YoVDO

AZ-500: Manage security operation

Offered By: Microsoft via Microsoft Learn

Tags

AZ-500: Microsoft Azure Security Technologies Courses Cybersecurity Courses Incident Response Courses Azure Security Center Courses Security Operations Courses Azure Monitor Courses Azure Security Courses

Course Description

Overview

  • Module 1: Use Azure Monitor, Log Analytics, and other Azure tools to monitor the secure operation of your Azure solutions.
  • By the end of this module, you will be able to:

    • Configure and monitor Azure Monitor
    • Define metrics and logs you want to track for your Azure applications
    • Connect data sources to and configure Log Analytics
    • Create and monitor alerts associated with your solutions security
  • Module 2: Use Azure Security Center, Azure Defender, and Secure Score to track and improve your security posture in Azure.
  • By the end of this module, you will be able to:

    • Define the most common types of cyber-attacks
    • Configure Azure Security Center based on your security posture
    • Review Secure Score and raise it
    • Lock down your solutions using Security Center and Defender
    • Enable Just-in-Time access and other security features
  • Module 3: Use Azure Sentinel to discover, track, and respond to security breaches within your Azure environment.
  • By the end of this module, you will be able to:

    • Explain what Azure Sentinel is and how it is used
    • Deploy Azure Sentinel
    • Connect data to Azure Sentinel, like Azure Logs, Azure AD, and others
    • Track incidents using workbooks, playbooks, and hunting techniques

Syllabus

  • Module 1: Configure and manage Azure Monitor
    • Introduction
    • Explore Azure Monitor
    • Configure and monitor metrics and logs
    • Enable Log Analytics
    • Manage connected sources for log analytics
    • Enable Azure monitor Alerts
    • Configure properties for diagnostic logging
    • Perform try-this exercises
    • Knowledge check
    • Summary
  • Module 2: Enable and manage Microsoft Defender for Cloud
    • Introduction
    • Review the cyber kill chain
    • Implement Microsoft Defender for Cloud
    • Configure security center policies
    • Manage and implement security center recommendations
    • Explore secure score
    • Deploy Microsoft Defender for Cloud
    • Define brute force attacks
    • Implement Just-in-time VM access
    • Perform try-this exercises
    • Knowledge check
    • Summary
  • Module 3: Configure and monitor Microsoft Sentinel
    • Introduction
    • Enable Microsoft Sentinel
    • Configure data connections to Sentinel
    • Create workbooks for explore Sentinel data
    • Enable rules to create incidents
    • Configure playbooks
    • Hunt and investigate potential breaches
    • Knowledge check
    • Summary

Tags

Related Courses

Azure Administration: Monitor and Back Up Azure Resources
LinkedIn Learning
Azure Apps: Diagnostics, Instrumentation, and Logging
LinkedIn Learning
Azure for DevOps: Continuous Feedback
LinkedIn Learning
Learning Azure Kubernetes Service (AKS)
LinkedIn Learning
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 3 Manage Security Operations
LinkedIn Learning