Select Page

Azure Specialist Security Engineer

Specialize in protecting cloud environments in Microsoft Azure, one of the most widely used environments by companies worldwide, with the cloud cybersecurity standards that modern organizations demand. Learn to manage identities, protect networks, implement security policies, and respond to threats like an expert.

 

REQUEST MORE INFORMATION

     

      Demo Video
      Infórmate Infórmate

      About the Azure Security Engineer Specialist course

      This course follows the official Microsoft Imagine Academy program for obtaining the official AZ-500: Microsoft Azure Security Engineer Associate certification. You will learn to secure cloud environments, manage identities, implement access controls, protect workloads, and apply threat detection and response strategies. Throughout the training, you will work with key Azure security tools and services such as Microsoft Defender for Cloud, Azure Key Vault, Azure Security Center, Azure Firewall, and Sentinel, among others. This is a technical course aimed at IT professionals with prior experience in Azure or cybersecurity who want to specialize in cloud security with a practical approach applicable to real-world business environments.

       Duration:

      100 Hours / 1 month

       Mode:

      On-line

       Prerequisites:

      Basic knowledge of computers and the Internet

      Official Certification

      Students gain official registration as technicians in a specific technology, which certifies them to practice their profession internationally. We certify our students worldwide.

      • * AZ-500 Microsoft Certified: Azure Security Engineer Associate

      Job opportunities

      Work as an Azure Security Engineer or Cloud Cybersecurity Specialist in enterprise environments using Microsoft Azure. With the AZ-500 certification, you'll be able to access specialized cloud security positions within Microsoft Azure environments, a highly sought-after area for companies operating in the cloud. You'll be able to work in roles such as: Azure Security Engineer, Cloud Security Specialist, Azure Cybersecurity Consultant, Cloud Security Administrator, or SOC Analyst with Azure Sentinel expertise.
      You'll have opportunities in technology companies, consulting firms, cybersecurity teams, regulated sectors (banking, healthcare, public administration), and any organization that operates in Azure and requires advanced protection of data, identities, and cloud resources.

      Through Cloud TalentThe school connects you with more than 10,000 companies and generates job interviews and internships tailored to your professional profile. Additionally, the Cloud Talent Program gives you access to other complementary SAP certifications at no cost to enhance your qualifications.

      Syllabus

      Manage identity and access - Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM and Hybrid Identity
      • Manage identity and access. This module covers Azure Active Directory,
      • Azure Identity Protection, Enterprise Governance, Azure AD PIM and Hybrid Identity.
      • Azure Active Directory.
      • Azure Identity Protection.
      • Corporate governance.
      • Azure AD Privileged Identity Management.
      • Hybrid identity.
      • Role-based access control.
      • Azure Policies.
      • Resource manager locks.
      • MFA, Conditional Access, and AAD Identity Protection.
      • Azure AD Privileged Identity Management.
      • Implement directory synchronization.
      Identity and access objectives
      • Implement enterprise governance strategies that include role-based access control, Azure policies, and resource locks.
      • Deploy an Azure AD infrastructure that includes users, groups, and multi-factor authentication.
      • Implement Azure AD Identity Protection, including risk policies, conditional access, and access reviews.
      • Implement Azure AD Privileged Identity Management, including Azure AD roles and Azure resources.
      • Implement Azure AD Connect, including authentication methods and local directory synchronization.
      • Corporate governance.
      Implement platform protection - perimeter, network, host, and container security
      • Perimeter security.
      • Network security.
      • Host security.
      • Container security.
      • Network security groups and application security groups.
      • Azure Firewall.
      • Setting up and securing ACR and AKS.
      Platform protection objectives
      • Implement perimeter security strategies, including Azure Firewall.
      • Implement network security strategies, including network security groups and application security groups.
      • Implement host security strategies, including endpoint protection, remote access management, update management, and disk encryption.
      • Implement container security strategies, including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
      Secure data and applications - Azure Key Vault, application security, storage security, and SQL database security
      • Azure Key Vault..
      • Application security.
      • Storage security.
      • SQL Database Security.
      • Key Vault (implementing secure data by configuring Always Encrypted).
      • Securing your Azure SQL Database.
      • Service connection points and secure storage.
      Objectives Secure data and applications
      • Deploy Azure Key Vault, including certificates, keys, and secrets.
      • Implement application security strategies, including application registration, managed identities, and service endpoints.
      • Implement storage security strategies, including shared access signatures, blob retention policies, and Azure Files authentication.
      • Implement database security strategies that include authentication, data classification, dynamic data masking, and always-on encryption.
      Manage security operations - Azure Monitor, Azure Security Center, and Azure Sentinel.
      • Azure Monitor.
      • Azure Security Center.
      • Azure Sentinel.
      • Laboratories.
      Security operations objectives
      • Deploy Azure Monitor, including connected sources, log analytics, and alerts.
      • Implement Azure Security Center, including policies, recommendations, and just-in-time access to the virtual machine.
      • Deploy Azure Sentinel, including workbooks, incidents, and playbooks.
      Final Project
      • Course review.
      • Case study.
      Official Certification Seminar
      • Preparation of exam-type questions.

      Subsidized Training for Companies

      Cloud Training as an entity registered with code 16753 in the State Registry of Training Entities, Manages and teaches courses within the Company-Programmed Training initiative, Vocational Training for Employment, in accordance with the provisions of Law 30/2015, of September 9.

      Cloud Training helps you check your company's credit amount for this year, free of charge.