Phone: +254 763 702187
Email: info@africanedevelopment.org

Microsoft Azure Security Engineer Associate

Categories: Cyber Security, Microsoft
Share
Share Course
Page Link
Share On Social Media

About Course

This 4-day course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Candidates for the Azure Security Engineer Associate certification should have subject matter expertise in implementing Azure security controls that protect identity, access, data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure.

 

Responsibilities for an Azure security engineer include managing the security posture, identifying and remediating vulnerabilities, performing threat modelling, implementing threat protection, and responding to security incident escalations. Azure security engineers often serve as part of a larger team to plan and implement cloud-based management and security.

 

Candidates for this certification should have practical experience in administration of Azure and hybrid environments. Candidates should have experience with infrastructure as code, security operations processes, cloud capabilities, and Azure services.

 

Exam AZ-500: Microsoft Azure Security Technologies

Candidates for this exam should have subject matter expertise implementing Azure security controls that protect identity, access, data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure.

Show More

What Will You Learn?

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.

Course Content

Manage identity and access

Implement platform protection

Manage security operations

Secure data and applications