Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft Azure Security Engineer (AZ-500)
Introduction
Welcome to the Course (4:14)
About AZ-500 Exam Updates
Let's Connect (3:21)
Special Offers! Read Me...
Shared Lessons
Entra ID Essentials
[SHARED] Entra ID Overview (11:22)
[SHARED] Demo - Exploring your Entra ID Tenant (5:12)
[SHARED] Demo - About the Free Azure Subscription (4:50)
[SHARED] Demo - Create and Manage Entra ID Tenants (7:44)
[SHARED] Demo - Create and Manage Azure Subscriptions (10:02)
[SHARED] Demo - Configure Domains for Entra ID (6:42)
[SHARED] Entra ID User Identities (3:40)
[SHARED] Demo - Create and Manage User Identities (6:16)
[SHARED] Demo - Bulk Create User Identities (2:40)
Demo - Quick Look at Permissions (5:25)
Demo - Entra Tenant User Settings (4:43)
[SHARED] Entra ID Application Identities (5:16)
[SHARED] Demo - Register an Application in Entra ID (10:03)
[SHARED] Managed Identities (6:20)
[SHARED] Demo - Configure Managed Identities (System-Assigned) (10:54)
[SHARED] Demo - Configure Managed Identities (User-Assigned) (6:22)
[SHARED] Entra ID Groups (6:56)
[SHARED] Demo - Create and Manage Groups (6:36)
[SHARED] Demo - Manage Entra ID Licenses (7:53)
[SHARED] Entra ID Dynamic Groups (5:17)
[SHARED] Demo - Create and Manage Dynamic Groups (4:57)
[SHARED] Entra ID Administrative Units (8:26)
[SHARED] Demo - Configure Administrative Units (6:25)
Case Study - Entra Essentials Security (7:40)
Quiz - Entra Essentials Security
Identity and Access Management Essentials
[SHARED] Azure Role-Based Access Control (RBAC) (10:01)
[SHARED] Demo - Manage Azure Resource Security with RBAC (10:11)
Demo - Exploring Built-in Azure RBAC Roles (3:53)
[SHARED] Entra ID Roles (4:49)
[SHARED] Demo - Manage Entra ID Permissions (5:55)
Demo - Exploring Built-in Entra Roles (3:31)
[SHARED] Azure RBAC Custom Roles (9:23)
[SHARED] Demo - Configure a Custom RBAC Role (7:47)
[SHARED] Entra ID Custom Roles (3:38)
[SHARED] Demo - Configure a Custom Entra ID Role (3:48)
Case Study - Identity and Access Management Security (7:45)
Quiz - Identity and Access Management Security
Entra Authentication
Entra Multi-Factor Authentication (MFA) (8:34)
Demo - Explore MFA Default Settings (3:58)
Demo - About Migrating to Entra Auth Method Policies (3:55)
Demo - Configure the Microsoft Authenticator App for a User (6:37)
Demo - Explore Legacy MFA Settings (5:36)
Entra Authentication Methods (8:40)
Demo - Disable Security Defaults and Registration Campaign (3:51)
Demo - Configure Entra Auth Method Policies (4:25)
Demo - Complete the Migration to Auth Method Policies (8:53)
Demo - Enable Entra Security Defaults and Registration Campaign (2:26)
Entra Passwordless Authentication (6:13)
Demo - Configure Entra Passwordless Authentication (5:35)
Entra Password Protection (4:05)
Demo - Configure Password Protection (3:30)
[SHARED] Entra ID Self-Service Password Reset (SSPR) (7:05)
[SHARED] Demo - Configure SSPR (7:22)
Entra Verified ID (10:57)
Demo - Configure Entra Verified ID (Quick Wizard) (5:37)
Case Study - Entra Authentication (7:45)
Quiz - Entra Authentication
Entra Hybrid Identities and Access
[SHARED] Entra Connect (8:18)
Demo - Setup Active Directory in Azure (Part 1) (11:38)
Demo - Setup Active Directory in Azure (Part 2) (9:37)
Demo - Configure Entra Connect Cloud Sync (13:20)
Demo - Configure Seamless SSO with Entra Connect Cloud Sync (12:56)
Demo - Disable Entra Connect Cloud Sync (10:23)
[SHARED] Entra Domain Services (4:21)
Demo - Configure Entra Domain Services (12:28)
Demo - Delete an Entra Domain Services Managed Domain (1:27)
[SHARED] Entra ID External Identities (10:08)
[SHARED] Demo - Invite a Guest with B2B Collaboration (10:05)
Demo - Configure B2B Collaboration with Google (12:34)
[SHARED] Entra ID App Proxy (7:01)
[SHARED] Demo - Configure Entra ID App Proxy for a Web App (12:19)
Case Study - Hybrid Identities and Access (8:20)
Quiz - Hybrid Identities and Access
Entra Authorization
[SHARED] Entra ID Governance Overview (7:16)
[SHARED] Entra ID Entitlement Management (7:02)
[SHARED] Demo - Create and Use an Access Package (11:45)
[SHARED] Entra ID Privileged Identity Management (PIM) (5:49)
[SHARED] Demo - Configure PIM for Entra Roles (9:00)
[SHARED] Entra ID Access Reviews (7:17)
[SHARED] Demo - Create and Run an Access Review (Entra Roles) (8:31)
[SHARED] Entra ID Protection (8:22)
[SHARED] Demo - Explore ID Protection Policies (5:04)
[SHARED] Entra ID Conditional Access (7:40)
[SHARED] Demo - Configure Conditional Access Policies (12:32)
Entra Permissions Management (EPM) (5:54)
Demo - Start a Free Trial for EPM (4:22)
Demo - Setup Data Collection for Azure with EPM (6:20)
Demo - Explore EPM Reporting and Analytics (7:35)
Case Study - Entra Authorization (6:30)
Quiz - Entra Authorization
Virtual Networking Essentials
[SHARED] Virtual Networks (11:19)
[SHARED] Demo - Configure a VNet (5:31)
[SHARED] IP Addressing (11:00)
[SHARED] Demo - Configure a NAT Gateway (6:20)
[SHARED] Network Security Groups (NSG) (14:20)
[SHARED] Demo - Configure an NSG (8:50)
[SHARED] Augmented Security Rules (7:03)
[SHARED] Demo - Use ASGs and Service Tags (9:28)
Case Study - Virtual Network Security (5:55)
Quiz - Virtual Network Security
Virtual Machine Security
[SHARED] Virtual Machines (11:07)
[SHARED] Demo - Create and Manage VMs (9:52)
VM Encryption with Azure Disk Encryption (ADE) (5:30)
Demo - Configure Azure Disk Encryption (ADE) for a VM (4:32)
Azure VM Encryption at Host (7:02)
Demo - Configure Encryption at Host (12:18)
Azure VM Confidential Disk Encryption (6:29)
Demo - Configure VM Confidential Disk Encryption (5:30)
Azure Bastion (5:52)
Demo - Configure Azure Bastion (5:00)
Case Study - Virtual Machine Security (5:35)
Quiz - Virtual Machine Security
Storage Security
[SHARED] Azure Storage Overview (10:35)
[SHARED] Demo - Create an Azure Storage Account (6:42)
[SHARED] Azure Blob Storage Overview (8:39)
[SHARED] Demo - Working with Blob Storage (11:38)
[SHARED] Azure Storage Access Control (13:51)
[SHARED] Demo - Access Storage with Keys and Shared Access Signatures (SAS) (13:01)
[SHARED] Demo - Access Azure Storage using Entra ID Identities and RBAC (5:09)
[SHARED] Immutable Blob Storage (6:24)
[SHARED] Demo - Configure Immutable Storage Access Policies (8:40)
[SHARED] Azure Storage Encryption (5:40)
[SHARED] Demo - Configure Azure Storage Encryption (7:17)
[SHARED] Azure Files (8:10)
[SHARED] Demo - Create and Connect to an Azure Files Share (7:21)
[SHARED] Azure Files Connectivity and Access Control (9:41)
[SHARED] Demo - Configure Identity Auth for Azure Files (using Azure AD DS) (12:06)
Case Study - Storage Security (9:33)
Quiz - Storage Security
Private Network Security
User Defined Routing (13:27)
Demo - Configure User Defined Routes (12:30)
[SHARED] VNet Peering (7:23)
[SHARED] Demo - Configure VNet Peering (7:58)
[SHARED] Service Endpoints (5:03)
[SHARED] Demo - Configure a Service Endpoint for Azure Files (4:31)
[SHARED] Private Link (7:13)
[SHARED] Demo - Configure a Private Endpoint for Azure Files (7:38)
Demo - Private Link Service (12:39)
Resource Firewalls (5:55)
Demo - Configure a Storage Account Firewall (7:48)
[SHARED] VPN Gateway (7:12)
Demo - Connect VNets with S2S VPN (13:33)
[SHARED] ExpressRoute (7:27)
[SHARED] Azure Virtual WAN (7:43)
Case Study - Private Network Security (7:41)
Quiz - Private Network Security
App Hosting Security
[SHARED] Azure App Service (11:20)
[SHARED] Demo - Create a Web App with Azure App Service (12:10)
[SHARED] App Service Deployments (8:16)
[SHARED] Demo - Deploy a Web App to App Service (3:35)
[SHARED] App Service Networking (5:53)
[SHARED] App Service Security (3:46)
Azure Functions (12:39)
Demo - Create Azure Functions (10:39)
Azure App Service Environment (6:40)
Demo - Create an App Service Environment (8:59)
Case Study - App Hosting Security (5:21)
Quiz - App Hosting Security
Container Hosting Security
[SHARED] Azure Container Registry (6:46)
[SHARED] Demo - Create a Container Registry and Push a Container (8:00)
[SHARED] Demo - Build and Push an Image with ACR Tasks (3:32)
[SHARED] Azure Container Instances (8:13)
[SHARED] Demo - Create an Azure Container Instance (6:56)
[SHARED] Azure Kubernetes Service (AKS) (9:55)
[SHARED] AKS Networking Overview (10:31)
[SHARED] Demo - Create and Manage an AKS Cluster (11:02)
[SHARED] Demo - Deploy an App to AKS using YAML (8:19)
[SHARED] Azure Container Apps (8:26)
[SHARED] Demo - Getting Started with Azure Container Apps (8:38)
Azure Container Security Considerations (6:42)
Demo - Isolate ACR and Push a Signed Image (9:14)
Demo - Create an Isolated Azure Container App (10:51)
Case Study - Container Hosting Security (7:14)
Quiz - Container Hosting Security
App Data and Access Security
Key Vault (7:51)
Demo - Configure and Use Key Vault from a VM (12:12)
Demo - Push a Container to ACR using a Key Vault Secret (5:29)
Demo - Key Vault with Access Policy (8:29)
Demo - Key Vault Key Rotation (5:15)
Demo - Protect Key Vault Data (5:48)
Demo - Backup and Restore Key Vault Data (3:22)
Entra Permission and Consent (7:26)
Demo - Configure an App with Delegated Permissions (10:55)
Demo - Configure an App with App Permissions (4:10)
Case Study - App Data and Access Security (5:40)
Quiz - App Data and Access Security
Database Security
Azure SQL Overview (11:22)
Demo - Create and Connect to Azure SQL Database (10:11)
Demo - Configure an Entra ID Identity for Azure SQL DB (2:41)
Azure SQL Transparent Data Encryption (TDE) (4:14)
Demo - Configure Customer Managed TDE for Azure SQL DB (6:26)
Azure SQL Always Encrypted (4:37)
Demo - Configure Always Encrypted for Azure SQL DB (7:32)
Azure SQL Dynamic Data Masking (3:14)
Demo - Configure Dynamic Data Masking for Azure SQL DB (4:52)
Case Study - Database Security (8:04)
Quiz - Database Security
Public Network Security
[SHARED] Azure Firewall (9:26)
[SHARED] Demo - Configure an Azure Firewall (14:54)
[SHARED] Azure Load Balancer (7:44)
[SHARED] Demo - Configure Regional Load Balancing for VMs (13:21)
[SHARED] Azure Application Gateway (9:15)
[SHARED] Demo - Configure App Gateway and Path-Based Routing (13:43)
Azure Traffic Manager (7:04)
Demo - Configure Traffic Manager (8:08)
Azure Front Door (7:31)
Demo - Configure Front Door for a Web App (11:21)
Web Application Firewalls (WAF) (4:50)
Demo - Configure a Global WAF (6:18)
Azure API Management Overview (7:52)
DDoS Protection (9:01)
Demo - Configure DDoS Network Protection Plan (5:16)
Demo - Configure DDoS IP Protection Plan (3:27)
Case Study - Public Network Security (7:50)
Quiz - Public Network Security
Security Standards and Governance
Microsoft Purview (5:56)
Demo - Get Started with Microsoft Purview (5:05)
Demo - Map and Scan Azure SQL with Microsoft Purview (11:46)
[SHARED] Management Groups (8:08)
[SHARED] Demo - Create Management Groups (6:00)
[SHARED] Resource Tagging (3:11)
[SHARED] Demo - Create and Query Resource Tags (4:55)
[SHARED] Resource Locks (4:25)
[SHARED] Demo - Resource Locks (5:22)
[SHARED] Azure Policy (11:24)
[SHARED] Demo - Configure Azure Policies (11:49)
Azure Blueprints (6:54)
Demo - Deploy Secure Solutions with Blueprints (12:36)
Secure Landing Zones (9:18)
Case Study - Security Standards and Governance (6:20)
Quiz - Security Standards and Governance
Security with Defender
Important Note
Defender for Cloud Overview (9:57)
Demo - Get Started with Defender for Cloud (8:22)
Demo - Explore Defender for Cloud Trial Plans (4:14)
Demo - Assess Risks with Defender for Cloud (6:15)
Demo - Manage Risks with Defender for Cloud (10:13)
Demo - Explore Defender for Cloud Compliance with MCSB (4:16)
Demo - Add Regulatory Standards with Defender for Cloud (6:00)
Demo - Create a Custom Standard in Defender for Cloud (7:21)
Defender for Servers Overview (5:55)
Demo - Configure Defender for Server (7:12)
Demo - Explore Defender Vulnerability Management (6:49)
Demo - Connect Defender for Cloud to AWS (12:37)
Demo - Connect Defender for Cloud using Arc (9:39)
Demo - Configure Just in Time VM Access for Azure VMs (9:29)
Demo - Workflow Automation with Defender for Cloud (9:33)
Defender for Databases Overview (4:29)
Demo - Configure Defender for Azure SQL Database (11:25)
Defender EASM Overview (8:52)
Demo - Explore Defender EASM (7:55)
Reminder about Minimizing Costs
Case Study - Securing Solutions with Defender (6:13)
Quiz - Security with Defender
Security Monitoring and Automation
[SHARED] Azure Monitor Overview (11:37)
[SHARED] Demo - Configure VM Monitoring (9:06)
[SHARED] Activity Logs (4:14)
[SHARED] Demo - Review and Archive Activity Logs (3:30)
[SHARED] Azure Monitor Logs (6:34)
[SHARED] Demo - Configure and Query Azure Monitor Logs (11:24)
[SHARED] Azure Monitor Alerts (5:12)
[SHARED] Demo - Configure Azure Monitor Alerts (11:25)
[SHARED] Network Watcher (12:07)
[SHARED] Demo - Monitor Connections with Network Watcher (7:10)
[SHARED] Demo - Network Diagnostics with Network Watcher (7:45)
[SHARED] Demo - NSG Flow Logs and Traffic Analytics (5:10)
Azure SQL Audit Logs (3:00)
Demo - Configure Auditing for Azure SQL DB (7:22)
Microsoft Sentinel Overview (8:32)
Demo - Get Started with Sentinel (6:07)
Demo - Connect a Windows VM to Sentinel (10:03)
Demo - Analyze Windows Security Events with Sentinel (10:26)
Demo - Manage Incidents in Sentinel (4:50)
Demo - Configure Automation in Sentinel (10:09)
Case Study - Security Monitoring (7:43)
Quiz - Security Monitoring and Automation
(Coming Soon) Finishing Up
(Coming Soon) What's Next?
Teach online with
[SHARED] Azure Kubernetes Service (AKS)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock