Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft Azure Security Engineer (AZ-500)
Introduction
Welcome to the Course (4:14)
About AZ-500 Exam Updates
Let's Connect (3:21)
Special Offers! Read Me...
Shared Lessons
Entra ID Essentials
[SHARED] Entra ID Overview (11:22)
[SHARED] Demo - Exploring your Entra ID Tenant (5:12)
[SHARED] Demo - About the Free Azure Subscription (4:50)
[SHARED] Demo - Create and Manage Entra ID Tenants (7:44)
[SHARED] Demo - Create and Manage Azure Subscriptions (10:02)
[SHARED] Demo - Configure Domains for Entra ID (6:42)
[SHARED] Entra ID User Identities (3:40)
[SHARED] Demo - Create and Manage User Identities (6:16)
[SHARED] Demo - Bulk Create User Identities (2:40)
Demo - Quick Look at Permissions (5:25)
Demo - Entra Tenant User Settings (4:43)
[SHARED] Entra ID Application Identities (5:16)
[SHARED] Demo - Register an Application in Entra ID (10:03)
[SHARED] Managed Identities (6:20)
[SHARED] Demo - Configure Managed Identities (System-Assigned) (10:54)
[SHARED] Demo - Configure Managed Identities (User-Assigned) (6:22)
[SHARED] Entra ID Groups (6:56)
[SHARED] Demo - Create and Manage Groups (6:36)
[SHARED] Demo - Manage Entra ID Licenses (7:53)
[SHARED] Entra ID Dynamic Groups (5:17)
[SHARED] Demo - Create and Manage Dynamic Groups (4:57)
[SHARED] Entra ID Administrative Units (8:26)
[SHARED] Demo - Configure Administrative Units (6:25)
Case Study - Entra Essentials Security (7:40)
Quiz - Entra Essentials Security
Identity and Access Management (IAM) Essentials
[SHARED] Azure Role-Based Access Control (RBAC) (10:01)
[SHARED] Demo - Manage Azure Resource Security with RBAC (10:11)
Demo - Exploring Built-in Azure RBAC Roles (3:53)
[SHARED] Entra ID Roles (4:49)
[SHARED] Demo - Manage Entra ID Permissions (5:55)
Demo - Exploring Built-in Entra Roles (3:31)
[SHARED] Azure RBAC Custom Roles (9:23)
[SHARED] Demo - Configure a Custom RBAC Role (7:47)
[SHARED] Entra ID Custom Roles (3:38)
[SHARED] Demo - Configure a Custom Entra ID Role (3:48)
Case Study - Identity and Access Management Security (7:45)
Quiz - Identity and Access Management Security
Entra Authentication
Entra Multi-Factor Authentication (MFA) (8:34)
Demo - Explore MFA Default Settings (3:58)
Demo - About Migrating to Entra Auth Method Policies (3:55)
Demo - Configure the Microsoft Authenticator App for a User (6:37)
Demo - Explore Legacy MFA Settings (5:36)
Entra Authentication Methods (8:40)
Demo - Disable Security Defaults and Registration Campaign (3:51)
Demo - Configure Entra Auth Method Policies (4:25)
Demo - Complete the Migration to Auth Method Policies (8:53)
Demo - Enable Entra Security Defaults and Registration Campaign (2:26)
Entra Passwordless Authentication (6:13)
Demo - Configure Entra Passwordless Authentication (5:35)
Entra Password Protection (4:05)
Demo - Configure Password Protection (3:30)
[SHARED] Entra ID Self-Service Password Reset (SSPR) (7:05)
[SHARED] Demo - Configure SSPR (7:22)
Entra Verified ID (10:57)
Demo - Configure Entra Verified ID (Quick Wizard) (5:37)
Case Study - Entra Authentication (7:45)
Quiz - Entra Authentication
Entra Hybrid Identities and Access
[SHARED] Entra Connect (8:18)
Demo - Setup Active Directory in Azure (Part 1) (11:38)
Demo - Setup Active Directory in Azure (Part 2) (9:37)
Demo - Configure Entra Connect Cloud Sync (13:20)
Demo - Configure Seamless SSO with Entra Connect Cloud Sync (12:56)
Demo - Disable Entra Connect Cloud Sync (10:23)
[SHARED] Entra Domain Services (4:21)
Demo - Configure Entra Domain Services (12:28)
Demo - Delete an Entra Domain Services Managed Domain (1:27)
[SHARED] Entra ID External Identities (10:08)
[SHARED] Demo - Invite a Guest with B2B Collaboration (10:05)
Demo - Configure B2B Collaboration with Google (12:34)
[SHARED] Entra ID App Proxy (7:01)
[SHARED] Demo - Configure Entra ID App Proxy for a Web App (12:19)
Case Study - Hybrid Identities and Access (8:20)
Quiz - Hybrid Identities and Access
Entra Authorization
[SHARED] Entra ID Governance Overview (7:16)
[SHARED] Entra ID Entitlement Management (7:02)
[SHARED] Demo - Create and Use an Access Package (11:45)
[SHARED] Entra ID Privileged Identity Management (PIM) (5:49)
[SHARED] Demo - Configure PIM for Entra Roles (9:00)
[SHARED] Entra ID Access Reviews (7:17)
[SHARED] Demo - Create and Run an Access Review (Entra Roles) (8:31)
[SHARED] Entra ID Protection (8:22)
[SHARED] Demo - Explore ID Protection Policies (5:04)
[SHARED] Entra ID Conditional Access (7:40)
[SHARED] Demo - Configure Conditional Access Policies (12:32)
Entra Permissions Management (EPM) (5:54)
Demo - Start a Free Trial for EPM (4:22)
Demo - Setup Data Collection for Azure with EPM (6:20)
Demo - Explore EPM Reporting and Analytics (7:35)
Case Study - Entra Authorization (6:30)
Quiz - Entra Authorization
Virtual Networking Essentials
[SHARED] Virtual Networks (11:19)
[SHARED] Demo - Configure a VNet (5:31)
[SHARED] IP Addressing (11:00)
[SHARED] Demo - Configure a NAT Gateway (6:20)
[SHARED] Network Security Groups (NSG) (14:20)
[SHARED] Demo - Configure NSGs (8:50)
[SHARED] Augmented Security Rules (7:03)
[SHARED] Demo - Use ASGs and Service Tags (9:28)
Case Study - Virtual Network Security (5:55)
Quiz - Virtual Network Security
Virtual Machine Security
[SHARED] Virtual Machines (11:07)
[SHARED] Demo - Create and Manage VMs (9:52)
VM Encryption with Azure Disk Encryption (ADE) (5:30)
Demo - Configure Azure Disk Encryption (ADE) for a VM (4:32)
Azure VM Encryption at Host (7:02)
Demo - Configure Encryption at Host (12:18)
Azure VM Confidential Disk Encryption (6:29)
Demo - Configure VM Confidential Disk Encryption (5:30)
Azure Bastion (5:52)
Demo - Configure Azure Bastion (5:00)
Case Study - Virtual Machine Security (5:35)
Quiz - Virtual Machine Security
Storage Security
[SHARED] Azure Storage Overview (10:35)
[SHARED] Demo - Create an Azure Storage Account (6:42)
[SHARED] Azure Blob Storage Overview (8:39)
[SHARED] Demo - Working with Blob Storage (11:38)
[SHARED] Azure Storage Access Control (13:51)
[SHARED] Demo - Access Storage with Keys and Shared Access Signatures (SAS) (13:01)
[SHARED] Demo - Access Azure Storage using Entra ID Identities and RBAC (5:09)
[SHARED] Immutable Blob Storage (6:24)
[SHARED] Demo - Configure Immutable Storage Access Policies (8:40)
[SHARED] Azure Storage Encryption (5:40)
[SHARED] Demo - Configure Azure Storage Encryption (7:17)
[SHARED] Azure Files (8:10)
[SHARED] Demo - Create and Connect to an Azure Files Share (7:21)
[SHARED] Azure Files Connectivity and Access Control (9:41)
[SHARED] Demo - Configure Identity Auth for Azure Files (using Azure AD DS) (12:06)
Case Study - Storage Security (9:33)
Quiz - Storage Security
Private Network Security
User Defined Routing (13:27)
Demo - Configure User Defined Routes (12:30)
[SHARED] VNet Peering (7:23)
[SHARED] Demo - Configure VNet Peering (7:58)
[SHARED] Service Endpoints (5:03)
[SHARED] Demo - Configure a Service Endpoint for Azure Files (4:31)
[SHARED] Private Link (7:13)
[SHARED] Demo - Configure a Private Endpoint for Azure Files (7:38)
Demo - Private Link Service (12:39)
Resource Firewalls (5:55)
Demo - Configure a Storage Account Firewall (7:48)
[SHARED] VPN Gateway (7:12)
Demo - Connect VNets with S2S VPN (13:33)
[SHARED] ExpressRoute (7:27)
[SHARED] Azure Virtual WAN (7:43)
Case Study - Private Network Security (7:41)
Quiz - Private Network Security
App Hosting Security
[SHARED] Azure App Service (11:20)
[SHARED] Demo - Create a Web App with Azure App Service (12:10)
[SHARED] App Service Deployments (8:16)
[SHARED] Demo - Deploy a Web App to App Service (3:35)
[SHARED] App Service Networking (5:53)
[SHARED] App Service Security (3:46)
Azure Functions (12:39)
Demo - Create Azure Functions (10:39)
Azure App Service Environment (6:40)
Demo - Create an App Service Environment (8:59)
Case Study - App Hosting Security (5:21)
Quiz - App Hosting Security
Container Hosting Security
[SHARED] Azure Container Registry (6:46)
[SHARED] Demo - Create a Container Registry and Push a Container (8:00)
[SHARED] Demo - Build and Push an Image with ACR Tasks (3:32)
[SHARED] Azure Container Instances (8:13)
[SHARED] Demo - Create an Azure Container Instance (6:56)
[SHARED] Azure Kubernetes Service (9:55)
[SHARED] AKS Networking Overview (10:31)
[SHARED] Demo - Create and Manage an AKS Cluster (11:02)
[SHARED] Demo - Deploy an App to AKS using YAML (8:19)
[SHARED] Azure Container Apps (8:26)
[SHARED] Demo - Getting Started with Container Apps (8:38)
Azure Container Security Considerations (6:42)
Demo - Isolate ACR and Push a Signed Image (9:14)
Demo - Create an Isolated Azure Container App (10:51)
Case Study - Container Hosting Security (7:14)
Quiz - Container Hosting Security
App Data and Access Security
Key Vault (7:51)
Demo - Configure and Use Key Vault from a VM (12:12)
Demo - Push a Container to ACR using a Key Vault Secret (5:29)
Demo - Key Vault with Access Policy (8:29)
Demo - Key Vault Key Rotation (5:15)
Demo - Protect Key Vault Data (5:48)
Demo - Backup and Restore Key Vault Data (3:22)
Entra Permission and Consent (7:26)
Demo - Configure an App with Delegated Permissions (10:55)
Demo - Configure an App with App Permissions (4:10)
Case Study - App Data and Access Security (5:40)
Quiz - App Data and Access Security
Database Security
Azure SQL Overview (11:22)
Demo - Create and Connect to Azure SQL Database (10:11)
Demo - Configure an Entra ID Identity for Azure SQL DB (2:41)
Azure SQL Transparent Data Encryption (TDE) (4:14)
Demo - Configure Customer Managed TDE for Azure SQL DB (6:26)
Azure SQL Always Encrypted (4:37)
Demo - Configure Always Encrypted for Azure SQL DB (7:32)
Azure SQL Dynamic Data Masking (3:14)
Demo - Configure Dynamic Data Masking for Azure SQL DB (4:52)
Case Study - Database Security (8:04)
Quiz - Database Security
Public Network Security
[SHARED] Azure Firewall (9:26)
[SHARED] Demo - Configure an Azure Firewall (14:54)
[SHARED] Azure Load Balancer (7:44)
[SHARED] Demo - Configure Regional Load Balancing for VMs (13:21)
[SHARED] Azure Application Gateway (9:15)
[SHARED] Demo - Configure App Gateway and Path-Based Routing (13:43)
Azure Traffic Manager (7:04)
Demo - Configure Traffic Manager (8:08)
Azure Front Door (7:31)
Demo - Configure Front Door for a Web App (11:21)
Web Application Firewalls (WAF) (4:50)
Demo - Configure a Global WAF (6:18)
Azure API Management Overview (7:52)
DDoS Protection (9:01)
Demo - Configure DDoS Network Protection Plan (5:16)
Demo - Configure DDoS IP Protection Plan (3:27)
Case Study - Public Network Security (7:50)
Quiz - Public Network Security
Security Standards and Governance
Microsoft Purview (5:56)
Demo - Get Started with Microsoft Purview (5:05)
Demo - Map and Scan Azure SQL with Microsoft Purview (11:46)
Secure Landing Zones (9:18)
[SHARED] Management Groups (8:08)
[SHARED] Demo - Create Management Croups (6:00)
[SHARED] Resource Tagging (3:11)
[SHARED] Demo - Create and Query Resource Tags (4:55)
[SHARED] Resource Locks (4:25)
[SHARED] Demo - Resource Locks (5:22)
[SHARED] Azure Policy (11:24)
[SHARED] Demo - Configure Azure Policies (11:49)
Azure Blueprints (6:54)
Demo - Deploy Secure Solutions with Blueprints (12:36)
Case Study - Security Standards and Governance (6:20)
Quiz - Security Standards and Governance
Security with Defender
Important Note
Defender for Cloud Overview (9:57)
Demo - Get Started with Defender for Cloud (8:22)
Demo - Explore Defender for Cloud Trial Plans (4:14)
Demo - Assess Risks with Defender for Cloud (6:15)
Demo - Manage Risks with Defender for Cloud (10:13)
Demo - Explore Defender for Cloud Compliance with MCSB (4:16)
Demo - Add Regulatory Standards with Defender for Cloud (6:00)
Demo - Create a Custom Standard in Defender for Cloud (7:21)
Defender for Servers Overview (5:55)
Demo - Configure Defender for Server (7:12)
Demo - Explore Defender Vulnerability Management (6:49)
Demo - Connect Defender for Cloud to AWS (12:37)
Demo - Connect Defender for Cloud using Arc (9:39)
Demo - Configure Just in Time VM Access for Azure VMs (9:29)
Demo - Workflow Automation with Defender for Cloud (9:33)
Defender for Databases Overview (4:29)
Demo - Configure Defender for Azure SQL Database (11:25)
Defender EASM Overview (8:52)
Demo - Explore Defender EASM (7:55)
Reminder about Minimizing Costs
Case Study - Securing Solutions with Defender (6:13)
Quiz - Security with Defender
Security Monitoring and Automation
[SHARED] Azure Monitor Overview (11:37)
[SHARED] Demo - Configure VM Monitoring (9:06)
[SHARED] Activity Logs (4:14)
[SHARED] Demo - Review and Archive Activity Logs (3:30)
[SHARED] Azure Monitor Logs (6:34)
[SHARED] Demo - Configure and Query Azure Monitor Logs (11:24)
[SHARED] Azure Monitor Alerts (5:12)
[SHARED] Demo - Configure Azure Monitor Alerts (11:25)
[SHARED] Network Watcher (12:07)
[SHARED] Demo - Monitor Connections with Network Watcher (7:10)
[SHARED] Demo - Network Diagnostics with Network Watcher (7:45)
[SHARED] Demo - NSG Flow Logs and Traffic Analytics (5:10)
Azure SQL Audit Logs (3:00)
Demo - Configure Auditing for Azure SQL DB (7:22)
Microsoft Sentinel Overview (8:32)
Demo - Get Started with Sentinel (6:07)
Demo - Connect a Windows VM to Sentinel (10:03)
Demo - Analyze Windows Security Events with Sentinel (10:26)
Demo - Manage Incidents in Sentinel (4:50)
Demo - Configure Automation in Sentinel (10:09)
Case Study - Security Monitoring (7:43)
Quiz - Security Monitoring and Automation
(Coming Soon) Finishing Up
(Coming Soon) What's Next?
Teach online with
Azure SQL Transparent Data Encryption (TDE)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock