Inhalt des Trainings
Die technische Fachkraft für Azure Sicherheit implementiert, verwaltet und überwacht die Sicherheit für Ressourcen in Azure sowie in Multicloud- und Hybridumgebungen als Teil der umfassenden Infrastruktur.
Zu den Aufgaben gehören das Verwalten des Sicherheitsstatus, Identifizieren und Beheben von Sicherheitsrisiken, Durchführen von Bedrohungsmodellierungen und das Implementieren des Bedrohungsschutzes.
Zudem können sie auf Eskalationen von Sicherheitsincidents reagieren.
Detail-Inhalte
AZ-900 Praxis+ Microsoft Azure Fundamentals
- Describe Core Azure Concepts
- Describe Core Azure Services
- Describe Core Solutions and Management Tools on Azure
- Describe general Security and Network Security Features
- Describe Identity, Governance, Privacy and Compliance Features
- Describe Azure Cost Management and Service Level Agreements
SC-900 Microsoft Security, Compliance and Identity Fundamentals
- Describe security and compliance concepts
- Describe identity concepts
- Describe the function and identity types of Microsoft Entra ID
- Describe the authentication capabilities of Microsoft Entra ID
- Describe access management capabilities of Microsoft Entra ID
- Describe the identity protection and governance capabilities of Microsoft Entra
- Describe core infrastructure security services in Azure
- Describe the security management capabilities in Azure
- Describe the capabilities in Microsoft Sentinel
- Describe threat protection with Microsoft 365 Defender
- Describe Microsoft’s Service Trust portal and privacy capabilities
- Describe the compliance management capabilities in Microsoft Purview
- Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview
- Describe the insider risk capabilities in Microsoft Purview
- Describe the eDiscovery and Audit capabilities in Microsoft Purview
AZ-104 Microsoft Azure Administrator
- Configure Microsoft Entra ID
- Configure user and group accounts
- Configure subscriptions
- Configure Azure Policy
- Configure role-based access control
- Configure Azure resources with tools
- Use Azure Resource Manager
- Configure resources with Azure Resource Manager templates
- Configure virtual networks
- Configure network security groups
- Configure Azure DNS
- Configure Azure Virtual Network peering
- Configure network routing and endpoints
- Configure Azure Load Balancer
- Configure Azure Application Gateway
- Configure storage accounts
- Configure Azure Blob Storage
- Configure Azure Storage security
- Configure Azure Files and Azure File Sync
- Configure Azure Storage with toolsUse Azure Storage Explorer
- Configure virtual machines
- Configure virtual machine availability
- Configure Azure App Service plans
- Configure Azure App Service
- Configure Azure Container Instances
- Configure file and folder backups
- Configure Azure Monitor
- Configure Azure alerts
- Configure Log Analytics
- Configure Network Watcher
AZ-500 Microsoft Azure Security Technologies
- Secure Azure solutions with Microsoft Entra ID
- Implement Hybrid identity
- Deploy Microsoft Entra ID Protection
- Configure Microsoft Entra Privileged Identity Management
- Design an enterprise governance strategy
- Implement perimeter security
- Configure network security
- Configure and manage host security
- Enable Containers security
- Deploy and secure Azure Key Vault
- Configure application security features
- Implement storage security
- Configure and manage SQL database security
- Configure and manage Azure Monitor
- Enable and manage Microsoft Defender for Cloud
- Configure and monitor Microsoft Sentinel
AZ-500 SkillBoost
Modul 1: Zero Trust (Sicherheit implementieren)
- Einführung und Anknüpfung an AZ-500
- Produkt Übersicht
- Monitoring und Kusto Query Language (KQL)
- Einführung und Anwendungsbeispiele
- Methoden und best Practices
- Praxis: härten der eigenen Umgebung
Module 2: Secure by Design (Sicherheit leben)
- Einführung: Abhängig vom Kenntnisstand
- Authentifizierung und Autorisierung
- Kryptografie
- Platformüberblick
- Exkurs: Business und Technologie
- Praxis: Betriebliche Optimierung
- Sicherheit vs. Kosten und Produktivität
Modul 3: KI (Künstliche Intelligenz) & Case Studies
- Einführung in KI und Produktivität
- Case studies
Scrum Foundation für Scrum Master und Product Owner
- Prinzipien und zugrundeliegende Theorie von Scrum
- Überblick über das Scrum Team
- Scrum Events
- Scrum Artefakte
- Die Rolle des Scrum Master
- Die Rolle des Product Owner
- Theorie-Input & Erfahrungslernen
- Vorbereitung auf die Zertifizierungen