BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Thinksmart - ECPv5.8.0//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Thinksmart
X-ORIGINAL-URL:https://thinksmartgulf.com
X-WR-CALDESC:Events for Thinksmart
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20230405T090000
DTEND;TZID=UTC:20230408T170000
DTSTAMP:20260409T073650
CREATED:20230101T104450Z
LAST-MODIFIED:20230103T122523Z
UID:12352-1680685200-1680973200@thinksmartgulf.com
SUMMARY:Microsoft Azure Security Technology Course (AZ-500)
DESCRIPTION:Mode: Physical\n\nCourse Description\nThis course provides IT Security Professionals with the knowledge and skills needed to implement security controls\, maintain an organization’s security posture\, and identify and remediate security vulnerabilities. This course includes security for identity and access\, platform protection\, data and applications\, and security operations. \nAudience Profile\nThis course is for Azure Security Engineers who are planning to take the associated certification exam\, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization’s data. \nCourse outline\n\n\n\nModule 1: Manage Identity and Access\nThis module covers Azure Active Directory\, Azure Identity Protection\, Enterprise Governance\, Azure AD PIM\, and Hybrid Identity. \nLessons\n\nAzure Active Directory\nHybrid Identity\nAzure Identity Protection\nAzure AD Privileged Identity Management\nEnterprise Governance\n\nLab : Role-Based Access Control\nLab : Azure Policy\nLab : Resource Manager Locks\nLab : MFA\, Conditional Access and AAD Identity Protection\nLab : Azure AD Privileged Identity Management\nLab : Implement Directory Synchronization\nAfter completing this module\, students will be able to: \n\nImplement enterprise governance strategies including role-based access control\, Azure policies\, and resource locks.\nImplement an Azure AD infrastructure including users\, groups\, and multi-factor authentication.\nImplement Azure AD Identity Protection including risk policies\, conditional access\, and access reviews.\nImplement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.\nImplement Azure AD Connect including authentication methods and on-premises directory synchronization.\n\nModule 2: Implement Platform Protection\nThis module covers perimeter\, network\, host\, and container security. \nLessons\n\nPerimeter Security\nNetwork Security\nHost Security\nContainer Security\n\nLab : Configuring and Securing ACR and AKS\nLab : Azure Firewall\nLab : Network Security Groups and Application Security Groups\nAfter completing this module\, students will be able to: \n\nImplement perimeter security strategies including Azure Firewall.\nImplement network security strategies including Network Security Groups and Application Security Groups.\nImplement host security strategies including endpoint protection\, remote access management\, update management\, and disk encryption.\nImplement container security strategies including Azure Container Instances\, Azure Container Registry\, and Azure Kubernetes.\n\nModule 3: Secure Data and Applications\nThis module covers Azure Key Vault\, application security\, storage security\, and SQL database security. \nLessons\n\nAzure Key Vault\nApplication Security\nStorage Security\nSQL Database Security\n\nLab : Key Vault (Implementing Secure Data by setting up Always Encrypted)\nLab : Securing Azure SQL Database\nLab : Service Endpoints and Securing Storage\nAfter completing this module\, students will be able to: \n\nImplement Azure Key Vault including certificates\, keys\, and secretes.\nImplement application security strategies including app registration\, managed identities\, and service endpoints.\nImplement storage security strategies including shared access signatures\, blob retention policies\, and Azure Files authentication.\nImplement database security strategies including authentication\, data classification\, dynamic data masking\, and always encrypted.\n\nModule 4: Manage Security Operations\nThis module covers Azure Monitor\, Azure Security Center\, and Azure Sentinel. \nLessons\n\nAzure Monitor\nAzure Security Center\nAzure Sentinel\n\nLab : Azure Sentinel\nLab : Azure Security Center\nLab : Azure Monitor\nAfter completing this module\, students will be able to: \n\nImplement Azure Monitor including connected sources\, log analytics\, and alerts.\nImplement Azure Security Center including policies\, recommendations\, and just in time virtual machine access.\nImplement Azure Sentinel including workbooks\, incidents\, and playbooks.\n\nRegister Here\nPlease enable JavaScript in your browser to complete this form.Please Add your Name *FirstLastEmail address *EmailConfirm EmailMobile NumberEnter your phone number for example +973xxxxChoose the course you are interested in *Microsoft Azure AdministratorMicrosoft Power Platform FundamentalsMicrosoft Data Analyst AssociateMicrosoft Azure DeveloperMicrosoft Security EngineerMicrosoft Data ScientistMicrosoft Azure Solutions ArchitectMicrosoft Azure FundamentalsMicrosoft Modern Desktop AdministratorMicrosoft Messaging AdministratorMicrosoft Teams AdministratorMicrosoft Security AdministratorMicrosoft Enterprise AdministratorMicrosoft 365 FundamentalsMicrosoft Power Platform FundamentalsMicrosoft Azure AI FundamentalsMicrosoft Azure AI Engineer AssociateMicrosoft Develop Generative AI Solutions with Azure OpenAI ServiceHow did you discover us? *GoogleInstagramLinkedInFacebookWord of mouth / FriendEmailSubmit
URL:https://thinksmartgulf.com/calender/microsoft-azure-security-technologies-course-az-500/
ORGANIZER;CN="ThinkSmart%20-%20Microsoft%20Organizer":MAILTO:info@thinksmartgulf.com
END:VEVENT
END:VCALENDAR