Radical Technologies

The Syllabus

Curriculum Designed by Experts

Manage identities in Azure AD
  • Secure users in Azure AD
  • Secure directory groups in Azure AD
  • Recommend when to use external identities
  • Secure external identities
  • Implement Azure AD Identity Protection
Manage authentication by using Azure AD
  • Configure Microsoft Entra Verified ID
  • Implement multi-factor authentication (MFA)
  • Implement passwordless authentication
  • Implement password protection
  • Implement single sign-on (SSO)
  • Integrate single sign-on (SSO) with identity providers
  • Recommend and enforce modern authentication protocols
Manage authorization by using Azure AD
  • Configure Azure role permissions for management groups, subscriptions, resource groups, and resources.
  • Assign built-in roles in Azure AD.
  • Assign built-in roles in Azure.
  • Create and assign custom roles, including Azure roles and Azure AD roles.
  • Implement and manage Microsoft Azure Permissions Management.
  • Configure Azure AD Privileged Identity Management (PIM).
  • Configure role management and access reviews using Microsoft Azure Identity Governance.
  • Implement Conditional Access policies.
Manage application access in Azure AD
  • Manage access to enterprise applications in Azure AD, including OAuth permission grants.
  • Manage app registrations in Azure AD.
  • Configure app registration permission scopes.
  • Manage app registration permission consent.
  • Manage and use service principals.
  • Manage managed identities for Azure resources.
  • Recommend when to use and configure an Azure AD Application Proxy, including authentication.
Plan and implement security for virtual networks
  • Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)
  • Plan and implement user-defined routes (UDRs)
  • Plan and implement VNET peering or VPN gateway
  • Plan and implement Virtual WAN, including secured virtual hub
  • Secure VPN connectivity, including point-to-site and site-to-site configurations
  • Implement encryption over ExpressRoute
  • Configure firewall settings on PaaS (Platform as a Service) resources
  • Monitor network security using Network Watcher, including NSG flow logging
Plan and implement security for private access to Azure resources
  • Plan and implement virtual network Service Endpoints
  • Plan and implement Private Endpoints
  • Plan and implement Private Link services
  • Plan and implement network integration for Azure App Service and Azure Functions
  • Plan and implement network security configurations for an App Service Environment (ASE)
  • Plan and implement network security configurations for an Azure SQL Managed Instance
Plan and implement security for public access to Azure resources
  • Plan and implement TLS for applications, including Azure App Service and API Management.
  • Plan, implement, and manage an Azure Firewall, including Azure Firewall Manager and firewall policies.
  • Plan and implement an Azure Application Gateway.
  • Plan and implement an Azure Front Door, including Content Delivery Network (CDN).
  • Plan and implement a Web Application Firewall (WAF).
  • Recommend when to use Azure DDoS Protection Standard.
Plan and implement advanced security for compute
  • Plan and implement remote access to public endpoints, including using Azure Bastion for secure RDP/SSH access and setting up just-in-time (JIT) VM access.
  • Configure network isolation for Azure Kubernetes Service (AKS) to enhance security and control communication between AKS clusters and other resources.
  • Secure and monitor AKS by implementing best practices, such as role-based access control (RBAC), network policies, and monitoring solutions.
  • Configure authentication for AKS, including integrating with Azure AD or other identity providers.
  • Configure security monitoring for Azure Container Instances (ACIs) to detect and respond to security threats.
  • Configure security monitoring for Azure Container Apps (ACAs), ensuring visibility into containerized applications.
  • Manage access to Azure Container Registry (ACR) by setting up authentication, authorization, and access policies.
  • Configure disk encryption, including Azure Disk Encryption (ADE)encryption as host, and confidential disk encryption for data at rest.
  • Recommend security configurations for Azure API Management, considering authentication, authorization, and threat protection.
Plan and implement security for storage
  • Configure access control for storage accounts
  • Manage the life cycle for storage account access keys
  • Select and configure an appropriate method for access to Azure Files
  • Select and configure an appropriate method for access to Azure Blob Storage
  • Select and configure an appropriate method for access to Azure Tables
  • Select and configure an appropriate method for access to Azure Queues
  • Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage
  • Configure Bring Your Own Key (BYOK)
  • Enable double encryption at the Azure Storage infrastructure level
Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
  • Enable database authentication by using Microsoft Azure AD.
  • Enable database auditing to track and monitor database activity.
  • Identify use cases for the Microsoft Purview governance portal, which provides data discovery, classification, and lineage capabilities.
  • Implement data classification of sensitive information using the Microsoft Purview governance portal.
  • Plan and implement dynamic masking to protect sensitive data from unauthorized access.
  • Implement Transparent Database Encryption (TDE) to encrypt data at rest.
  • Recommend when to use Azure SQL Database Always Encrypted, a feature that allows encryption of sensitive data within the application itself.
Plan, implement, and manage governance for security
  • Create, assign, and interpret security policies and initiatives in Azure Policy to enforce compliance and governance across your Azure resources.
  • Configure security settings using Azure Blueprint, which allows you to define repeatable patterns for your environment.
  • Deploy secure infrastructures by using a landing zone, which provides a consistent foundation for your workloads.
  • Create and configure an Azure Key Vault, a secure storage service for keys, secrets, and certificates.
  • Recommend when to use a Dedicated HSM (Hardware Security Module), which provides additional security for cryptographic operations.
  • Configure access to Key Vault, including defining vault access policies and using Azure Role-Based Access Control (RBAC).
  • Manage certificates, secrets, and keys stored in Azure Key Vault.
  • Configure key rotation to enhance security by regularly changing cryptographic keys.
  • Configure backup and recovery procedures for certificates, secrets, and keys stored in Key Vault.
Manage security posture by using Microsoft Defender for Cloud
  • Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory. This helps you assess your security posture and prioritize remediation efforts.
  • Assess compliance against security frameworks and Microsoft Defender for Cloud. Ensure that your environment adheres to industry standards and best practices.
  • Add industry and regulatory standards to Microsoft Defender for Cloud. Customize your security policies to align with specific compliance requirements.
  • Add custom initiatives to Microsoft Defender for Cloud. Tailor security controls and monitoring based on your organization’s unique needs.
  • Connect hybrid cloud and multi-cloud environments to Microsoft Defender for Cloud. Extend protection across different cloud platforms and on-premises infrastructure.
  • Identify and monitor external assets by using Microsoft Defender External Attack Surface Management. Keep track of assets outside your immediate control to enhance security.
Configure and manage threat protection by using Microsoft Defender for Cloud
  • Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS
  • Configure Microsoft Defender for Servers to enhance protection for your server infrastructure.
  • Configure Microsoft Defender for Azure SQL Database to secure your database workloads.
  • Manage and respond to security alerts in Microsoft Defender for Cloud, ensuring timely action against threats.
  • Configure workflow automation using Microsoft Defender for Cloud, streamlining security processes.
  • Evaluate vulnerability scans from Microsoft Defender for Server, identifying and addressing potential vulnerabilities.
Configure and manage security monitoring and automation solutions
  • Monitor security events by using Azure Monitor, which provides insights into the performance and health of your Azure resources.
  • Configure data connectors in Microsoft Sentinel, allowing you to ingest data from various sources (such as logs, alerts, and telemetry) for analysis.
  • Create and customize analytics rules in Microsoft Sentinel, defining conditions for detecting security threats and generating alerts.
  • Evaluate alerts and incidents in Microsoft Sentinel, ensuring timely response to potential security issues.
  • Configure automation in Microsoft Sentinel, streamlining incident response and remediation processes.

Enquire Now

    Why Radical Technologies

    Live Online Training

    Highly practical oriented training
    Installation of Software On your System
    24/7 Email and Phone Support
    100% Placement Assistance until you get placed
    Global Certification Preparation
    Trainer Student Interactive Portal
    Assignments and Projects Guided by Mentors
    And Many More Features
    Course completion certificate and Global Certifications are part of our all Master Program

    Live Classroom Training

    Weekend / Weekdays / Morning / Evening Batches
    80:20 Practical and Theory Ratio
    Real-life Case Studies
    Easy Coverup if you missed any sessions
    PSI | Kryterion | Redhat Test Centers
    Life Time Video Classroom Access ( coming soon )
    Resume Preparations and Mock Interviews
    And Many More Features
    Course completion certificate and Global Certifications are part of our all Master Program

    Self Paced Training

    Self Paced Learning
    Learn 300+ Courses at Your Own Time
    50000+ Satisfied Learners
    Course Completion Certificate
    Practical Labs Available
    Mentor Support Available
    Doubt Clearing Session Available
    Attend Our Virtual Job Fair
    10% Discounted Global Certification
    Course completion certificate and Global Certifications are part of our all Master Program

    Like the Curriculum ? Let's Get Started

    Global Certification

    Radical Technologies is the leading IT certification institute in Kochi, offering a wide range of globally recognized certifications across various domains. With expert trainers and comprehensive course materials, it ensures that students gain in-depth knowledge and hands-on experience to excel in their careers. The institute’s certification programs are tailored to meet industry standards, helping professionals enhance their skillsets and boost their career prospects. From cloud technologies to data science, Radical Technologies covers it all, empowering individuals to stay ahead in the ever-evolving tech landscape. Achieve your professional goals with certifications that matter.

    course certificate

    Online Classroom PREFERRED

    Discount Voucher

    "Register Now to Secure Your Spot in Our Featured Course !"

    BOOK HERE

    career services

    About Us

    At Radical Technologies, we are committed to your success beyond the classroom. Our 100% Job Assistance program ensures that you are not only equipped with industry-relevant skills but also guided through the job placement process. With personalized resume building, interview preparation, and access to our extensive network of hiring partners, we help you take the next step confidently into your IT career. Join us and let your journey to a successful future begin with the right support.

    At Radical Technologies, we ensure you’re ready to shine in any interview. Our comprehensive Interview Preparation program includes mock interviews, expert feedback, and tailored coaching sessions to build your confidence. Learn how to effectively communicate your skills, handle technical questions, and make a lasting impression on potential employers. With our guidance, you’ll walk into your interviews prepared and poised for success.

    At Radical Technologies, we believe that a strong professional profile is key to standing out in the competitive IT industry. Our Profile Building services are designed to highlight your unique skills and experiences, crafting a resume and LinkedIn profile that resonate with employers. From tailored advice on showcasing your strengths to tips on optimizing your online presence, we provide the tools you need to make a lasting impression. Let us help you build a profile that opens doors to your dream career.

    completed course section

    Radical Learning Eco-System

    Exam simulator

    Cloud Send Borey

    Hands - on Cloud Lab

    Developer Coding Ground

    Testimonials

    Our Alumni

    Online Batches Available for the Areas

    Kochi | Fort Kochi | Mattancherry | Ernakulam | Marine Drive | Kakkanad | Palarivattom | Kadavanthra | Chullikkal | Elamakkara | Kochi Port | Vyttila | Aluva | Thrippunithura | Panampilly Nagar | Edappally | Kothad | Njarackal

    Azure Security Engineer Associate Course Certification with Training in Kochi

    At Radical Technologies, we are committed to providing world-class Azure Data Engineer Training in Bangalore, helping aspiring data professionals master the skills needed to excel in the rapidly growing field of cloud data engineering. As the leading institute for Azure Data Engineer Course In Bangalore, we offer comprehensive, hands-on training designed to meet the demands of today’s data-driven organizations.

    Our Azure Data Engineer Training Bangalore program covers every aspect of the Azure Data Engineer Syllabus, ensuring that students receive in-depth knowledge of data architecture, data processing, and data storage on Microsoft Azure. Whether you prefer attending classes in-person or via Azure Data Engineer Online Training, Radical Technologies provides flexible learning options to suit your needs.

    Our Azure Data Engineering Training is renowned for its practical, real-world approach. Students have access to an industry-leading Azure Data Engineer Bootcamp, which combines theory and hands-on labs to ensure they are fully prepared for their certification exams. The Microsoft Azure Data Engineer Training is tailored to cover all key topics, from data integration to security, and is led by experienced professionals who are experts in their field.

    For professionals and organizations seeking Azure Data Engineering Corporate Training, we offer tailored courses that address specific business needs. Our Azure Data Engineering Corporate Training Course ensures that teams gain practical experience in building scalable, secure, and efficient data solutions on Azure.

    At Radical Technologies, our Azure Data Engineer Courses are structured to ensure that both beginners and experienced professionals alike can enhance their knowledge. The Azure Data Engineer Certification Training offered here equips students with the skills and credentials needed to stand out in a competitive job market.

    Our institute also offers the Azure Data Engineer Full Course, which provides a comprehensive pathway for mastering Azure Data Engineering concepts and techniques. We take pride in being one of the top Azure Data Engineer Institutes in Bangalore, with a proven track record of helping students achieve their Azure Data Engineering Certification.

    Whether you are looking for Azure Data Engineer Training Online or prefer our in-person classes in Bangalore, Radical Technologies is your trusted partner for career advancement in data engineering. Join us today to enroll in the Best Azure Data Engineer Course and kick-start your journey towards becoming a certified data engineer.

    Azure Security Engineer Associate Related Courses

    CISM

    CISM, which stands for Certified Information Security Manager, is a globally recognized professional certification for individuals who specialize in information...

    ETHICAL HACKING & CYBER SECURITY- CEHv11

    The “Ethical Hacking & Cyber Security – CEHv1” course likely refers to the Certified Ethical Hacker (CEH) certification program, which...

    CISA

    CISA, which stands for Certified Information Systems Auditor, is a globally recognized professional certification for individuals who specialize in auditing,...

    CISSP

    CISSP, which stands for Certified Information Systems Security Professional, is one of the most prestigious and globally recognized certifications in...

    CCSP

    The CCSP (Certified Cloud Security Professional) certification is a globally recognized credential designed for professionals who work with cloud technologies...

    CSA

    The term “CSA” can refer to various certifications and organizations in different contexts. Without specific details, it’s challenging to provide...

    CCSK

    The CCSK (Certificate of Cloud Security Knowledge) is a certification that validates an individual’s knowledge and expertise in cloud security...

    GCSA

    The GIAC Cloud Security Automation (GCSA) course equips professionals with the skills to securely automate cloud environments. This hands-on training...

    Azure Security Engineer Associate

    The Azure Security Engineer Associate certification is a credential offered by Microsoft that validates an individual’s expertise in securing Microsoft...

    AWS Certified Security — Specialty

    The AWS Certified Security – Specialty certification is a credential offered by Amazon Web Services (AWS) that validates an individual’s...

    CompTIA Security+

    CompTIA Security+ is a well-recognized and globally respected certification in the field of cybersecurity. CompTIA Security+ is a vendor-neutral certification...

    CCNA security

    CCNA Security (Cisco Certified Network Associate – Security) is a certification offered by Cisco, one of the leading providers of...

    CCNP SECURITY

    CCNP Security (Cisco Certified Network Professional – Security) is an advanced-level certification offered by Cisco, a leading provider of networking...

    Professional Cloud Security Engineer

    As of my last knowledge update in September 2021, I do not have specific information about a certification with the...

    Certified Kubernetes Security Specialist-CKS

    The Certified Kubernetes Security Specialist (CKS) certification is a designation that validates an individual’s expertise in securing containerized applications and...
    Enquire Now








      X
      Enquire Now

        Enquire Now & Get 10% Off!

        (Our Team will call you to discuss the Fees)

          Get a Call Back from Our Career Assistance Team

            Enquire Now & Get 10% Off!

            (Our Team will call you to discuss the Fees)

                Get a Call Back from Our Career Assistance Team