Course Information
-----
This course is up-to-date with the latest (April 30 2024) AZ-500 exam.
-----
The Microsoft Certified Azure Security Engineer can really give you the edge in today's market. It covers security features and products for a big selection of Azure services, and is very hands-on focused, covering skills you can use to secure Azure solutions in the real world.
Throughout this course you'll gain lots of experience configuring and deploying secure Azure solutions. I don't want you to just pass the exam. I want you to have a deep understanding of how and why you would use these Azure security services.
You will complete hands-on demos using click-to-deploy resources, and practice with case studies and quizzes, so you can work confidently as an Azure Security Engineer.
Who Can Take This Course?
This course has been designed for students of all different types of backgrounds. We will progressively build knowledge and experience working with a variety of services, is such a way that will help you to gain familiarity with core products and features, before we move to more advanced services and configuration.
You do not have to have completed AZ-104 or AZ-305 to take this course - everything required to learn is included.
If you've never worked with Azure or any cloud provider before, you may also be interested in my free Getting Started with Azure course).
Course Curriculum
- [SHARED] Entra ID Overview (11:22)
- [SHARED] Demo - Exploring your Entra ID Tenant (5:12)
- [SHARED] Demo - About the Free Azure Subscription (4:50)
- [SHARED] Demo - Create and Manage Entra ID Tenants (7:44)
- [SHARED] Demo - Create and Manage Azure Subscriptions (10:02)
- [SHARED] Demo - Configure Domains for Entra ID (6:42)
- [SHARED] Entra ID User Identities (3:40)
- [SHARED] Demo - Create and Manage User Identities (6:16)
- [SHARED] Demo - Bulk Create User Identities (2:40)
- Demo - Quick Look at Permissions (5:25)
- Demo - Entra Tenant User Settings (4:43)
- [SHARED] Entra ID Application Identities (5:16)
- [SHARED] Demo - Register an Application in Entra ID (10:03)
- [SHARED] Managed Identities (6:20)
- [SHARED] Demo - Configure Managed Identities (System-Assigned) (10:54)
- [SHARED] Demo - Configure Managed Identities (User-Assigned) (6:22)
- [SHARED] Entra ID Groups (6:56)
- [SHARED] Demo - Create and Manage Groups (6:36)
- [SHARED] Demo - Manage Entra ID Licenses (7:53)
- [SHARED] Entra ID Dynamic Groups (5:17)
- [SHARED] Demo - Create and Manage Dynamic Groups (4:57)
- [SHARED] Entra ID Administrative Units (8:26)
- [SHARED] Demo - Configure Administrative Units (6:25)
- Case Study - Entra Essentials Security (7:40)
- Quiz - Entra Essentials Security
- [SHARED] Azure Role-Based Access Control (RBAC) (10:01)
- [SHARED] Demo - Manage Azure Resource Security with RBAC (10:11)
- Demo - Exploring Built-in Azure RBAC Roles (3:53)
- [SHARED] Entra ID Roles (4:49)
- [SHARED] Demo - Manage Entra ID Permissions (5:55)
- Demo - Exploring Built-in Entra Roles (3:31)
- [SHARED] Azure RBAC Custom Roles (9:23)
- [SHARED] Demo - Configure a Custom RBAC Role (7:47)
- [SHARED] Entra ID Custom Roles (3:38)
- [SHARED] Demo - Configure a Custom Entra ID Role (3:48)
- Case Study - Identity and Access Management Security (7:45)
- Quiz - Identity and Access Management Security
- Entra Multi-Factor Authentication (MFA) (8:34)
- Demo - Explore MFA Default Settings (3:58)
- Demo - About Migrating to Entra Auth Method Policies (3:55)
- Demo - Configure the Microsoft Authenticator App for a User (6:37)
- Demo - Explore Legacy MFA Settings (5:36)
- Entra Authentication Methods (8:40)
- Demo - Disable Security Defaults and Registration Campaign (3:51)
- Demo - Configure Entra Auth Method Policies (4:25)
- Demo - Complete the Migration to Auth Method Policies (8:53)
- Demo - Enable Entra Security Defaults and Registration Campaign (2:26)
- Entra Passwordless Authentication (6:13)
- Demo - Configure Entra Passwordless Authentication (5:35)
- Entra Password Protection (4:05)
- Demo - Configure Password Protection (3:30)
- [SHARED] Entra ID Self-Service Password Reset (SSPR) (7:05)
- [SHARED] Demo - Configure SSPR (7:22)
- Entra Verified ID (10:57)
- Demo - Configure Entra Verified ID (Quick Wizard) (5:37)
- Case Study - Entra Authentication (7:45)
- Quiz - Entra Authentication
- [SHARED] Entra Connect (8:18)
- Demo - Setup Active Directory in Azure (Part 1) (11:38)
- Demo - Setup Active Directory in Azure (Part 2) (9:37)
- Demo - Configure Entra Connect Cloud Sync (13:20)
- Demo - Configure Seamless SSO with Entra Connect Cloud Sync (12:56)
- Demo - Disable Entra Connect Cloud Sync (10:23)
- [SHARED] Entra Domain Services (4:21)
- Demo - Configure Entra Domain Services (12:28)
- Demo - Delete an Entra Domain Services Managed Domain (1:27)
- [SHARED] Entra ID External Identities (10:08)
- [SHARED] Demo - Invite a Guest with B2B Collaboration (10:05)
- Demo - Configure B2B Collaboration with Google (12:34)
- [SHARED] Entra ID App Proxy (7:01)
- [SHARED] Demo - Configure Entra ID App Proxy for a Web App (12:19)
- Case Study - Hybrid Identities and Access (8:20)
- Quiz - Hybrid Identities and Access
- [SHARED] Entra ID Governance Overview (7:16)
- [SHARED] Entra ID Entitlement Management (7:02)
- [SHARED] Demo - Create and Use an Access Package (11:45)
- [SHARED] Entra ID Privileged Identity Management (PIM) (5:49)
- [SHARED] Demo - Configure PIM for Entra Roles (9:00)
- [SHARED] Entra ID Access Reviews (7:17)
- [SHARED] Demo - Create and Run an Access Review (Entra Roles) (8:31)
- [SHARED] Entra ID Protection (8:22)
- [SHARED] Demo - Explore ID Protection Policies (5:04)
- [SHARED] Entra ID Conditional Access (7:40)
- [SHARED] Demo - Configure Conditional Access Policies (12:32)
- Entra Permissions Management (EPM) (5:54)
- Demo - Start a Free Trial for EPM (4:22)
- Demo - Setup Data Collection for Azure with EPM (6:20)
- Demo - Explore EPM Reporting and Analytics (7:35)
- Case Study - Entra Authorization (6:30)
- Quiz - Entra Authorization
- [SHARED] Virtual Networks (11:19)
- [SHARED] Demo - Configure a VNet (5:31)
- [SHARED] IP Addressing (11:00)
- [SHARED] Demo - Configure a NAT Gateway (6:20)
- [SHARED] Network Security Groups (NSG) (14:20)
- [SHARED] Demo - Configure NSGs (8:50)
- [SHARED] Augmented Security Rules (7:03)
- [SHARED] Demo - Use ASGs and Service Tags (9:28)
- Case Study - Virtual Network Security (5:55)
- Quiz - Virtual Network Security
- [SHARED] Virtual Machines (11:07)
- [SHARED] Demo - Create and Manage VMs (9:52)
- VM Encryption with Azure Disk Encryption (ADE) (5:30)
- Demo - Configure Azure Disk Encryption (ADE) for a VM (4:32)
- Azure VM Encryption at Host (7:02)
- Demo - Configure Encryption at Host (12:18)
- Azure VM Confidential Disk Encryption (6:29)
- Demo - Configure VM Confidential Disk Encryption (5:30)
- Azure Bastion (5:52)
- Demo - Configure Azure Bastion (5:00)
- Case Study - Virtual Machine Security (5:35)
- Quiz - Virtual Machine Security
- [SHARED] Azure Storage Overview (10:35)
- [SHARED] Demo - Create an Azure Storage Account (6:42)
- [SHARED] Azure Blob Storage Overview (8:39)
- [SHARED] Demo - Working with Blob Storage (11:38)
- [SHARED] Azure Storage Access Control (13:51)
- [SHARED] Demo - Access Storage with Keys and Shared Access Signatures (SAS) (13:01)
- [SHARED] Demo - Access Azure Storage using Entra ID Identities and RBAC (5:09)
- [SHARED] Immutable Blob Storage (6:24)
- [SHARED] Demo - Configure Immutable Storage Access Policies (8:40)
- [SHARED] Azure Storage Encryption (5:40)
- [SHARED] Demo - Configure Azure Storage Encryption (7:17)
- [SHARED] Azure Files (8:10)
- [SHARED] Demo - Create and Connect to an Azure Files Share (7:21)
- [SHARED] Azure Files Connectivity and Access Control (9:41)
- [SHARED] Demo - Configure Identity Auth for Azure Files (using Azure AD DS) (12:06)
- Case Study - Storage Security (9:33)
- Quiz - Storage Security
- User Defined Routing (13:27)
- Demo - Configure User Defined Routes (12:30)
- [SHARED] VNet Peering (7:23)
- [SHARED] Demo - Configure VNet Peering (7:58)
- [SHARED] Service Endpoints (5:03)
- [SHARED] Demo - Configure a Service Endpoint for Azure Files (4:31)
- [SHARED] Private Link (7:13)
- [SHARED] Demo - Configure a Private Endpoint for Azure Files (7:38)
- Demo - Private Link Service (12:39)
- Resource Firewalls (5:55)
- Demo - Configure a Storage Account Firewall (7:48)
- [SHARED] VPN Gateway (7:12)
- Demo - Connect VNets with S2S VPN (13:33)
- [SHARED] ExpressRoute (7:27)
- [SHARED] Azure Virtual WAN (7:43)
- Case Study - Private Network Security (7:41)
- Quiz - Private Network Security
- [SHARED] Azure App Service (11:20)
- [SHARED] Demo - Create a Web App with Azure App Service (12:10)
- [SHARED] App Service Deployments (8:16)
- [SHARED] Demo - Deploy a Web App to App Service (3:35)
- [SHARED] App Service Networking (5:53)
- [SHARED] App Service Security (3:46)
- Azure Functions (12:39)
- Demo - Create Azure Functions (10:39)
- Azure App Service Environment (6:40)
- Demo - Create an App Service Environment (8:59)
- Case Study - App Hosting Security (5:21)
- Quiz - App Hosting Security
- [SHARED] Azure Container Registry (6:46)
- [SHARED] Demo - Create a Container Registry and Push a Container (8:00)
- [SHARED] Demo - Build and Push an Image with ACR Tasks (3:32)
- [SHARED] Azure Container Instances (8:13)
- [SHARED] Demo - Create an Azure Container Instance (6:56)
- [SHARED] Azure Kubernetes Service (9:55)
- [SHARED] AKS Networking Overview (10:31)
- [SHARED] Demo - Create and Manage an AKS Cluster (11:02)
- [SHARED] Demo - Deploy an App to AKS using YAML (8:19)
- [SHARED] Azure Container Apps (8:26)
- [SHARED] Demo - Getting Started with Container Apps (8:38)
- Azure Container Security Considerations (6:42)
- Demo - Isolate ACR and Push a Signed Image (9:14)
- Demo - Create an Isolated Azure Container App (10:51)
- Case Study - Container Hosting Security (7:14)
- Quiz - Container Hosting Security
- Key Vault (7:51)
- Demo - Configure and Use Key Vault from a VM (12:12)
- Demo - Push a Container to ACR using a Key Vault Secret (5:29)
- Demo - Key Vault with Access Policy (8:29)
- Demo - Key Vault Key Rotation (5:15)
- Demo - Protect Key Vault Data (5:48)
- Demo - Backup and Restore Key Vault Data (3:22)
- Entra Permission and Consent (7:26)
- Demo - Configure an App with Delegated Permissions (10:55)
- Demo - Configure an App with App Permissions (4:10)
- Case Study - App Data and Access Security (5:40)
- Quiz - App Data and Access Security
- Azure SQL Overview (11:22)
- Demo - Create and Connect to Azure SQL Database (10:11)
- Demo - Configure an Entra ID Identity for Azure SQL DB (2:41)
- Azure SQL Transparent Data Encryption (TDE) (4:14)
- Demo - Configure Customer Managed TDE for Azure SQL DB (6:26)
- Azure SQL Always Encrypted (4:37)
- Demo - Configure Always Encrypted for Azure SQL DB (7:32)
- Azure SQL Dynamic Data Masking (3:14)
- Demo - Configure Dynamic Data Masking for Azure SQL DB (4:52)
- Case Study - Database Security (8:04)
- Quiz - Database Security
- [SHARED] Azure Firewall (9:26)
- [SHARED] Demo - Configure an Azure Firewall (14:54)
- [SHARED] Azure Load Balancer (7:44)
- [SHARED] Demo - Configure Regional Load Balancing for VMs (13:21)
- [SHARED] Azure Application Gateway (9:15)
- [SHARED] Demo - Configure App Gateway and Path-Based Routing (13:43)
- Azure Traffic Manager (7:04)
- Demo - Configure Traffic Manager (8:08)
- Azure Front Door (7:31)
- Demo - Configure Front Door for a Web App (11:21)
- Web Application Firewalls (WAF) (4:50)
- Demo - Configure a Global WAF (6:18)
- Azure API Management Overview (7:52)
- DDoS Protection (9:01)
- Demo - Configure DDoS Network Protection Plan (5:16)
- Demo - Configure DDoS IP Protection Plan (3:27)
- Case Study - Public Network Security (7:50)
- Quiz - Public Network Security
- Microsoft Purview (5:56)
- Demo - Get Started with Microsoft Purview (5:05)
- Demo - Map and Scan Azure SQL with Microsoft Purview (11:46)
- Secure Landing Zones (9:18)
- [SHARED] Management Groups (8:08)
- [SHARED] Demo - Create Management Croups (6:00)
- [SHARED] Resource Tagging (3:11)
- [SHARED] Demo - Create and Query Resource Tags (4:55)
- [SHARED] Resource Locks (4:25)
- [SHARED] Demo - Resource Locks (5:22)
- [SHARED] Azure Policy (11:24)
- [SHARED] Demo - Configure Azure Policies (11:49)
- Azure Blueprints (6:54)
- Demo - Deploy Secure Solutions with Blueprints (12:36)
- Case Study - Security Standards and Governance (6:20)
- Quiz - Security Standards and Governance
- Important Note
- Defender for Cloud Overview (9:57)
- Demo - Get Started with Defender for Cloud (8:22)
- Demo - Explore Defender for Cloud Trial Plans (4:14)
- Demo - Assess Risks with Defender for Cloud (6:15)
- Demo - Manage Risks with Defender for Cloud (10:13)
- Demo - Explore Defender for Cloud Compliance with MCSB (4:16)
- Demo - Add Regulatory Standards with Defender for Cloud (6:00)
- Demo - Create a Custom Standard in Defender for Cloud (7:21)
- Defender for Servers Overview (5:55)
- Demo - Configure Defender for Server (7:12)
- Demo - Explore Defender Vulnerability Management (6:49)
- Demo - Connect Defender for Cloud to AWS (12:37)
- Demo - Connect Defender for Cloud using Arc (9:39)
- Demo - Configure Just in Time VM Access for Azure VMs (9:29)
- Demo - Workflow Automation with Defender for Cloud (9:33)
- Defender for Databases Overview (4:29)
- Demo - Configure Defender for Azure SQL Database (11:25)
- Defender EASM Overview (8:52)
- Demo - Explore Defender EASM (7:55)
- Reminder about Minimizing Costs
- Case Study - Securing Solutions with Defender (6:13)
- Quiz - Security with Defender
- [SHARED] Azure Monitor Overview (11:37)
- [SHARED] Demo - Configure VM Monitoring (9:06)
- [SHARED] Activity Logs (4:14)
- [SHARED] Demo - Review and Archive Activity Logs (3:30)
- [SHARED] Azure Monitor Logs (6:34)
- [SHARED] Demo - Configure and Query Azure Monitor Logs (11:24)
- [SHARED] Azure Monitor Alerts (5:12)
- [SHARED] Demo - Configure Azure Monitor Alerts (11:25)
- [SHARED] Network Watcher (12:07)
- [SHARED] Demo - Monitor Connections with Network Watcher (7:10)
- [SHARED] Demo - Network Diagnostics with Network Watcher (7:45)
- [SHARED] Demo - NSG Flow Logs and Traffic Analytics (5:10)
- Azure SQL Audit Logs (3:00)
- Demo - Configure Auditing for Azure SQL DB (7:22)
- Microsoft Sentinel Overview (8:32)
- Demo - Get Started with Sentinel (6:07)
- Demo - Connect a Windows VM to Sentinel (10:03)
- Demo - Analyze Windows Security Events with Sentinel (10:26)
- Demo - Manage Incidents in Sentinel (4:50)
- Demo - Configure Automation in Sentinel (10:09)
- Case Study - Security Monitoring (7:43)
- Quiz - Security Monitoring and Automation
Lifetime Access to all Current and Future Content
If you're interested in multiple Azure certifications, you may want to check out Octo's Bundle. This includes all current and future courses, and early access to content as soon as it is created.