Skip to main content
KodeKloud home page
Beta
Search...
⌘K
Ask AI
Sign in
Sign up
Sign up
Search...
Navigation
App Security
Page Not Found
Home
Courses
Microsoft Azure Security Technologies AZ 500
Contact Us
Community
Blog
Introduction
Course Introduction
Certification Details
Secure Azure solution with Azure Active Directory
Explore Azure Active Directory features
Compare Azure AD vs Active Directory Domain Services
Investigate roles in Azure AD
Deploy Azure AD Domain Services
Azure AD DS and Self Managed AD DS
Deploy Azure AD DS
Create and manage Azure AD users
Manage users with Azure AD groups
Device Management in Azure AD
Configure Azure AD administrative units
Implement Passwordless Authentication
Hybrid Identity
Introduction
Deploy Azure AD connect
Explore Authentication Options
Configure Password Hash Synchronization PHS
Implement Pass through Authentication PTA
Deploy Federation with Azure AD
Seamless SSO
Explore the authentication decision tree
Configure password writeback
Azure AD Connect Demonstration
Identity Protection
Introduction
Explore Azure AD identity protection
Configure risk event detections
Implement user risk policy
Implement sign in risk policy
Multi factor authentication in Azure AD
Page
Implement access reviews
Azure AD Privileged Identity Management
Introduction
Explore the zero trust model
Azure AD Privileged Identity Management
Configuring scope of PIM
Implement Privileged Identity Management
Exploring PIM Configuration settings
Implemeting PIM Workflow
Enterprise Governance
Introduction
Review the shared responsibility mode
Understanding Azure hierarchy
Enable Azure role based access control RBAC
Configure Azure policies
Configure Azure Initiatives
Compare and contrast Azure RBAC vs Azure policies
Enable resource locks
Deploy Azure blueprints
Design an Azure subscription management plan
Perimeter Security
Introduction
Define defense in depth
Explore virtual network security
Enable Distributed Denial of Service DDoS Protection
Explore Azure Firewall features
Implementing Azure Firewall
Configure Forced Tunneling
Create User Defined Routes and Network Virtual Appliances
Page
Network Security
Introduction
Explore Network Security Groups NSG
Deploy a Network Security Groups
Create Application Security Groups
Enable service endpoints
Deploy private links
Implement load balancing
Implement Application Gateway
Deploy a web application firewall
Configure and manage Azure front door
ExpressRoute
Host Security
Introduction
Enable endpoint protection
Define a privileged access device strategy
Deploy privileged access workstations
Create virtual machine templates
Enable and secure remote access management
Configure update management
Deploy disk encryption
Microsoft Defender for Endpoint
Explore Azure Security Center recommendations
Secure Azure workloads with Azure Security Benchmarks
Container Security
Introduction
Virtual Machines vs Containers
Azure Container Instances
Explore the Azure Container Registry ACR
Enable Azure Container Registry authentication
Review Azure Kubernetes Service AKS
Azure Kubernetes Service architecture
Configure Azure Kubernetes Service networking
Azure Kubernetes Service storage
Secure authentication to Azure Kubernetes Service with Active Directory
Key Vault
Introduction
Explore Azure Key Vault
Azure Key Vault Cryptographic Keys
Azure Key Vault Secrets
Azure Key Vault Certificates
Configure key vault access
Manage customer managed keys
Configure key rotation
Manage Key Vault safety and recovery features
App Security
Introduction
Review the Microsoft identity platform
Explore Azure AD application scenarios
Page
Configure Microsoft Graph permissions
Enable managed identities
Securing web apps
Deploy web app certificates
Storage Security
Introduction
Define data sovereignty
Configure Azure storage access
Shared access signatures
Azure AD storage authentication
Configure blob data retention policies
Azure files authentication
Enable the secure transfer required
Database Security
Introduction
Enable Azure AD authentication for SQL database
Configure SQL database firewalls
Page
Implement data discovery and classification
Enable Defender for SQL
Explore vulnerability assessment
Configure dynamic data masking
Implement transparent data encryption
Always encrypted
Azure Monitor
Introduction
Explore Azure Monitor
Configure and monitor metrics and logs
Enable Log Analytics
Manage connected sources for log analytics
Enable Azure monitor Alerts
Configure properties for diagnostic logging
Microsoft Defender for Cloud
Introduction
Review the cyber kill chain
Implement Microsoft Defender for Cloud
Configure Defender for Cloud policies
Manage and implement Defender for Cloud recommendations
Explore secure score
Define brute force attacks
Implement Just in time VM access
Microsoft Sentinel
Introduction
Enable Azure Sentinel
Configure data connections to Sentinel
Create workbooks for explore Sentinel data
Enable rules to create incidents
Configure playbooks
Hunt and investigate potential breaches
404
Page Not Found
We couldn't find the page. Maybe you were looking for one of these pages below?
Review Azure Kubernetes Service AKS
Microsoft Defender for Cloud
Deploying App Service
⌘I