AZ-500 Microsoft Security Engineer
This course is relevant and corresponds to the latest version of the AZ-500 exam (from April 30, 2024).
Microsoft Certified Azure Security Engineer certification can truly give you an advantage in today's market. The exam covers security features and products for a wide range of Azure services and focuses on practical skill development that you can use to secure Azure solutions in the real world.
Throughout the course, you will gain a lot of experience in configuring and deploying secure solutions in Azure. My goal is not only to help you pass the exam but also to ensure a deep understanding of how and why you should use these Azure security services.
More
Who can take this course?
This course is designed for students with varying levels of preparation and experience. We will gradually build knowledge and experience working with different services so that you can get acquainted with the main products and functions before moving on to more advanced services and settings.
You do not need to complete courses AZ-104 or AZ-305 before starting this course — everything necessary for learning is included.
Watch Online AZ-500 Microsoft Security Engineer
# | Title | Duration |
---|---|---|
1 | Welcome to the Course | 04:15 |
2 | Let's Connect | 03:22 |
3 | [SHARED] Entra ID Overview | 11:23 |
4 | [SHARED] Demo - Exploring your Entra ID Tenant | 05:13 |
5 | [SHARED] Demo - About the Free Azure Subscription | 04:51 |
6 | [SHARED] Demo - Create and Manage Entra ID Tenants | 07:45 |
7 | [SHARED] Demo - Create and Manage Azure Subscriptions | 10:03 |
8 | [SHARED] Demo - Configure Domains for Entra ID | 06:43 |
9 | [SHARED] Entra ID User Identities | 03:41 |
10 | [SHARED] Demo - Create and Manage User Identities | 06:17 |
11 | [SHARED] Demo - Bulk Create User Identities | 02:41 |
12 | Demo - Quick Look at Permissions | 05:26 |
13 | Demo - Entra Tenant User Settings | 04:44 |
14 | [SHARED] Entra ID Application Identities | 05:17 |
15 | [SHARED] Demo - Register an Application in Entra ID | 10:04 |
16 | [SHARED] Managed Identities | 06:21 |
17 | [SHARED] Demo - Configure Managed Identities (System-Assigned) | 10:55 |
18 | [SHARED] Demo - Configure Managed Identities (User-Assigned) | 06:23 |
19 | [SHARED] Entra ID Groups | 06:57 |
20 | [SHARED] Demo - Create and Manage Groups | 06:37 |
21 | [SHARED] Demo - Manage Entra ID Licenses | 07:54 |
22 | [SHARED] Entra ID Dynamic Groups | 05:18 |
23 | [SHARED] Demo - Create and Manage Dynamic Groups | 04:58 |
24 | [SHARED] Entra ID Administrative Units | 08:27 |
25 | [SHARED] Demo - Configure Administrative Units | 06:26 |
26 | Case Study - Entra Essentials Security | 07:41 |
27 | [SHARED] Azure Role-Based Access Control (RBAC) | 10:02 |
28 | [SHARED] Demo - Manage Azure Resource Security with RBAC | 10:12 |
29 | Demo - Exploring Built-in Azure RBAC Roles | 03:54 |
30 | [SHARED] Entra ID Roles | 04:50 |
31 | [SHARED] Demo - Manage Entra ID Permissions | 05:56 |
32 | Demo - Exploring Built-in Entra Roles | 03:32 |
33 | [SHARED] Azure RBAC Custom Roles | 09:24 |
34 | [SHARED] Demo - Configure a Custom RBAC Role | 07:48 |
35 | [SHARED] Entra ID Custom Roles | 03:39 |
36 | [SHARED] Demo - Configure a Custom Entra ID Role | 03:49 |
37 | Case Study - Identity and Access Management Security | 07:46 |
38 | Entra Multi-Factor Authentication (MFA) | 08:35 |
39 | Demo - Explore MFA Default Settings | 03:59 |
40 | Demo - About Migrating to Entra Auth Method Policies | 03:56 |
41 | Demo - Configure the Microsoft Authenticator App for a User | 06:38 |
42 | Demo - Explore Legacy MFA Settings | 05:37 |
43 | Entra Authentication Methods | 08:41 |
44 | Demo - Disable Security Defaults and Registration Campaign | 03:52 |
45 | Demo - Configure Entra Auth Method Policies | 04:26 |
46 | Demo - Complete the Migration to Auth Method Policies | 08:54 |
47 | Demo - Enable Entra Security Defaults and Registration Campaign | 02:27 |
48 | Entra Passwordless Authentication | 06:14 |
49 | Demo - Configure Entra Passwordless Authentication | 05:36 |
50 | Entra Password Protection | 04:06 |
51 | Demo - Configure Password Protection | 03:31 |
52 | [SHARED] Entra ID Self-Service Password Reset (SSPR) | 07:06 |
53 | [SHARED] Demo - Configure SSPR | 07:23 |
54 | Entra Verified ID | 10:58 |
55 | Demo - Configure Entra Verified ID (Quick Wizard) | 05:38 |
56 | Case Study - Entra Authentication | 07:46 |
57 | [SHARED] Entra Connect | 08:19 |
58 | Demo - Setup Active Directory in Azure (Part 1) | 11:39 |
59 | Demo - Setup Active Directory in Azure (Part 2) | 09:38 |
60 | Demo - Configure Entra Connect Cloud Sync | 13:21 |
61 | Demo - Configure Seamless SSO with Entra Connect Cloud Sync | 12:57 |
62 | Demo - Disable Entra Connect Cloud Sync | 10:24 |
63 | [SHARED] Entra Domain Services | 04:22 |
64 | Demo - Configure Entra Domain Services | 12:28 |
65 | Demo - Delete an Entra Domain Services Managed Domain | 01:28 |
66 | [SHARED] Entra ID External Identities | 10:09 |
67 | [SHARED] Demo - Invite a Guest with B2B Collaboration | 10:06 |
68 | Demo - Configure B2B Collaboration with Google | 12:35 |
69 | [SHARED] Entra ID App Proxy | 07:02 |
70 | [SHARED] Demo - Configure Entra ID App Proxy for a Web App | 12:20 |
71 | Case Study - Hybrid Identities and Access | 08:21 |
72 | [SHARED] Entra ID Governance Overview | 07:17 |
73 | [SHARED] Entra ID Entitlement Management | 07:03 |
74 | [SHARED] Demo - Create and Use an Access Package | 11:46 |
75 | [SHARED] Entra ID Privileged Identity Management (PIM) | 05:50 |
76 | [SHARED] Demo - Configure PIM for Entra Roles | 09:01 |
77 | [SHARED] Entra ID Access Reviews | 07:18 |
78 | [SHARED] Demo - Create and Run an Access Review (Entra Roles) | 08:32 |
79 | [SHARED] Entra ID Protection | 08:23 |
80 | [SHARED] Demo - Explore ID Protection Policies | 05:05 |
81 | [SHARED] Entra ID Conditional Access | 07:41 |
82 | [SHARED] Demo - Configure Conditional Access Policies | 12:33 |
83 | Entra Permissions Management (EPM) | 05:55 |
84 | Demo - Start a Free Trial for EPM | 04:23 |
85 | Demo - Setup Data Collection for Azure with EPM | 06:21 |
86 | Demo - Explore EPM Reporting and Analytics | 07:36 |
87 | Case Study - Entra Authorization | 06:31 |
88 | [SHARED] Virtual Networks | 11:20 |
89 | [SHARED] Demo - Configure a VNet | 05:32 |
90 | [SHARED] IP Addressing | 11:01 |
91 | [SHARED] Demo - Configure a NAT Gateway | 06:21 |
92 | [SHARED] Network Security Groups (NSG) | 14:21 |
93 | [SHARED] Demo - Configure an NSG | 08:51 |
94 | [SHARED] Augmented Security Rules | 07:04 |
95 | [SHARED] Demo - Use ASGs and Service Tags | 09:29 |
96 | Case Study - Virtual Network Security | 05:56 |
97 | [SHARED] Virtual Machines | 11:08 |
98 | [SHARED] Demo - Create and Manage VMs | 09:53 |
99 | VM Encryption with Azure Disk Encryption (ADE) | 05:31 |
100 | Demo - Configure Azure Disk Encryption (ADE) for a VM | 04:33 |
101 | Azure VM Encryption at Host | 07:03 |
102 | Demo - Configure Encryption at Host | 12:19 |
103 | Azure VM Confidential Disk Encryption | 06:30 |
104 | Demo - Configure VM Confidential Disk Encryption | 05:31 |
105 | Azure Bastion | 05:53 |
106 | Demo - Configure Azure Bastion | 05:01 |
107 | Case Study - Virtual Machine Security | 05:36 |
108 | [SHARED] Azure Storage Overview | 10:36 |
109 | [SHARED] Demo - Create an Azure Storage Account | 06:43 |
110 | [SHARED] Azure Blob Storage Overview | 08:40 |
111 | [SHARED] Demo - Working with Blob Storage | 11:39 |
112 | [SHARED] Azure Storage Access Control | 13:52 |
113 | [SHARED] Demo - Access Storage with Keys and Shared Access Signatures (SAS) | 13:02 |
114 | [SHARED] Demo - Access Azure Storage using Entra ID Identities and RBAC | 05:10 |
115 | [SHARED] Immutable Blob Storage | 06:25 |
116 | [SHARED] Demo - Configure Immutable Storage Access Policies | 08:41 |
117 | [SHARED] Azure Storage Encryption | 05:41 |
118 | [SHARED] Demo - Configure Azure Storage Encryption | 07:18 |
119 | [SHARED] Azure Files | 08:11 |
120 | [SHARED] Demo - Create and Connect to an Azure Files Share | 07:22 |
121 | [SHARED] Azure Files Connectivity and Access Control | 09:42 |
122 | [SHARED] Demo - Configure Identity Auth for Azure Files (using Azure AD DS) | 12:07 |
123 | Case Study - Storage Security | 09:34 |
124 | User Defined Routing | 13:28 |
125 | Demo - Configure User Defined Routes | 12:31 |
126 | [SHARED] VNet Peering | 07:24 |
127 | [SHARED] Demo - Configure VNet Peering | 07:59 |
128 | [SHARED] Service Endpoints | 05:04 |
129 | [SHARED] Demo - Configure a Service Endpoint for Azure Files | 04:32 |
130 | [SHARED] Private Link | 07:14 |
131 | [SHARED] Demo - Configure a Private Endpoint for Azure Files | 07:39 |
132 | Demo - Private Link Service | 12:40 |
133 | Resource Firewalls | 05:56 |
134 | Demo - Configure a Storage Account Firewall | 07:49 |
135 | [SHARED] VPN Gateway | 07:13 |
136 | Demo - Connect VNets with S2S VPN | 13:34 |
137 | [SHARED] ExpressRoute | 07:28 |
138 | [SHARED] Azure Virtual WAN | 07:44 |
139 | Case Study - Private Network Security | 07:42 |
140 | [SHARED] Azure App Service | 11:21 |
141 | [SHARED] Demo - Create a Web App with Azure App Service | 12:11 |
142 | [SHARED] App Service Deployments | 08:17 |
143 | [SHARED] Demo - Deploy a Web App to App Service | 03:36 |
144 | [SHARED] App Service Networking | 05:54 |
145 | [SHARED] App Service Security | 03:47 |
146 | Azure Functions | 12:40 |
147 | Demo - Create Azure Functions | 10:40 |
148 | Azure App Service Environment | 06:41 |
149 | Demo - Create an App Service Environment | 09:00 |
150 | Case Study - App Hosting Security | 05:22 |
151 | [SHARED] Azure Container Registry | 06:47 |
152 | [SHARED] Demo - Create a Container Registry and Push a Container | 08:01 |
153 | [SHARED] Demo - Build and Push an Image with ACR Tasks | 03:33 |
154 | [SHARED] Azure Container Instances | 08:14 |
155 | [SHARED] Demo - Create an Azure Container Instance | 06:57 |
156 | [SHARED] Azure Kubernetes Service (AKS) | 09:56 |
157 | [SHARED] AKS Networking Overview | 10:32 |
158 | [SHARED] Demo - Create and Manage an AKS Cluster | 11:03 |
159 | [SHARED] Demo - Deploy an App to AKS using YAML | 08:20 |
160 | [SHARED] Azure Container Apps | 08:27 |
161 | [SHARED] Demo - Getting Started with Azure Container Apps | 08:39 |
162 | Azure Container Security Considerations | 06:43 |
163 | Demo - Isolate ACR and Push a Signed Image | 09:15 |
164 | Demo - Create an Isolated Azure Container App | 10:52 |
165 | Case Study - Container Hosting Security | 07:15 |
166 | Key Vault | 07:52 |
167 | Demo - Configure and Use Key Vault from a VM | 12:13 |
168 | Demo - Push a Container to ACR using a Key Vault Secret | 05:30 |
169 | Demo - Key Vault with Access Policy | 08:30 |
170 | Demo - Key Vault Key Rotation | 05:16 |
171 | Demo - Protect Key Vault Data | 05:49 |
172 | Demo - Backup and Restore Key Vault Data | 03:23 |
173 | Entra Permission and Consent | 07:27 |
174 | Demo - Configure an App with Delegated Permissions | 10:56 |
175 | Demo - Configure an App with App Permissions | 04:11 |
176 | Case Study - App Data and Access Security | 05:41 |
177 | Azure SQL Overview | 11:23 |
178 | Demo - Create and Connect to Azure SQL Database | 10:12 |
179 | Demo - Configure an Entra ID Identity for Azure SQL DB | 02:42 |
180 | Azure SQL Transparent Data Encryption (TDE) | 04:15 |
181 | Demo - Configure Customer Managed TDE for Azure SQL DB | 06:27 |
182 | Azure SQL Always Encrypted | 04:38 |
183 | Demo - Configure Always Encrypted for Azure SQL DB | 07:33 |
184 | Azure SQL Dynamic Data Masking | 03:15 |
185 | Demo - Configure Dynamic Data Masking for Azure SQL DB | 04:53 |
186 | Case Study - Database Security | 08:05 |
187 | [SHARED] Azure Firewall | 09:27 |
188 | [SHARED] Demo - Configure an Azure Firewall | 14:55 |
189 | [SHARED] Azure Load Balancer | 07:45 |
190 | [SHARED] Demo - Configure Regional Load Balancing for VMs | 13:22 |
191 | [SHARED] Azure Application Gateway | 09:16 |
192 | [SHARED] Demo - Configure App Gateway and Path-Based Routing | 13:44 |
193 | Azure Traffic Manager | 07:05 |
194 | Demo - Configure Traffic Manager | 08:09 |
195 | Azure Front Door | 07:32 |
196 | Demo - Configure Front Door for a Web App | 11:22 |
197 | Web Application Firewalls (WAF) | 04:51 |
198 | Demo - Configure a Global WAF | 06:19 |
199 | Azure API Management Overview | 07:53 |
200 | DDoS Protection | 09:02 |
201 | Demo - Configure DDoS Network Protection Plan | 05:17 |
202 | Demo - Configure DDoS IP Protection Plan | 03:28 |
203 | Case Study - Public Network Security | 07:51 |
204 | Microsoft Purview | 05:57 |
205 | Demo - Get Started with Microsoft Purview | 05:06 |
206 | Demo - Map and Scan Azure SQL with Microsoft Purview | 11:47 |
207 | [SHARED] Management Groups | 08:09 |
208 | [SHARED] Demo - Create Management Groups | 06:01 |
209 | [SHARED] Resource Tagging | 03:12 |
210 | [SHARED] Demo - Create and Query Resource Tags | 04:56 |
211 | [SHARED] Resource Locks | 04:26 |
212 | [SHARED] Demo - Resource Locks | 05:23 |
213 | [SHARED] Azure Policy | 11:25 |
214 | [SHARED] Demo - Configure Azure Policies | 11:50 |
215 | Azure Blueprints | 06:55 |
216 | Demo - Deploy Secure Solutions with Blueprints | 12:37 |
217 | Secure Landing Zones | 09:19 |
218 | Case Study - Security Standards and Governance | 06:21 |
219 | Defender for Cloud Overview | 09:58 |
220 | Demo - Get Started with Defender for Cloud | 08:23 |
221 | Demo - Explore Defender for Cloud Trial Plans | 04:15 |
222 | Demo - Assess Risks with Defender for Cloud | 06:16 |
223 | Demo - Manage Risks with Defender for Cloud | 10:14 |
224 | Demo - Explore Defender for Cloud Compliance with MCSB | 04:17 |
225 | Demo - Add Regulatory Standards with Defender for Cloud | 06:01 |
226 | Demo - Create a Custom Standard in Defender for Cloud | 07:22 |
227 | Defender for Servers Overview | 05:56 |
228 | Demo - Configure Defender for Server | 07:13 |
229 | Demo - Explore Defender Vulnerability Management | 06:50 |
230 | Demo - Connect Defender for Cloud to AWS | 12:38 |
231 | Demo - Connect Defender for Cloud using Arc | 09:40 |
232 | Demo - Configure Just in Time VM Access for Azure VMs | 09:30 |
233 | Demo - Workflow Automation with Defender for Cloud | 09:34 |
234 | Defender for Databases Overview | 04:30 |
235 | Demo - Configure Defender for Azure SQL Database | 11:26 |
236 | Defender EASM Overview | 08:53 |
237 | Demo - Explore Defender EASM | 07:56 |
238 | Case Study - Securing Solutions with Defender | 06:14 |
239 | [SHARED] Azure Monitor Overview | 11:38 |
240 | [SHARED] Demo - Configure VM Monitoring | 09:07 |
241 | [SHARED] Activity Logs | 04:15 |
242 | [SHARED] Demo - Review and Archive Activity Logs | 03:31 |
243 | [SHARED] Azure Monitor Logs | 06:35 |
244 | [SHARED] Demo - Configure and Query Azure Monitor Logs | 11:25 |
245 | [SHARED] Azure Monitor Alerts | 05:13 |
246 | [SHARED] Demo - Configure Azure Monitor Alerts | 11:26 |
247 | [SHARED] Network Watcher | 12:08 |
248 | [SHARED] Demo - Monitor Connections with Network Watcher | 07:11 |
249 | [SHARED] Demo - Network Diagnostics with Network Watcher | 07:46 |
250 | [SHARED] Demo - NSG Flow Logs and Traffic Analytics | 05:11 |
251 | Azure SQL Audit Logs | 03:01 |
252 | Demo - Configure Auditing for Azure SQL DB | 07:23 |
253 | Microsoft Sentinel Overview | 08:33 |
254 | Demo - Get Started with Sentinel | 06:08 |
255 | Demo - Connect a Windows VM to Sentinel | 10:04 |
256 | Demo - Analyze Windows Security Events with Sentinel | 10:27 |
257 | Demo - Manage Incidents in Sentinel | 04:51 |
258 | Demo - Configure Automation in Sentinel | 10:10 |
259 | Case Study - Security Monitoring | 07:44 |