Guangning Yu's Blog
Home
Code
Data
Setup
Industry
MachineLearning
Archive
Notes | AZ-500 Microsoft Azure Security Technologies
2022-12-05 14:56:13
|
Azure
# The Azure AD Identity Platform     ## Managing Azure AD Tenant and Azure Subscription Associations      ## Azure AD Identities   ## Azure AD Groups     ## Azure AD Dynamic Groups     ## Azure AD Administrative Units     # Hybrid Identity ## Azure AD Connect and Hybrid Identities         ## Azure AD External Identities       ## User Flows with External Identities   # Controlling Access ## Securing Azure and Azure Active Directory (AD)   ## Azure Role-Based Access Control (RBAC)        ## Azure AD Roles       ## Custom Roles        # Securing Identities and Access  ## Azure AD Privileged Identity Management (PIM)         ## Access Reviews          ## Azure AD Identity Protection         ## Conditional Access      ## Azure AD Passwordless Authentication    # Securing Virtual Networks ## Virtual Network Routing      ## Network Security Groups     ## Augmented Security Rules    ## Azure Firewall           ## Azure Firewall Manager       ## DDoS Protection       # Securing Integrated Networks and Services ## Service Endpoints     ## Private Link       ## VNet Peering     ## Virtual Private Networks (VPN)       ## ExpressRoute      ## Service Firewalls        ## Application Gateway      ## Azure Front Door      ## Web Application Firewalls (WAF)    # Securing Virtual Machines ## Azure Bastion   ## Just-in-Time VM Access     ## VM Endpoint Protection      ## Azure Disk Encryption      ## Managing VM Updates    # Securing Applications with Azure AD ## Service Principals    ## Managed Identities    ## API Access to Microsoft     ## Delegated Permissions and Consent          ## Application Permissions and Consent        # Securing Data with Key Vault ## Key Vault Overview     ## Key Vault Administration      ## Key Vault Backup and Recovery    # Securing Application Hosting ## Azure App Service Security       ## Azure Functions Security      ## App Service Environments    ## Azure Container Registry Security      ## Azure Container Instance Security      ## Azure Kubernetes Service Security       # Securing Storage ## Storage Account Access Control          ## Azure Storage with Azure AD Authentication      ## Azure Files with Azure AD DS (Domain Services) Authentication     # Securing Data ## Azure SQL Authentication           ## Azure SQL Database Encryption       ## Dynamic Masking for SQL on Azure    ## Network Isolation for Data Solutions      ## Database Auditing    # Security Policies and Standards ## Azure Policy           ## Resource Locks     ## Azure Blueprints      # Threat Protection in Azure ## Azure Security Center Overview     ## Azure Security Center Policy Management      ## Azure Defender for SQL        ## Azure Defender for Servers     ## Microsoft Threat Modeling Tool     # Monitoring Security with Azure Monitor ## Azure Monitor Overview   ## Logging and Retention      ## Azure Monitor Logs             ## Azure Monitor Alerts      # Monitoring Security with Azure Sentinel ## Azure Sentinel Overview       ## Azure Sentinel Configuration     ## Azure Sentinel Alerts and Incidents        # Conclusion ## Preparing for the Exam   
Previous:
Azure Certification Guide
Next:
Setup OpenVPN Command Line on Ubuntu