Microsoft Azure Security, Part 4 of 8: Azure Policies
Interactive

Microsoft Azure Security, Part 4 of 8: Azure Policies

LearnNow Online
Updated Sep 04, 2020

Course description

This course helps prepare for the Microsoft Certified: Azure Security Engineer (AZ-500 exam). It will cover Azure Policies which consists of : Azure Policies, Resource Providers and Locks, AAD Privileged Identity and Protect AD Roles with PIM.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

Candidates for this exam should have strong skills in scripting and automation, a deep understanding of networking, virtualization, and cloud N-tier architecture, and a strong familiarity with cloud capabilities.


Meet the expert

Varma Rudra

Varma has over 14 years of experience in defining the integrated process, application, data & cloud architectures for both corporate & large scale multi-million business transformation programs and has worked extensively in defining strategy for migration of on-premise applications into AWS & Azure Cloud IaaS, PaaS, SaaS platforms. He is a TOGAF certified enterprise architect, PRINCE2 practitioner, and hold several certifications in SAP and cloud space.

Video Runtime

88 Minutes

Time to complete

152 Minutes

Course Outline

Azure Policies

Azure Policies (30:21)

  • Introduction (00:13)
  • Introduction to Azure policies (14:36)
  • Demo: Implement Azure policies and initiatives (15:24)
  • Summary (00:08)

Resource Providers and Locks (13:34)

  • Introduction (00:08)
  • Introduction to Resource Providers and Locks (06:50)
  • Demo: Manage resource providers and locks (06:27)
  • Summary (00:08)

AAD Privileged Identity (22:57)

  • Introduction (00:08)
  • Introduction to Azure AD Privileged identity mana (12:01)
  • Demo: Enable AAD PIM and carry out access reviews (10:39)
  • Summary (00:08)

Protect AD Roles with PIM (21:40)

  • Introduction (00:08)
  • Demo: Protect AD roles with PIM (10:46)
  • Demo: Protect resource roles with PIM (10:37)
  • Summary (00:08)
;