Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 1: Secure identity and access-Manage security controls for identity and access-Manage Azure built-in role assignments
Chapter 2: Secure identity and access-Manage security controls for identity and access-Manage custom roles, including Azure roles and Microsoft Entra roles
Chapter 3: Secure identity and access-Manage security controls for identity and access-Implement and manage Microsoft Entra Permissions Management
Chapter 4: Secure identity and access-Manage security controls for identity and access-Plan and manage Azure resources in Microsoft Entra Privileged Identity Management, including settings and assignments
Chapter 5: Secure identity and access-Manage security controls for identity and access-Implement multi-factor authentication (MFA) for access to Azure resources
Chapter 6: Secure identity and access-Manage security controls for identity and access-Implement Conditional Access policies for cloud resources in Azure
Chapter 7: Secure identity and access-Manage Microsoft Entra application access-Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants
Chapter 8: Secure identity and access-Manage Microsoft Entra application access-Manage Microsoft Entra app registrations
Chapter 9: Secure identity and access-Manage Microsoft Entra application access-Configure app registration permission scopes
Chapter 10: Secure identity and access-Manage Microsoft Entra application access-Manage app registration permission consent
Chapter 11: Secure identity and access-Manage Microsoft Entra application access-Manage and use service principals
Chapter 12: Secure identity and access-Manage Microsoft Entra application access-Manage managed identities
Chapter 13: Secure networking -Plan and implement security for virtual networks-Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)
Chapter 14: Secure networking -Plan and implement security for virtual networks-Manage virtual networks by using Azure Virtual Network Manager
Chapter 15: Secure networking -Plan and implement security for virtual networks-Plan and implement user-defined routes (UDRs)
Chapter 16: Secure networking -Plan and implement security for virtual networks-Plan and implement Virtual Network peering or VPN gateway
Chapter 17: Secure networking -Plan and implement security for virtual networks-Plan and implement Virtual WAN, including secured virtual hub
Chapter 18: Secure networking -Plan and implement security for virtual networks-Secure VPN connectivity, including point-to-site and site-to-site
Chapter 19: Secure networking -Plan and implement security for virtual networks-Implement encryption over ExpressRoute
Chapter 20: Secure networking -Plan and implement security for virtual networks-Configure firewall settings on Azure resources
Chapter 21: Secure networking -Plan and implement security for virtual networks-Monitor network security by using Network Watcher
Chapter 22: Secure networking -Plan and implement security for private access to Azure resources-Plan and implement virtual network Service Endpoints
Chapter 23: Secure networking -Plan and implement security for private access to Azure resources-Plan and implement Private Endpoints
Chapter 24: Secure networking -Plan and implement security for private access to Azure resources-Plan and implement Private Link services
Chapter 25: Secure networking -Plan and implement security for private access to Azure resources-Plan and implement network integration for Azure App Service and Azure Functions
Chapter 26: Secure networking -Plan and implement security for private access to Azure resources-Plan and implement network security configurations for an App Service Environment (ASE)
Chapter 27: Secure networking -Plan and implement security for private access to Azure resources-Plan and implement network security configurations for an Azure SQL Managed Instance
Chapter 28: Secure networking -Plan and implement security for public access to Azure resources-Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management
Chapter 29: Secure networking -Plan and implement security for public access to Azure resources-Plan, implement, and manage an Azure Firewall, including Azure Firewall Manager and firewall policies
Chapter 30: Secure networking -Plan and implement security for public access to Azure resources-Plan and implement an Azure Application Gateway
Chapter 31: Secure networking -Plan and implement security for public access to Azure resources-Plan and implement an Azure Front Door, including Content Delivery Network (CDN)
Chapter 32: Secure networking -Plan and implement security for public access to Azure resources-Plan and implement a Web Application Firewall (WAF)
Chapter 33: Secure networking -Plan and implement security for public access to Azure resources-Recommend when to use Azure DDoS Protection Standard
Chapter 34: Secure compute, storage, and databases -Plan and implement advanced security for compute-Plan and implement remote access to virtual machines, including Azure Bastion and just-in-time (JIT)
Chapter 35: Secure compute, storage, and databases -Plan and implement advanced security for compute-Configure network isolation for Azure Kubernetes Service (AKS)
Chapter 36: Secure compute, storage, and databases -Plan and implement advanced security for compute-Secure and monitor AKS
Chapter 37: Secure compute, storage, and databases -Plan and implement advanced security for compute-Configure authentication for AKS
Chapter 38: Secure compute, storage, and databases -Plan and implement advanced security for compute-Configure security monitoring for Azure Container Instances (ACIs)
Chapter 39: Secure compute, storage, and databases -Plan and implement advanced security for compute-Configure security monitoring for Azure Container Apps (ACAs)
Chapter 41: Secure compute, storage, and databases -Plan and implement advanced security for compute-Configure disk encryption, including Azure Disk Encryption (ADE), encryption at host, and confidential disk encryption
Chapter 42: Secure compute, storage, and databases -Plan and implement advanced security for compute-Recommend security configurations for Azure API Management
Chapter 43: Secure compute, storage, and databases -Plan and implement security for storage-Configure access control for storage accounts
Chapter 44: Secure compute, storage, and databases -Plan and implement security for storage-Manage storage account access keys
Chapter 45: Secure compute, storage, and databases -Plan and implement security for storage-Select and configure an appropriate method for access to Azure Files
Chapter 47: Secure compute, storage, and databases -Plan and implement security for storage-Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage
Chapter 48: Secure compute, storage, and databases -Plan and implement security for storage-Configure Bring your own key (BYOK)
Chapter 49: Secure compute, storage, and databases -Plan and implement security for storage-Enable double encryption at the Azure Storage infrastructure level
Chapter 50: Secure compute, storage, and databases -Plan and implement security for Azure SQL Database and Azure SQL Managed Instance-Enable Microsoft Entra database authentication
Chapter 51: Secure compute, storage, and databases -Plan and implement security for Azure SQL Database and Azure SQL Managed Instance-Enable database auditing
Chapter 52: Secure compute, storage, and databases -Plan and implement security for Azure SQL Database and Azure SQL Managed Instance-Plan and implement dynamic masking
Chapter 53: Secure compute, storage, and databases -Plan and implement security for Azure SQL Database and Azure SQL Managed Instance-Implement Transparent Data Encryption (TDE)
Chapter 54: Secure compute, storage, and databases -Plan and implement security for Azure SQL Database and Azure SQL Managed Instance-Recommend when to use Azure SQL Database Always Encrypted
Chapter 55: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Implement and manage enforcement of cloud governance policies-Create, assign, and interpret policies and initiatives in Azure Policy
Chapter 56: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Implement and manage enforcement of cloud governance policies-Configure Azure Key Vault network settings
Chapter 57: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Implement and manage enforcement of cloud governance policies-Configure access to Key Vault, including vault access policies and Azure Role Based Access Control
Chapter 58: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Implement and manage enforcement of cloud governance policies-Manage certificates, secrets, and keys
Chapter 59: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Implement and manage enforcement of cloud governance policies-Configure key rotation
Chapter 60: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Implement and manage enforcement of cloud governance policies-Perform backup and recovery of certificates, secrets, and keys
Chapter 61: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Implement and manage enforcement of cloud governance policies-Implement security controls to protect backups
Chapter 62: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Implement and manage enforcement of cloud governance policies-Implement security controls for asset management
Chapter 63: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory
Chapter 64: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Assess compliance against security frameworks by using Microsoft Defender for Cloud
Chapter 65: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Manage compliance standards in Microsoft Defender for Cloud
Chapter 67: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Connect hybrid cloud and multi-cloud environments to Microsoft Defender for Cloud, including Amazon Web Services (AWS) and Google Cloud Platform (GCP)
Chapter 69: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Enable workload protection services in Microsoft Defender for Cloud
Chapter 70: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Configure Microsoft Defender for Servers, Microsoft Defender for Databases, and Microsoft Defender for Storage
Chapter 71: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Implement and manage agentless scanning for virtual machines in Microsoft Defender for Servers
Chapter 72: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Implement and manage Microsoft Defender Vulnerability Management for Azure virtual machines
Chapter 73: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Connect to and configure settings in Microsoft Defender for Cloud Devops Security, including GitHub, Azure DevOps, and GitLab
Chapter 74: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Configure and manage security monitoring and automation solutions-Manage and respond to security alerts in Microsoft Defender for Cloud
Chapter 75: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Configure and manage security monitoring and automation solutions-Configure workflow automation by using Microsoft Defender for Cloud
Chapter 76: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Configure and manage security monitoring and automation solutions-Monitor network security events and performance data by configuring data collection rules (DCRs) in Azure Monitor
Chapter 77: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Configure and manage security monitoring and automation solutions-Configure data connectors in Microsoft Sentinel
Chapter 78: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Configure and manage security monitoring and automation solutions-Enable analytics rules in Microsoft Sentinel
Chapter 79: Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel -Configure and manage security monitoring and automation solutions-Configure automation in Microsoft Sentinel

Combo Packages at a Discount: Get one that best fits your learning needs.