MCA microsoft certified associate azure security engineer study guide exam AZ-500

Prepare for the MCA Azure Security Engineer certification exam faster and smarter with help from Sybex In the MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500, cybersecurity veteran Shimon Brathwaite walks you through every step you need to take to prepare for the M...

Descripción completa

Detalles Bibliográficos
Otros Autores: Brathwaite, Shimon, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc [2023]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009703307606719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents at a Glance
  • Contents
  • Introduction
  • What Does This Book Cover?
  • Who Should Read This Book
  • Study Guide Features
  • Interactive Online Learning Environment and Test Bank
  • Additional Resources
  • MCA Azure Security Engineer Study Guide Exam Objectives
  • Objective Map
  • How to Contact Wiley or the Author
  • Assessment Test
  • Answers to Assessment Test
  • Chapter 1 Introduction to Microsoft Azure
  • What Is Microsoft Azure?
  • Cloud Environment Security Objectives
  • Confidentiality
  • Integrity
  • Availability
  • Nonrepudiation
  • Common Security Issues
  • Principle of Least Privilege
  • Zero-Trust Model
  • Defense in Depth
  • Avoid Security through Obscurity
  • The AAAs of Access Management
  • Encryption
  • End-to-End Encryption
  • Symmetric Key Encryption
  • Asymmetric Key Encryption
  • Network Segmentation
  • Basic Network Configuration
  • Unsegmented Network Example
  • Internal and External Compliance
  • Cybersecurity Considerations for the Cloud Environment
  • Configuration Management
  • Unauthorized Access
  • Insecure Interfaces/APIs
  • Hijacking of Accounts
  • Compliance
  • Lack of Visibility
  • Accurate Logging
  • Cloud Storage
  • Vendor Contracts
  • Link Sharing
  • Major Cybersecurity Threats
  • DDoS
  • Social Engineering
  • Password Attacks
  • Malware
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 2 Managing Identity and Access in Microsoft Azure
  • Identity and Access Management
  • Identifying Individuals in a System
  • Identifying and Assigning Roles in a System and to an Individual
  • Assigning Access Levels to Individuals or Groups
  • Adding, Removing, and Updating Individuals and Their Roles in a System
  • Protecting a System's Sensitive Data and Securing the System
  • Enforcing Accountability
  • IAM in the Microsoft Azure Platform.
  • Creating and Managing Azure AD Identities
  • Managing Azure AD Groups
  • Managing Azure Users
  • Adding Users to Your Azure AD
  • Managing External Identities Using Azure AD
  • Managing Secure Access Using Azure Active Directory
  • Implementing Conditional Access Policies, Including MFA
  • Implementing Azure AD Identity Protection
  • Enabling the Policies
  • Implement Passwordless Authentication
  • Configuring an Access Review
  • Managing Application Access
  • Integrating Single Sign-On and Identity Providers for Authentication
  • Creating an App Registration
  • Configuring App Registration Permission Scopes
  • Managing App Registration Permission Consent
  • Managing API Permission to Azure Subscriptions
  • Configuring an Authentication Method for a Service Principal
  • Managing Access Control
  • Interpret Role and Resource Permissions
  • Configuring Azure Role Permissions for Management Groups, Subscriptions, Resource Groups, and Resources
  • Assigning Built-In Azure AD Roles
  • Creating and Assigning Custom Roles, Including Azure Roles and Azure AD Roles
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 3 Implementing Platform Protections
  • Implementing Advanced Network Security
  • Securing Connectivity of Hybrid Networks
  • Securing Connectivity of Virtual Networks
  • Creating and Configuring Azure Firewalls
  • Azure Firewall Premium
  • Creating and Configuring Azure Firewall Manager
  • Creating and Configuring Azure Application Gateway
  • Creating and Configuring Azure Front Door
  • Creating and Configuring a Web Application Firewall
  • Configuring Network Isolation for Web Apps and Azure Functions
  • Implementing Azure Service Endpoints
  • Implementing Azure Private Endpoints, Including Integrating with Other Services
  • Implementing Azure Private Link
  • Implementing Azure DDoS Protection
  • Configuring Enhanced Security for Compute.
  • Configuring Azure Endpoint Protection for VMs
  • Enabling Update Management in Azure Portal
  • Configuring Security for Container Services
  • Managing Access to the Azure Container Registry
  • Configuring Security for Serverless Compute
  • Microsoft Recommendations
  • Configuring Security for an Azure App Service
  • Exam Essentials
  • Review Questions
  • Chapter 4 Managing Security Operations
  • Configure Centralized Policy Management
  • Configure a Custom Security Policy
  • Create Custom Security Policies
  • Creating a Policy Initiative
  • Configuring Security Settings and Auditing by Using Azure Policy
  • Configuring and Managing Threat Protection
  • Configuring Microsoft Defender for Cloud for Servers (Not Including Microsoft Defender for Endpoint)
  • Configuring Microsoft Defender for SQL
  • Using the Microsoft Threat Modeling Tool
  • Azure Monitor
  • Visualizations in Azure Monitor
  • Configuring and Managing Security Monitoring Solutions
  • Creating and Customizing Alert Rules by Using Azure Monitor
  • Configuring Diagnostic Logging and Retention Using Azure Monitor
  • Monitoring Security Logs Using Azure Monitor
  • Microsoft Sentinel
  • Configuring Connectors in Microsoft Sentinel
  • Evaluating Alerts and Incidents in Microsoft Sentinel
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 5 Securing Data and Applications
  • Configuring Security for Storage in Azure
  • Storage Account Access Keys
  • Configuring Access Control for Storage Accounts
  • Configuring Storage Account Access Keys
  • Configuring Azure AD Authentication for Azure Storage and Azure Files
  • Configuring Delegated Access for Storage Accounts
  • Configuring Security for Databases
  • Summary
  • Exam Essentials
  • Review Questions
  • Appendix A: An Azure Security Tools Overview
  • Chapter 2, "Managing Identity and Access on Microsoft Azure".
  • Azure Active Directory (AD)
  • Microsoft Authenticator App
  • Azure API Management
  • Chapter 3, "Implementing Platform Protections"
  • Azure Firewall
  • Azure Firewall Manager
  • Azure Application Gateway
  • Azure Front Door
  • Web Application Firewall
  • Azure Service Endpoints
  • Azure Private Links
  • Azure DDoS Protection
  • Microsoft Defender for Cloud
  • Azure Container Registry
  • Azure App Service
  • Chapter 4, "Managing Security Operations"
  • Azure Policy
  • Microsoft Threat Modeling Tool
  • Microsoft Sentinel
  • How Does Microsoft Sentinel Work?
  • Automation
  • Chapter 5, "Securing Data and Applications"
  • Azure Key Vault
  • Appendix B: Answers to Review Questions
  • Chapter 1: Introduction to Microsoft Azure
  • Chapter 2: Managing Identity and Access in Microsoft Azure
  • Chapter 3: Implementing Platform Protections
  • Chapter 4: Managing Security Operations
  • Chapter 5: Securing Data and Applications
  • Index
  • EULA.