Microsoft AZ-500 - Azure Security Engineer Associate

dkmdkm

U P L O A D E R
af0631b21bffbcdc6ec615152e8c8bea.avif

Free Download Microsoft AZ-500 - Azure Security Engineer Associate
Published: 3/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 19h 47m | Size: 6.38 GB
Pass AZ-500 | Elevate your Career

What you'll learn
Manage Microsoft Entra identities
Manage Microsoft Entra authentication
Manage Microsoft Entra authorization
Manage Microsoft Entra application access
Plan and implement security for virtual networks
Plan and implement security for private access to Azure resources
Plan and implement security for public access to Azure resources
Plan and implement advanced security for compute
Plan and implement security for storage
Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
Plan, implement, and manage governance for security
Manage security posture by using Microsoft Defender for Cloud
Configure and manage threat protection by using Microsoft Defender for Cloud
Configure and manage security monitoring and automation solutions
Requirements
Basic IT Knowledge
Willingness to learn cool stuff!
Description
This AZ-500 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the Microsoft AZ-500: Microsoft Azure Security Engineer Associate exam. This course systematically guides you from the basics to advanced concepts of Azure Security.By mastering Azure Security, you're developing expertise in essential topics in today's cybersecurity landscape.The course is always aligned with Microsoft's latest study guide and exam objectives:Manage identity and access (25-30%)Manage Microsoft Entra identitiesSecure Microsoft Entra usersSecure Microsoft Entra groupsRecommend when to use external identitiesSecure external identitiesImplement Microsoft Entra ID ProtectionManage Microsoft Entra authenticationImplement multi-factor authentication (MFA)Configure Microsoft Entra Verified IDImplement passwordless authenticationImplement password protectionImplement single sign-on (SSO)Integrate single sign on (SSO) and identity providersRecommend and enforce modern authentication methodsManage Microsoft Entra authorizationConfigure Azure role permissions for management groups, subscriptions, resource groups, and resourcesAssign Microsoft Entra built-in rolesAssign Azure built-in rolesCreate and assign custom roles, including Azure roles and Microsoft Entra rolesImplement and manage Microsoft Entra Permissions ManagementConfigure Microsoft Entra Privileged Identity ManagementConfigure role management and access reviews in Microsoft EntraImplement Conditional Access policiesManage Microsoft Entra application accessManage access to enterprise applications in Microsoft Entra ID, including OAuth permission grantsManage Microsoft Entra app registrationsConfigure app registration permission scopesManage app registration permission consentManage and use service principalsManage managed identities for Azure resourcesRecommend when to use and configure an Microsoft Entra Application Proxy, including authenticationSecure networking (20-25%)Plan and implement security for virtual networksPlan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)Plan and implement user-defined routes (UDRs)Plan and implement Virtual Network peering or VPN gatewayPlan and implement Virtual WAN, including secured virtual hubSecure VPN connectivity, including point-to-site and site-to-siteImplement encryption over ExpressRouteConfigure firewall settings on PaaS resourcesMonitor network security by using Network Watcher, including NSG flow loggingPlan and implement security for private access to Azure resourcesPlan and implement virtual network Service EndpointsPlan and implement Private EndpointsPlan and implement Private Link servicesPlan and implement network integration for Azure App Service and Azure FunctionsPlan and implement network security configurations for an App Service Environment (ASE)Plan and implement network security configurations for an Azure SQL Managed InstancePlan and implement security for public access to Azure resourcesPlan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API ManagementPlan, implement, and manage an Azure Firewall, including Azure Firewall Manager and firewall policiesPlan and implement an Azure Application GatewayPlan and implement an Azure Front Door, including Content Delivery Network (CDN)Plan and implement a Web Application Firewall (WAF)Recommend when to use Azure DDoS Protection StandardSecure compute, storage, and databases (20-25%)Plan and implement advanced security for computePlan and implement remote access to public endpoints, including Azure Bastion and just-in-time (JIT) virtual machine Configure disk encryption, including Azure Disk Encryption (ADE), encryption at host, and confidential disk encryptionRecommend security configurations for Azure API ManagementPlan and implement security for storageConfigure access control for storage accountsManage life cycle for storage account access keysSelect and configure an appropriate method for access to Azure FilesSelect and configure an appropriate method for access to Azure Blob StorageSelect and configure an appropriate method for access to Azure TablesSelect and configure an appropriate method for access to Azure QueuesSelect and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storageConfigure Bring your own key (BYOK)Enable double encryption at the Azure Storage infrastructure levelPlan and implement security for Azure SQL Database and Azure SQL Managed InstanceEnable Microsoft Entra database authenticationEnable database auditingIdentify use cases for the Microsoft Purview governance portalImplement data classification of sensitive information by using the Microsoft Purview governance portalPlan and implement dynamic maskingImplement Transparent Data Encryption (TDE)Recommend when to use Azure SQL Database Always EncryptedManage security operations (25-30%)Plan, implement, and manage governance for securityCreate, assign, and interpret security policies and initiatives in Azure PolicyConfigure security settings by using Azure BlueprintsDeploy secure infrastructures by using a landing zoneCreate and configure an Azure Key VaultRecommend when to use a dedicated Hardware Security Module (HSM)Configure access to Key Vault, including vault access policies and Azure Role Based Access ControlManage certificates, secrets, and keysConfigure key rotationConfigure backup and recovery of certificates, secrets, and keysManage security posture by using Microsoft Defender for CloudIdentify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and InventoryAssess compliance against security frameworks by using Microsoft Defender for CloudAdd industry and regulatory standards to Microsoft Defender for CloudAdd custom initiatives to Microsoft Defender for CloudConnect hybrid cloud and multi-cloud environments to Microsoft Defender for CloudIdentify and monitor external assets by using Microsoft Defender External Attack Surface ManagementConfigure and manage threat protection by using Microsoft Defender for CloudEnable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, and Resource ManagerConfigure Microsoft Defender for ServersConfigure Microsoft Defender for Azure SQL DatabaseManage and respond to security alerts in Microsoft Defender for CloudConfigure workflow automation by using Microsoft Defender for CloudEvaluate vulnerability scans from Microsoft Defender for ServerConfigure and manage security monitoring and automation solutionsMonitor security events by using Azure MonitorConfigure data connectors in Microsoft SentinelCreate and customize analytics rules in Microsoft SentinelEvaluate alerts and incidents in Microsoft SentinelConfigure automation in Microsoft Sentinel
Who this course is for
SOC Analyst
Security Engineer
Security Consultant
Security Architect
Security Manager
Cloud Engineer
Cloud Architect
IT Manager
CISO
Homepage:
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar

9b3dfc6fdd730da8d78e57fcfb1d209a.jpg

Microsoft AZ-500: Azure Security Engineer Associate
Published 3/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 19h 47m | Size: 6.38 GB​

Pass AZ-500 | Elevate your Career

What you'll learn
Manage Microsoft Entra identities
Manage Microsoft Entra authentication
Manage Microsoft Entra authorization
Manage Microsoft Entra application access
Plan and implement security for virtual networks
Plan and implement security for private access to Azure resources
Plan and implement security for public access to Azure resources
Plan and implement advanced security for compute
Plan and implement security for storage
Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
Plan, implement, and manage governance for security
Manage security posture by using Microsoft Defender for Cloud
Configure and manage threat protection by using Microsoft Defender for Cloud
Configure and manage security monitoring and automation solutions
Requirements
Basic IT Knowledge
Willingness to learn cool stuff!
Description
This AZ-500 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the Microsoft AZ-500: Microsoft Azure Security Engineer Associate exam. This course systematically guides you from the basics to advanced concepts of Azure Security.By mastering Azure Security, you're developing expertise in essential topics in today's cybersecurity landscape.The course is always aligned with Microsoft's latest study guide and exam objectives:Manage identity and access (25-30%)Manage Microsoft Entra identitiesSecure Microsoft Entra usersSecure Microsoft Entra groupsRecommend when to use external identitiesSecure external identitiesImplement Microsoft Entra ID ProtectionManage Microsoft Entra authenticationImplement multi-factor authentication (MFA)Configure Microsoft Entra Verified IDImplement passwordless authenticationImplement password protectionImplement single sign-on (SSO)Integrate single sign on (SSO) and identity providersRecommend and enforce modern authentication methodsManage Microsoft Entra authorizationConfigure Azure role permissions for management groups, subscriptions, resource groups, and resourcesAssign Microsoft Entra built-in rolesAssign Azure built-in rolesCreate and assign custom roles, including Azure roles and Microsoft Entra rolesImplement and manage Microsoft Entra Permissions ManagementConfigure Microsoft Entra Privileged Identity ManagementConfigure role management and access reviews in Microsoft EntraImplement Conditional Access policiesManage Microsoft Entra application accessManage access to enterprise applications in Microsoft Entra ID, including OAuth permission grantsManage Microsoft Entra app registrationsConfigure app registration permission scopesManage app registration permission consentManage and use service principalsManage managed identities for Azure resourcesRecommend when to use and configure an Microsoft Entra Application Proxy, including authenticationSecure networking (20-25%)Plan and implement security for virtual networksPlan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)Plan and implement user-defined routes (UDRs)Plan and implement Virtual Network peering or VPN gatewayPlan and implement Virtual WAN, including secured virtual hubSecure VPN connectivity, including point-to-site and site-to-siteImplement encryption over ExpressRouteConfigure firewall settings on PaaS resourcesMonitor network security by using Network Watcher, including NSG flow loggingPlan and implement security for private access to Azure resourcesPlan and implement virtual network Service EndpointsPlan and implement Private EndpointsPlan and implement Private Link servicesPlan and implement network integration for Azure App Service and Azure FunctionsPlan and implement network security configurations for an App Service Environment (ASE)Plan and implement network security configurations for an Azure SQL Managed InstancePlan and implement security for public access to Azure resourcesPlan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API ManagementPlan, implement, and manage an Azure Firewall, including Azure Firewall Manager and firewall policiesPlan and implement an Azure Application GatewayPlan and implement an Azure Front Door, including Content Delivery Network (CDN)Plan and implement a Web Application Firewall (WAF)Recommend when to use Azure DDoS Protection StandardSecure compute, storage, and databases (20-25%)Plan and implement advanced security for computePlan and implement remote access to public endpoints, including Azure Bastion and just-in-time (JIT) virtual machine Configure disk encryption, including Azure Disk Encryption (ADE), encryption at host, and confidential disk encryptionRecommend security configurations for Azure API ManagementPlan and implement security for storageConfigure access control for storage accountsManage life cycle for storage account access keysSelect and configure an appropriate method for access to Azure FilesSelect and configure an appropriate method for access to Azure Blob StorageSelect and configure an appropriate method for access to Azure TablesSelect and configure an appropriate method for access to Azure QueuesSelect and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storageConfigure Bring your own key (BYOK)Enable double encryption at the Azure Storage infrastructure levelPlan and implement security for Azure SQL Database and Azure SQL Managed InstanceEnable Microsoft Entra database authenticationEnable database auditingIdentify use cases for the Microsoft Purview governance portalImplement data classification of sensitive information by using the Microsoft Purview governance portalPlan and implement dynamic maskingImplement Transparent Data Encryption (TDE)Recommend when to use Azure SQL Database Always EncryptedManage security operations (25-30%)Plan, implement, and manage governance for securityCreate, assign, and interpret security policies and initiatives in Azure PolicyConfigure security settings by using Azure BlueprintsDeploy secure infrastructures by using a landing zoneCreate and configure an Azure Key VaultRecommend when to use a dedicated Hardware Security Module (HSM)Configure access to Key Vault, including vault access policies and Azure Role Based Access ControlManage certificates, secrets, and keysConfigure key rotationConfigure backup and recovery of certificates, secrets, and keysManage security posture by using Microsoft Defender for CloudIdentify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and InventoryAssess compliance against security frameworks by using Microsoft Defender for CloudAdd industry and regulatory standards to Microsoft Defender for CloudAdd custom initiatives to Microsoft Defender for CloudConnect hybrid cloud and multi-cloud environments to Microsoft Defender for CloudIdentify and monitor external assets by using Microsoft Defender External Attack Surface ManagementConfigure and manage threat protection by using Microsoft Defender for CloudEnable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, and Resource ManagerConfigure Microsoft Defender for ServersConfigure Microsoft Defender for Azure SQL DatabaseManage and respond to security alerts in Microsoft Defender for CloudConfigure workflow automation by using Microsoft Defender for CloudEvaluate vulnerability scans from Microsoft Defender for ServerConfigure and manage security monitoring and automation solutionsMonitor security events by using Azure MonitorConfigure data connectors in Microsoft SentinelCreate and customize analytics rules in Microsoft SentinelEvaluate alerts and incidents in Microsoft SentinelConfigure automation in Microsoft Sentinel
Who this course is for
SOC Analyst
Security Engineer
Security Consultant
Security Architect
Security Manager
Cloud Engineer
Cloud Architect
IT Manager
CISO

Homepage
Bitte Anmelden oder Registrieren um Links zu sehen.


eTrI2rzS_o.jpg



TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar
537368816_que-es-udemy-analisis-opiniones.jpg

6.37 GB | 19min 31s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
1 -Welcome.mp4 (15.45 MB)
2 -Slides.mp4 (11.62 MB)
1 -Application Identities & Application Registrations.mp4 (9 MB)
2 -Demo Create an Application Registration.mp4 (17.32 MB)
3 -Demo App Authentication.mp4 (21.27 MB)
4 -Demo App API Permissions.mp4 (20.83 MB)
5 -Entra Application Proxy.mp4 (28.95 MB)
1 -Azure Virtual Networks (VNets).mp4 (27.65 MB)
10 -VNet Peering.mp4 (30.52 MB)
11 -Demo Configure VNet Peering.mp4 (17.01 MB)
12 -VPN in Azure.mp4 (20.7 MB)
13 -Demo Configure S2S VPN.mp4 (26.4 MB)
14 -Resource Firewalls.mp4 (12.17 MB)
15 -Demo Configure a Resource Firewall.mp4 (32.4 MB)
2 -Demo Configure a VNet.mp4 (23.5 MB)
3 -Demo NAT Gateway.mp4 (27.33 MB)
4 -Network Security Groups (NSGs).mp4 (35.34 MB)
5 -Demo Configure NSGs.mp4 (64.04 MB)
6 -Application Security Groups (ASGs).mp4 (29.6 MB)
7 -Demo Configure ASGs.mp4 (18.22 MB)
8 -User Defined Routing (UDR).mp4 (17.94 MB)
9 -Demo Configure UDR.mp4 (18.91 MB)
1 -Service Endpoints.mp4 (15.83 MB)
2 -Azure Private Link.mp4 (12.76 MB)
3 -Demo Service & Private Endpoints.mp4 (19.76 MB)
4 -Express Route & Private Link.mp4 (12.42 MB)
5 -Azure App Service.mp4 (27.95 MB)
6 -Demo Azure App Service.mp4 (21.71 MB)
7 -Azure App Service Environments (ASE).mp4 (12.14 MB)
8 -Demo ASE.mp4 (15.32 MB)
1 -Azure Firewall.mp4 (36.52 MB)
10 -Demo Configure an Azure WAF.mp4 (48.99 MB)
11 -Azure DDoS Protection.mp4 (63.37 MB)
12 -Demo Configure DDoS Protection.mp4 (20.63 MB)
2 -Demo Azure Firewall.mp4 (141.44 MB)
3 -Azure Load Balancer.mp4 (9.46 MB)
4 -Demo Configure an Azure Load Balancer.mp4 (77.36 MB)
5 -Azure Application Gateway.mp4 (12.25 MB)
6 -Demo Configure an Azure Application Gateway.mp4 (31.45 MB)
7 -Azure Front Door.mp4 (20.49 MB)
8 -Demo Configure Front Door.mp4 (16.75 MB)
9 -Azure Web Application Firewall (WAF).mp4 (38.49 MB)
1 -Azure Compute Services.mp4 (13.89 MB)
10 -Demo Configure Confidential Disk Encryption.mp4 (15.69 MB)
2 -Azure Virtual Machines (VMs).mp4 (16.04 MB)
3 -Demo Configure Azure VMs.mp4 (82.4 MB)
4 -Disk Encryption Options in Azure.mp4 (20.75 MB)
5 -Azure Disk Encryption (ADE).mp4 (7.8 MB)
6 -Demo Configure ADE.mp4 (9.7 MB)
7 -Encryption at Host.mp4 (5.93 MB)
8 -Demo Encryption at Host.mp4 (30.71 MB)
9 -Confidential Disk Encryption.mp4 (9.18 MB)
1 -Azure Storage Services.mp4 (32.29 MB)
2 -Demo Azure Storage Account.mp4 (46.2 MB)
3 -Authentication and Authorization for Azure Storage.mp4 (12 MB)
4 -Storage Account Access Keys.mp4 (17.58 MB)
5 -Demo Storage Account Access Keys.mp4 (11.75 MB)
6 -Shared Access Signatures (SAS).mp4 (11.02 MB)
7 -Demo Shared Access Signatures (SAS).mp4 (21.49 MB)
1 -Azure SQL.mp4 (10.61 MB)
2 -Demo Azure SQL Database.mp4 (28.27 MB)
3 -Azure SQL Transparent Data Encryption (TDE).mp4 (21.92 MB)
4 -Demo Configure TDE.mp4 (6.51 MB)
5 -Azure SQL Always Encrypted.mp4 (21.63 MB)
6 -Demo Configure Always Encrypted.mp4 (5.86 MB)
7 -Azure SQL Dynamic Data Masking.mp4 (18 MB)
1 -Azure Policy.mp4 (15.11 MB)
2 -Azure Policy Effects.mp4 (9.64 MB)
3 -Azure Resource Manager & Azure Policy Engine.mp4 (9.95 MB)
4 -Demo Azure Policy.mp4 (15.04 MB)
5 -Azure Landing Zones.mp4 (37.95 MB)
6 -Azure Key Vault.mp4 (19.35 MB)
7 -Demo Configure Azure Key Vault.mp4 (31.63 MB)
8 -Azure Hardware Security Modules (HSMs).mp4 (18.37 MB)
1 -What is Microsoft Defender for Cloud.mp4 (13.07 MB)
10 -Demo Security Recommendations.mp4 (19.68 MB)
11 -Secure Score.mp4 (5.01 MB)
12 -Demo Secure Score.mp4 (12.32 MB)
13 -Demo Azure Workbooks in Defender for Cloud.mp4 (18.35 MB)
14 -Data Exporting.mp4 (6.25 MB)
15 -Demo Data Exporting.mp4 (18.56 MB)
16 -Remediation.mp4 (12.32 MB)
17 -Demo Remediation.mp4 (24.77 MB)
18 -Microsoft Cloud Security Benchmark.mp4 (5.56 MB)
19 -Demo Microsoft Cloud Security Benchmark.mp4 (23.91 MB)
2 -CSPM & CWP.mp4 (10.01 MB)
20 -Governance Management.mp4 (4.47 MB)
21 -Demo Governance Management.mp4 (18 MB)
22 -Regulatory Compliance.mp4 (8.8 MB)
23 -Demo Regulatory Compliance.mp4 (45.97 MB)
24 -Cloud Security Explorer.mp4 (6.56 MB)
25 -Demo Cloud Security Explorer.mp4 (23.38 MB)
26 -Attack Path Analysis.mp4 (6.36 MB)
27 -Agentless Vulnerability Scanning.mp4 (9.41 MB)
28 -Agentless Discovery for Kubernetes.mp4 (4.51 MB)
29 -Container Registry Vulnerability Assessment.mp4 (3.95 MB)
3 -Defender for Cloud RBAC.mp4 (9.23 MB)
30 -Data Aware Security Posture.mp4 (6.91 MB)
31 -EASM Insights in Network Exposure.mp4 (5.87 MB)
32 -DevOps Security.mp4 (13.84 MB)
4 -Demo Enable All Plans in Defender for Cloud.mp4 (27.82 MB)
5 -What is CSPM.mp4 (6.75 MB)
6 -CSPM Plans.mp4 (11.09 MB)
7 -Asset Inventory.mp4 (6.4 MB)
8 -Demo Asset Inventory.mp4 (32.96 MB)
9 -Security Recommendations.mp4 (4.87 MB)
1 -What is CWP.mp4 (8.92 MB)
10 -Demo Create Suppression Rules.mp4 (17.75 MB)
11 -Demo Setup Email Notifications.mp4 (10.17 MB)
12 -What is Defender for Servers.mp4 (14.16 MB)
13 -Agents.mp4 (7.96 MB)
14 -Defender for Servers Plans.mp4 (6.61 MB)
15 -Defender for Endpoint Integration.mp4 (7.75 MB)
16 -Licensing.mp4 (5.11 MB)
17 -Defender for Endpoint Provisioning.mp4 (3.66 MB)
18 -Threat Detection for OS-Level.mp4 (6.38 MB)
19 -Alerts for Windows Machines.mp4 (11.7 MB)
2 -Demo Install VirtualBox.mp4 (10.11 MB)
20 -Alerts for Linux Machines.mp4 (11.49 MB)
21 -Demo Create Virtual Machines.mp4 (29.05 MB)
22 -Demo Brute Force SSH.mp4 (108.54 MB)
23 -Threat Detection for Network Level.mp4 (17.9 MB)
24 -Adaptive Application Controls.mp4 (9.99 MB)
25 -Demo Adaptive Application Controls.mp4 (14.64 MB)
26 -Just-in-time VM access.mp4 (26.5 MB)
27 -Demo Just-in-time VM access.mp4 (26.5 MB)
28 -Adaptive Network Hardening.mp4 (7.69 MB)
29 -File Integrity Monitoring.mp4 (7.82 MB)
3 -Demo Install Kali Linux.mp4 (25.86 MB)
30 -Demo File Integrity Monitoring.mp4 (11.81 MB)
31 -Network Map.mp4 (4.67 MB)
32 -Demo Network Map.mp4 (12.57 MB)
33 -Overview - Defender for Databases.mp4 (9.23 MB)
34 -Defender for SQL Databases.mp4 (6.43 MB)
35 -Defender for Open-Source Relational Databases.mp4 (4.87 MB)
36 -Defender for Cosmos DB.mp4 (3.88 MB)
37 -Overview - Defender for Storage.mp4 (19.26 MB)
38 -Demo Create a Storage Account.mp4 (13.29 MB)
39 -Demo Defender for Storage.mp4 (59.5 MB)
4 -Demo Configure Kali Keyboard Layout.mp4 (17.04 MB)
40 -Overview - Defender for Containers.mp4 (27.75 MB)
41 -Environment Hardening.mp4 (25.3 MB)
42 -Vulnerability Assessment.mp4 (14.4 MB)
43 -Threat Protection.mp4 (6.7 MB)
44 -Demo Create an AKS Cluster.mp4 (7.3 MB)
45 -Demo Defender for Containers.mp4 (14.85 MB)
46 -Overview - Defender for Key Vault.mp4 (18.05 MB)
47 -Demo Create an Azure Key Vault.mp4 (5.75 MB)
48 -Demo Defender for Key Vault.mp4 (12.02 MB)
49 -Overview - Defender for Resource Manager.mp4 (13.79 MB)
5 -Demo Install Tor Browser in Kali.mp4 (24.24 MB)
50 -Demo Defender for Resource Manager.mp4 (43.3 MB)
51 -Workflow Automation.mp4 (5.99 MB)
52 -Azure Logic Apps.mp4 (21.39 MB)
53 -Demo Malware Scanning Response with Workflow Automation & Azure Logic Apps.mp4 (50.9 MB)
54 -Integration with Azure DDoS Protection.mp4 (5.6 MB)
55 -Integration with Azure WAF.mp4 (9.24 MB)
56 -Integration with Sentinel.mp4 (6.92 MB)
57 -Integration with other SIEMs.mp4 (2.22 MB)
6 -Demo Create Resource Group.mp4 (4.89 MB)
7 -Alert Queue.mp4 (5.17 MB)
8 -Demo Alert Queue.mp4 (5.17 MB)
9 -Demo Create Sample Alerts.mp4 (14.94 MB)
1 -Complexity and Cyber Security Challenges.mp4 (52.49 MB)
2 -What is a SOC.mp4 (17.89 MB)
3 -SOC Tier Model.mp4 (14.18 MB)
4 -Cyber Security Incident Response Process.mp4 (10.67 MB)
5 -EDR, XDR, SIEM & SOAR.mp4 (22.29 MB)
6 -Blue, Red & Purple Teaming.mp4 (40.87 MB)
1 -Azure Monitor.mp4 (28.92 MB)
10 -Sentinel RBAC.mp4 (9.77 MB)
11 -Demo Azure RBAC for Sentinel.mp4 (14.82 MB)
12 -Dedicated Cluster.mp4 (10.09 MB)
13 -Data Connectors.mp4 (11.82 MB)
14 -Typical data sources for a SIEM.mp4 (12.52 MB)
15 -Demo Content Hub.mp4 (37.58 MB)
16 -Demo Ingesting Threat Intelligence into Sentinel.mp4 (31.74 MB)
17 -Demo Verify Threat Intelligence Log Ingestion.mp4 (11.53 MB)
18 -Demo Ingesting Entra ID into Sentinel.mp4 (17.56 MB)
19 -Demo Verify Entra ID Ingestion.mp4 (12.38 MB)
2 -What is Microsoft Sentinel.mp4 (4.98 MB)
20 -Demo Deploy Sentinel Training Lab.mp4 (13.31 MB)
21 -AMA and DCR.mp4 (15.52 MB)
22 -Demo Ingesting Windows Security Event Logs with AMA and DCR.mp4 (53.3 MB)
23 -Sentinel Workflow.mp4 (13.62 MB)
24 -Analytic Rules.mp4 (6.41 MB)
25 -Demo Analytic Rules.mp4 (21.72 MB)
26 -Scheduled Analytic Rules.mp4 (4.19 MB)
27 -Demo Scheduled Analytic Rules - Entra ID.mp4 (32.28 MB)
28 -Demo Scheduled Analytic Rules - Windows Security Events.mp4 (18.58 MB)
29 -Near-Real-Time-Rules (NRT).mp4 (3.17 MB)
3 -Sentinel as SaaS.mp4 (11.17 MB)
30 -Demo Near-Real-Time-Rules (NRT).mp4 (13.6 MB)
31 -Fusion.mp4 (6.17 MB)
32 -Demo Fusion.mp4 (31.13 MB)
33 -ML Behavior Analytics.mp4 (10.35 MB)
34 -Demo ML Behavior Analytics.mp4 (17.32 MB)
35 -Threat Intelligence Rules.mp4 (3.68 MB)
36 -Demo Threat Intelligence Rules.mp4 (11.8 MB)
37 -Microsoft Security Rules.mp4 (2.64 MB)
38 -Demo Microsoft Security Rules.mp4 (7.62 MB)
39 -Demo Incident Dashboard.mp4 (65.05 MB)
4 -Sentinel Architecture.mp4 (12.34 MB)
40 -Ingestion Delay.mp4 (28.66 MB)
41 -Demo Countering Ingestion Delay.mp4 (18.44 MB)
42 -What is Threat Hunting.mp4 (11.47 MB)
43 -KQL 101.mp4 (16.03 MB)
44 -Demo KQL Playground.mp4 (24.97 MB)
45 -Demo KQL - search.mp4 (11.41 MB)
46 -Demo KQL - where.mp4 (65.94 MB)
47 -Demo KQL - datetime & timespans.mp4 (33 MB)
48 -Demo KQL - count, dcount, summarize & top.mp4 (32.06 MB)
49 -Demo KQL - order, sort, take.mp4 (14.92 MB)
5 -Deployment Prerequisites.mp4 (3.28 MB)
50 -Demo KQL - extend, project.mp4 (45.47 MB)
51 -Demo KQL - contains, startswith, endswith.mp4 (15.49 MB)
52 -Demo KQL - let.mp4 (13.29 MB)
53 -Demo KQL - render.mp4 (11.7 MB)
54 -Demo KQL - union.mp4 (8.66 MB)
55 -Demo KQL - inner join.mp4 (11.1 MB)
56 -Demo Threat Hunting in Sentinel.mp4 (21.33 MB)
57 -Demo Hunt for Entra ID Events.mp4 (47.52 MB)
58 -Automation Capabilities in Sentinel.mp4 (12.65 MB)
59 -Automation Rules.mp4 (2.68 MB)
6 -Demo Create an Azure Resource Group.mp4 (6.16 MB)
60 -Demo Automation Rules.mp4 (66.1 MB)
61 -Playbooks.mp4 (3.78 MB)
62 -Automation Rules vs Playbooks.mp4 (8.61 MB)
63 -Azure Logic Apps.mp4 (14.23 MB)
64 -Demo Playbooks & Azure Logic Apps.mp4 (50.81 MB)
65 -Demo Playbook with MITRE ATT&CK & ChatGPT.mp4 (64.63 MB)
66 -Sentinel REST API.mp4 (6.99 MB)
67 -Notebooks in Sentinel.mp4 (6.93 MB)
68 -Demo Notebooks with MSTICPy.mp4 (148.77 MB)
7 -Demo Create a Log Analytics Workspace.mp4 (9.6 MB)
8 -Demo Create a Sentinel Workspace.mp4 (7.37 MB)
9 -Azure RBAC.mp4 (4.4 MB)
1 -Bonus.mp4 (17.97 MB)
1 -What is a Threat.mp4 (7.29 MB)
2 -Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI).mp4 (9.12 MB)
3 -What is CTI.mp4 (10.79 MB)
4 -Threat, Vulnerability & Risk.mp4 (5.58 MB)
5 -Threat-Informed Defense.mp4 (11.61 MB)
6 -Tactics, Techniques & Procedures (TTPs).mp4 (16.53 MB)
7 -IOCs & IOAs.mp4 (14.08 MB)
8 -Pyramid of Pain.mp4 (13.08 MB)
9 -CTI Sources.mp4 (7.66 MB)
1 -What is a Vulnerability.mp4 (7.29 MB)
2 -Common Vulnerabilities and Exposures (CVE).mp4 (12.45 MB)
3 -Common Vulnerability Scoring System (CVSS).mp4 (25.79 MB)
1 -Cloud Computing Properties.mp4 (18.12 MB)
2 -Cloud Computing Types.mp4 (11.09 MB)
3 -Azure Global Backbone.mp4 (21.31 MB)
4 -Shared Responsibility Model.mp4 (19.66 MB)
5 -Azure Resource Hierarchy.mp4 (10.28 MB)
6 -Azure Subscription Types.mp4 (10.14 MB)
7 -Entra ID Tenants and Azure Subscriptions.mp4 (7.1 MB)
8 -Demo Create Your Azure Subscription.mp4 (6.52 MB)
1 -Zero Trust.mp4 (31.02 MB)
2 -The Microsoft Security Cosmos.mp4 (19.4 MB)
3 -Defending Across Attack Chains.mp4 (13.48 MB)
1 -Microsoft Entra.mp4 (76 MB)
10 -Demo Administrative Units.mp4 (15.06 MB)
11 -External Identities.mp4 (25.6 MB)
12 -Demo External Collaboration Settings.mp4 (31.33 MB)
13 -Identity Protection.mp4 (65.64 MB)
14 -Demo Identity Protection.mp4 (31.21 MB)
2 -Microsoft Entra ID.mp4 (34.5 MB)
3 -User Identities.mp4 (8.79 MB)
4 -Demo User Identities.mp4 (27.72 MB)
5 -Managed Identities.mp4 (31.66 MB)
6 -Demo Managed Identities.mp4 (53.75 MB)
7 -Groups.mp4 (44.46 MB)
8 -Demo Groups.mp4 (8.97 MB)
9 -Administrative Units.mp4 (23.74 MB)
1 -Authentication Methods.mp4 (28.43 MB)
10 -Entra Verified ID.mp4 (10.83 MB)
11 -Self-Service Password Reset (SSPR).mp4 (24.8 MB)
12 -Demo SSPR.mp4 (13.89 MB)
13 -Entra Connect.mp4 (31.03 MB)
14 -Demo Deploy Azure Resources for Hybrid Identity.mp4 (46.21 MB)
15 -Demo Setup Custom Domain.mp4 (44.55 MB)
16 -Demo Setup Active Directory.mp4 (35.15 MB)
17 -Demo Entra Connect.mp4 (79.15 MB)
18 -Hybrid Authentication.mp4 (13.57 MB)
19 -Entra Domain Services.mp4 (19.81 MB)
2 -Attacks on Passwords.mp4 (21.25 MB)
3 -Multi-Factor Authentication (MFA).mp4 (32.88 MB)
4 -Demo MFA.mp4 (19.26 MB)
5 -Passwordless Authentication.mp4 (16.17 MB)
6 -Demo Passwordless Authentication.mp4 (17.04 MB)
7 -Password Protection.mp4 (16.3 MB)
8 -Demo Password Protection.mp4 (15.6 MB)
9 -Single-Sign-on (SSO).mp4 (6.55 MB)
1 -Entra ID Roles.mp4 (20.18 MB)
10 -Privileged Identity Management (PIM).mp4 (33.82 MB)
11 -Demo Configure PIM.mp4 (44.71 MB)
12 -Access Reviews.mp4 (23.73 MB)
13 -Demo Access Reviews.mp4 (20.78 MB)
14 -Entra Permissions Management (EPM).mp4 (44.36 MB)
15 -Conditional Access.mp4 (26.05 MB)
16 -Demo Conditional Access.mp4 (70.7 MB)
2 -Demo Entra ID Roles.mp4 (28.4 MB)
3 -Demo Custom Entra ID Roles.mp4 (13.26 MB)
4 -Azure Role-Based-Acces-Control (RBAC).mp4 (70.14 MB)
5 -Demo Custom Azure RBAC.mp4 (23.52 MB)
6 -Demo Built-in Azure RBAC.mp4 (17.02 MB)
7 -Azure RBAC vs Entra ID Roles.mp4 (24.86 MB)
8 -Entra ID Governance.mp4 (14.05 MB)
9 -Entra ID Entitlement Management.mp4 (15.44 MB)
]
Screenshot
VltXHa5u_o.jpg


AusFile
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

 
Kommentar

9beeec00c10c6d7766e6c84e3ba490b4.jpg

Microsoft AZ-500: Azure Security Engineer Associate
Published 3/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 19h 47m | Size: 6.38 GB​

Pass AZ-500 | Elevate your Career

What you'll learn
Manage Microsoft Entra identities
Manage Microsoft Entra authentication
Manage Microsoft Entra authorization
Manage Microsoft Entra application access
Plan and implement security for virtual networks
Plan and implement security for private access to Azure resources
Plan and implement security for public access to Azure resources
Plan and implement advanced security for compute
Plan and implement security for storage
Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
Plan, implement, and manage governance for security
Manage security posture by using Microsoft Defender for Cloud
Configure and manage threat protection by using Microsoft Defender for Cloud
Configure and manage security monitoring and automation solutions
Requirements
Basic IT Knowledge
Willingness to learn cool stuff!
Description
This AZ-500 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the Microsoft AZ-500: Microsoft Azure Security Engineer Associate exam. This course systematically guides you from the basics to advanced concepts of Azure Security.By mastering Azure Security, you're developing expertise in essential topics in today's cybersecurity landscape.The course is always aligned with Microsoft's latest study guide and exam objectives:Manage identity and access (25-30%)Manage Microsoft Entra identitiesSecure Microsoft Entra usersSecure Microsoft Entra groupsRecommend when to use external identitiesSecure external identitiesImplement Microsoft Entra ID ProtectionManage Microsoft Entra authenticationImplement multi-factor authentication (MFA)Configure Microsoft Entra Verified IDImplement passwordless authenticationImplement password protectionImplement single sign-on (SSO)Integrate single sign on (SSO) and identity providersRecommend and enforce modern authentication methodsManage Microsoft Entra authorizationConfigure Azure role permissions for management groups, subscriptions, resource groups, and resourcesAssign Microsoft Entra built-in rolesAssign Azure built-in rolesCreate and assign custom roles, including Azure roles and Microsoft Entra rolesImplement and manage Microsoft Entra Permissions ManagementConfigure Microsoft Entra Privileged Identity ManagementConfigure role management and access reviews in Microsoft EntraImplement Conditional Access policiesManage Microsoft Entra application accessManage access to enterprise applications in Microsoft Entra ID, including OAuth permission grantsManage Microsoft Entra app registrationsConfigure app registration permission scopesManage app registration permission consentManage and use service principalsManage managed identities for Azure resourcesRecommend when to use and configure an Microsoft Entra Application Proxy, including authenticationSecure networking (20-25%)Plan and implement security for virtual networksPlan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)Plan and implement user-defined routes (UDRs)Plan and implement Virtual Network peering or VPN gatewayPlan and implement Virtual WAN, including secured virtual hubSecure VPN connectivity, including point-to-site and site-to-siteImplement encryption over ExpressRouteConfigure firewall settings on PaaS resourcesMonitor network security by using Network Watcher, including NSG flow loggingPlan and implement security for private access to Azure resourcesPlan and implement virtual network Service EndpointsPlan and implement Private EndpointsPlan and implement Private Link servicesPlan and implement network integration for Azure App Service and Azure FunctionsPlan and implement network security configurations for an App Service Environment (ASE)Plan and implement network security configurations for an Azure SQL Managed InstancePlan and implement security for public access to Azure resourcesPlan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API ManagementPlan, implement, and manage an Azure Firewall, including Azure Firewall Manager and firewall policiesPlan and implement an Azure Application GatewayPlan and implement an Azure Front Door, including Content Delivery Network (CDN)Plan and implement a Web Application Firewall (WAF)Recommend when to use Azure DDoS Protection StandardSecure compute, storage, and databases (20-25%)Plan and implement advanced security for computePlan and implement remote access to public endpoints, including Azure Bastion and just-in-time (JIT) virtual machine Configure disk encryption, including Azure Disk Encryption (ADE), encryption at host, and confidential disk encryptionRecommend security configurations for Azure API ManagementPlan and implement security for storageConfigure access control for storage accountsManage life cycle for storage account access keysSelect and configure an appropriate method for access to Azure FilesSelect and configure an appropriate method for access to Azure Blob StorageSelect and configure an appropriate method for access to Azure TablesSelect and configure an appropriate method for access to Azure QueuesSelect and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storageConfigure Bring your own key (BYOK)Enable double encryption at the Azure Storage infrastructure levelPlan and implement security for Azure SQL Database and Azure SQL Managed InstanceEnable Microsoft Entra database authenticationEnable database auditingIdentify use cases for the Microsoft Purview governance portalImplement data classification of sensitive information by using the Microsoft Purview governance portalPlan and implement dynamic maskingImplement Transparent Data Encryption (TDE)Recommend when to use Azure SQL Database Always EncryptedManage security operations (25-30%)Plan, implement, and manage governance for securityCreate, assign, and interpret security policies and initiatives in Azure PolicyConfigure security settings by using Azure BlueprintsDeploy secure infrastructures by using a landing zoneCreate and configure an Azure Key VaultRecommend when to use a dedicated Hardware Security Module (HSM)Configure access to Key Vault, including vault access policies and Azure Role Based Access ControlManage certificates, secrets, and keysConfigure key rotationConfigure backup and recovery of certificates, secrets, and keysManage security posture by using Microsoft Defender for CloudIdentify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and InventoryAssess compliance against security frameworks by using Microsoft Defender for CloudAdd industry and regulatory standards to Microsoft Defender for CloudAdd custom initiatives to Microsoft Defender for CloudConnect hybrid cloud and multi-cloud environments to Microsoft Defender for CloudIdentify and monitor external assets by using Microsoft Defender External Attack Surface ManagementConfigure and manage threat protection by using Microsoft Defender for CloudEnable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, and Resource ManagerConfigure Microsoft Defender for ServersConfigure Microsoft Defender for Azure SQL DatabaseManage and respond to security alerts in Microsoft Defender for CloudConfigure workflow automation by using Microsoft Defender for CloudEvaluate vulnerability scans from Microsoft Defender for ServerConfigure and manage security monitoring and automation solutionsMonitor security events by using Azure MonitorConfigure data connectors in Microsoft SentinelCreate and customize analytics rules in Microsoft SentinelEvaluate alerts and incidents in Microsoft SentinelConfigure automation in Microsoft Sentinel
Who this course is for
SOC Analyst
Security Engineer
Security Consultant
Security Architect
Security Manager
Cloud Engineer
Cloud Architect
IT Manager
CISO

Homepage
Bitte Anmelden oder Registrieren um Links zu sehen.


LhbovAHJ_o.jpg



AusFile
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten