Back

Azure Security Specialist

This comprehensive course is designed to teach security professionals how to secure Azure Entra ID and the broader range of Azure services. It combines theory with practical, hands-on labs and provides best practices for configuring and maintaining a secure Azure environment.

Tarek

Lead Trainer

Description
Coming soon

Course Curriculum

Introduction To Azure and Entra ID

2 lessons

1. Introduction to Azure and Entra ID

2. Basics of Azure architecture

Log Collection in Azure

2 lessons

3. Collecting activity logs

4. Collecting Entra ID Logs

Azure Network Security

5 lessons

5. Azure networking and VNets

6. Understanding Azure Service Endpoints

7. Understanding Azure Private Endpoints

8. Understanding Azure NSGs

9. Understanding Azure Firewalls

Securing Against Initial Access Attacks

4 lessons

10. Password spraying playbook

11. Password spraying detection, investigation and remediation

12. How consent phishing works

13. Consent phishing detection, investigation and remediation

The Power Of Conditional Access Policies

4 lessons

14. What are Conditional Access Policies and how to use them

15. Findings gaps in Conditional Access Policies

16. Identifying misconfigured Conditional Access Policies

17. Conditional Access Policies best practices

The Complexities of Azure Identity Security

4 lessons

18. Understanding IAM and RBAC

19. Implementing identity governance

20. Reviewing and understanding Identity Secure Score

21. PIM and other security features

Securing Azure Storage

4 lessons

22. Detecting early signs of an attack - storage enumeration

23. Understanding and analyzing storage access methods

24. Identifying misconfigured storage accounts

25. Securing storage and enforcing governance

Securing Azure Service Principals

3 lessons

26. Changing default security misconfigurations in Azure

27. Monitoring Azure service principals logins

28. Highlighting risky service principals in Azure

Azure Key Vault Security

5 lessons

29. How are Azure key vaults protected

30. Security issues with policy based key vaults

31. Locking down Azure key vaults with RBAC

32. Firewalling Azure key vaults for extra security

33. Hardening Azure key vaults using endpoints

Azure Virtual Machine Security

5 lessons

34. Common vulnerabilities in Azure VMs

35. How Azure VMs get hacked

36. Securing Azure VMs with identity

37. Securing Azure VMs with update management

38. Applying disk encryption to Azure VMs