AZ-500: Manage security operation
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Use Azure Monitor, Log Analytics, and other Azure tools to monitor the secure operation of your Azure solutions.
- Configure and monitor Azure Monitor
- Define metrics and logs you want to track for your Azure applications
- Connect data sources to and configure Log Analytics
- Create and monitor alerts associated with your solutions security
- Module 2: Use Azure Security Center, Azure Defender, and Secure Score to track and improve your security posture in Azure.
- Define the most common types of cyber-attacks
- Configure Azure Security Center based on your security posture
- Review Secure Score and raise it
- Lock down your solutions using Security Center and Defender
- Enable Just-in-Time access and other security features
- Module 3: Use Azure Sentinel to discover, track, and respond to security breaches within your Azure environment.
- Explain what Azure Sentinel is and how it is used
- Deploy Azure Sentinel
- Connect data to Azure Sentinel, like Azure Logs, Azure AD, and others
- Track incidents using workbooks, playbooks, and hunting techniques
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
Syllabus
- Module 1: Configure and manage Azure Monitor
- Introduction
- Explore Azure Monitor
- Configure and monitor metrics and logs
- Enable Log Analytics
- Manage connected sources for log analytics
- Enable Azure monitor Alerts
- Configure properties for diagnostic logging
- Perform try-this exercises
- Knowledge check
- Summary
- Module 2: Enable and manage Microsoft Defender for Cloud
- Introduction
- Review the cyber kill chain
- Implement Microsoft Defender for Cloud
- Configure security center policies
- Manage and implement security center recommendations
- Explore secure score
- Deploy Microsoft Defender for Cloud
- Define brute force attacks
- Implement Just-in-time VM access
- Perform try-this exercises
- Knowledge check
- Summary
- Module 3: Configure and monitor Microsoft Sentinel
- Introduction
- Enable Microsoft Sentinel
- Configure data connections to Sentinel
- Create workbooks for explore Sentinel data
- Enable rules to create incidents
- Configure playbooks
- Hunt and investigate potential breaches
- Knowledge check
- Summary
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network