Microsoft Azure Security, Part 3 of 8: Role-Based Access
Interactive

Microsoft Azure Security, Part 3 of 8: Role-Based Access

LearnNow Online
Updated Oct 15, 2019

Course description

This course helps prepare for the Microsoft Certified: Azure Security Engineer (AZ-500 exam). It will cover Role-based Access Control which consists of: Role-based Access Control, Azure AD Application Registration and Managed Identities.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

Candidates for this exam should have strong skills in scripting and automation, a deep understanding of networking, virtualization, and cloud N-tier architecture, and a strong familiarity with cloud capabilities.


Meet the expert

Varma Rudra

Varma has over 14 years of experience in defining the integrated process, application, data & cloud architectures for both corporate & large scale multi-million business transformation programs and has worked extensively in defining strategy for migration of on-premise applications into AWS & Azure Cloud IaaS, PaaS, SaaS platforms. He is a TOGAF certified enterprise architect, PRINCE2 practitioner, and hold several certifications in SAP and cloud space.

Video Runtime

84 Minutes

Time to complete

104 Minutes

Course Outline

Role based access control

Role Based Access Control (37:33)

  • Introduction (00:13)
  • Role Based Access Control (11:35)
  • Demo: Walkthorugh of roles (18:39)
  • Demo: Creation of Dynamic group and role assignme (06:58)
  • Summary (00:08)

Azure AD App Registration (32:33)

  • Introduction (00:08)
  • Azure AD App registrations (10:52)
  • Demo: Creation of service principle (21:25)
  • Summary (00:08)

Managed Identities (14:13)

  • Introduction (00:08)
  • Introduction to Managed Identities (07:22)
  • Demo: Creation of managed service identity (06:35)
  • Summary (00:08)