOK)
Configuring immutable storage and lifecycle management
Part 3: Plan and Implement Security for Azure SQL
Session 19: Enabling Advanced Security for Azure SQL
- Implementing Entra database authentication and auditing
- Configuring Transparent Data Encryption (TDE) and Always Encrypted
- Managing data classification and dynamic masking
Skill: Manage Security Operations
Part 1: Plan, Implement, and Manage Governance for Security
Session 20: Configuring Governance Tools
- Creating security policies with Azure Policy and Blueprints
- Configuring secure infrastructures using landing zones
Session 21: Managing Azure Key Vault
- Configuring vault access policies and role-based access
Managing key rotation, backups, and recovery
Part 2: Manage Security Posture with Microsoft Defender for Cloud
Session 22: Enhancing Security Posture
- Using Secure Score and inventory for risk assessment
- Adding regulatory standards and custom initiatives
Session 23: Configuring Threat Protection
- Enabling Microsoft Defender for Servers, Storage, and Databases
- Managing and responding to alerts
Part 3: Configure and Manage Security Monitoring and Automation
Session 24: Monitoring and Automating Security
- Using Azure Monitor and Microsoft Sentinel for event monitoring
- Configuring Sentinel analytics rules and automation
Session 25: Evaluating Vulnerability Scans and Incidents
- Managing vulnerability assessments with Defender for Servers
- Creating workflows for incident response in Microsoft Sentinel