Radical Technologies

Azure Security Engineer Associate

The Azure Security Engineer Associate certification is a credential offered by Microsoft that validates an individual’s expertise in securing Microsoft Azure cloud environments. The Azure Security Engineer Associate certification is well-suited for security professionals, cloud administrators, and Azure architects who want to specialize in securing Microsoft Azure environments. It’s a valuable credential for those working with Azure or planning to do so while focusing on security and compliance.

0 +

Google Reviews

0 +

JustDial Reviews

The Syllabus

Curriculum Designed by Experts

Manage identities in Azure AD
  • Secure users in Azure AD
  • Secure directory groups in Azure AD
  • Recommend when to use external identities
  • Secure external identities
  • Implement Azure AD Identity Protection
Manage authentication by using Azure AD
  • Configure Microsoft Entra Verified ID
  • Implement multi-factor authentication (MFA)
  • Implement passwordless authentication
  • Implement password protection
  • Implement single sign-on (SSO)
  • Integrate single sign-on (SSO) with identity providers
  • Recommend and enforce modern authentication protocols
Manage authorization by using Azure AD
  • Configure Azure role permissions for management groups, subscriptions, resource groups, and resources.
  • Assign built-in roles in Azure AD.
  • Assign built-in roles in Azure.
  • Create and assign custom roles, including Azure roles and Azure AD roles.
  • Implement and manage Microsoft Azure Permissions Management.
  • Configure Azure AD Privileged Identity Management (PIM).
  • Configure role management and access reviews using Microsoft Azure Identity Governance.
  • Implement Conditional Access policies.
Manage application access in Azure AD
  • Manage access to enterprise applications in Azure AD, including OAuth permission grants.
  • Manage app registrations in Azure AD.
  • Configure app registration permission scopes.
  • Manage app registration permission consent.
  • Manage and use service principals.
  • Manage managed identities for Azure resources.
  • Recommend when to use and configure an Azure AD Application Proxy, including authentication.
Plan and implement security for virtual networks
  • Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)
  • Plan and implement user-defined routes (UDRs)
  • Plan and implement VNET peering or VPN gateway
  • Plan and implement Virtual WAN, including secured virtual hub
  • Secure VPN connectivity, including point-to-site and site-to-site configurations
  • Implement encryption over ExpressRoute
  • Configure firewall settings on PaaS (Platform as a Service) resources
  • Monitor network security using Network Watcher, including NSG flow logging
Plan and implement security for private access to Azure resources
  • Plan and implement virtual network Service Endpoints
  • Plan and implement Private Endpoints
  • Plan and implement Private Link services
  • Plan and implement network integration for Azure App Service and Azure Functions
  • Plan and implement network security configurations for an App Service Environment (ASE)
  • Plan and implement network security configurations for an Azure SQL Managed Instance
Plan and implement security for public access to Azure resources
  • Plan and implement TLS for applications, including Azure App Service and API Management.
  • Plan, implement, and manage an Azure Firewall, including Azure Firewall Manager and firewall policies.
  • Plan and implement an Azure Application Gateway.
  • Plan and implement an Azure Front Door, including Content Delivery Network (CDN).
  • Plan and implement a Web Application Firewall (WAF).
  • Recommend when to use Azure DDoS Protection Standard.
Plan and implement advanced security for compute
  • Plan and implement remote access to public endpoints, including using Azure Bastion for secure RDP/SSH access and setting up just-in-time (JIT) VM access.
  • Configure network isolation for Azure Kubernetes Service (AKS) to enhance security and control communication between AKS clusters and other resources.
  • Secure and monitor AKS by implementing best practices, such as role-based access control (RBAC), network policies, and monitoring solutions.
  • Configure authentication for AKS, including integrating with Azure AD or other identity providers.
  • Configure security monitoring for Azure Container Instances (ACIs) to detect and respond to security threats.
  • Configure security monitoring for Azure Container Apps (ACAs), ensuring visibility into containerized applications.
  • Manage access to Azure Container Registry (ACR) by setting up authentication, authorization, and access policies.
  • Configure disk encryption, including Azure Disk Encryption (ADE)encryption as host, and confidential disk encryption for data at rest.
  • Recommend security configurations for Azure API Management, considering authentication, authorization, and threat protection.
Plan and implement security for storage
  • Configure access control for storage accounts
  • Manage the life cycle for storage account access keys
  • Select and configure an appropriate method for access to Azure Files
  • Select and configure an appropriate method for access to Azure Blob Storage
  • Select and configure an appropriate method for access to Azure Tables
  • Select and configure an appropriate method for access to Azure Queues
  • Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage
  • Configure Bring Your Own Key (BYOK)
  • Enable double encryption at the Azure Storage infrastructure level
Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
  • Enable database authentication by using Microsoft Azure AD.
  • Enable database auditing to track and monitor database activity.
  • Identify use cases for the Microsoft Purview governance portal, which provides data discovery, classification, and lineage capabilities.
  • Implement data classification of sensitive information using the Microsoft Purview governance portal.
  • Plan and implement dynamic masking to protect sensitive data from unauthorized access.
  • Implement Transparent Database Encryption (TDE) to encrypt data at rest.
  • Recommend when to use Azure SQL Database Always Encrypted, a feature that allows encryption of sensitive data within the application itself.
Plan, implement, and manage governance for security
  • Create, assign, and interpret security policies and initiatives in Azure Policy to enforce compliance and governance across your Azure resources.
  • Configure security settings using Azure Blueprint, which allows you to define repeatable patterns for your environment.
  • Deploy secure infrastructures by using a landing zone, which provides a consistent foundation for your workloads.
  • Create and configure an Azure Key Vault, a secure storage service for keys, secrets, and certificates.
  • Recommend when to use a Dedicated HSM (Hardware Security Module), which provides additional security for cryptographic operations.
  • Configure access to Key Vault, including defining vault access policies and using Azure Role-Based Access Control (RBAC).
  • Manage certificates, secrets, and keys stored in Azure Key Vault.
  • Configure key rotation to enhance security by regularly changing cryptographic keys.
  • Configure backup and recovery procedures for certificates, secrets, and keys stored in Key Vault.
Manage security posture by using Microsoft Defender for Cloud
  • Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory. This helps you assess your security posture and prioritize remediation efforts.
  • Assess compliance against security frameworks and Microsoft Defender for Cloud. Ensure that your environment adheres to industry standards and best practices.
  • Add industry and regulatory standards to Microsoft Defender for Cloud. Customize your security policies to align with specific compliance requirements.
  • Add custom initiatives to Microsoft Defender for Cloud. Tailor security controls and monitoring based on your organization’s unique needs.
  • Connect hybrid cloud and multi-cloud environments to Microsoft Defender for Cloud. Extend protection across different cloud platforms and on-premises infrastructure.
  • Identify and monitor external assets by using Microsoft Defender External Attack Surface Management. Keep track of assets outside your immediate control to enhance security.
Configure and manage threat protection by using Microsoft Defender for Cloud
  • Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS
  • Configure Microsoft Defender for Servers to enhance protection for your server infrastructure.
  • Configure Microsoft Defender for Azure SQL Database to secure your database workloads.
  • Manage and respond to security alerts in Microsoft Defender for Cloud, ensuring timely action against threats.
  • Configure workflow automation using Microsoft Defender for Cloud, streamlining security processes.
  • Evaluate vulnerability scans from Microsoft Defender for Server, identifying and addressing potential vulnerabilities.
Configure and manage security monitoring and automation solutions
  • Monitor security events by using Azure Monitor, which provides insights into the performance and health of your Azure resources.
  • Configure data connectors in Microsoft Sentinel, allowing you to ingest data from various sources (such as logs, alerts, and telemetry) for analysis.
  • Create and customize analytics rules in Microsoft Sentinel, defining conditions for detecting security threats and generating alerts.
  • Evaluate alerts and incidents in Microsoft Sentinel, ensuring timely response to potential security issues.
  • Configure automation in Microsoft Sentinel, streamlining incident response and remediation processes.

Enquire Now

    Why Radical Technologies

    Live Online Training

    Highly practical oriented training
    Installation of Software On your System
    24/7 Email and Phone Support
    100% Placement Assistance until you get placed
    Global Certification Preparation
    Trainer Student Interactive Portal
    Assignments and Projects Guided by Mentors
    And Many More Features
    Course completion certificate and Global Certifications are part of our all Master Program

    Live Classroom Training

    Weekend / Weekdays / Morning / Evening Batches
    80:20 Practical and Theory Ratio
    Real-life Case Studies
    Easy Coverup if you missed any sessions
    PSI | Kryterion | Redhat Test Centers
    Life Time Video Classroom Access ( coming soon )
    Resume Preparations and Mock Interviews
    And Many More Features
    Course completion certificate and Global Certifications are part of our all Master Program

    Self Paced Training

    Self Paced Learning
    Learn 300+ Courses at Your Own Time
    50000+ Satisfied Learners
    Course Completion Certificate
    Practical Labs Available
    Mentor Support Available
    Doubt Clearing Session Available
    Attend Our Virtual Job Fair
    10% Discounted Global Certification
    Course completion certificate and Global Certifications are part of our all Master Program

    Skills Covered

    • SA1 , SA2 ,SA3

    • RHEL 6/7/8/9

    • Virtualization

    • Type1 & Type2

    • CCNA Foundation

    • Networking

    • Servers-SSH/DHCP/DNS/
      Apache/Nginx/Apache Tomcat/MySQL/NTP/FTP/
      NFS/Samba/SMTP/Proxy

    • SAN/NAS/All RAID/LVM Storage

    • Backup Solutions

    • Security - all types of firewall

    • Scripting..  Bash scripting

    • Automation Tool - Complete Ansible

    • 250 hrs Hands on training

    • Resume preparation

    • Mock test interview preparation

    • Migration strategy

    • Server Hardening

    • Docker & Kubernetes

    • Basics AWS comparison with Linux

    • 150+ live on scenarios

    tool covered

    Why Enroll for Red Hat Linux

    Covers each topics with Real Time Examples . Covers More than 250+ Real Time Scenarios which is divided into L1 ( Basic ) + L2 ( Intermediate) and L3 ( Advanced ) . Trainer from Real Time Industry .This is completely hands-on training , which covers 90% Practical And 10% Theory

    We give Combo Pack of RHEL 6 with RHEL 7 , to make sure all the candidate will get at least 5+ Year experience knowledge in Redhat Linux after attending this course.Covers SA1 + SA2 + SA3 topics in Details from the very basic to advanced level .

    Complete RHCSA and RHCE Exam Preparations.Appear for Redhat Global Certification Exam At any time After the course – No need to wait to get schedule from Redhat .At your convenient time , you can book and appear for exam using our Individual Exam Delivery System called KOALA

    Course benefits

    • Agentless Architecture

    • Simplicity and Ease of Use

    • Idempotent Execution

    • Infrastructure as Code (laC)

    • Broad Platform Support:

    • Scalability and Performance

    • Community and Support

    Who Can Apply for Red Hat Linux

    Why Red Hat Linux

    Industry Recognition

    Red Hat certifications are widely recognized in the IT industry. Holding a Red Hat certification demonstrates to employers that you have the skills and knowledge needed to effectively work with Red Hat Linux systems.

    High Demand for Linux Skills

    Linux is a dominant operating system in the server market, particularly in enterprise environments. Many organizations, including tech giants, financial institutions, and government agencies, rely on Linux for their infrastructure. As a result, there is a high demand for professionals with Linux skills, including Red Hat Linux expertise.

    Specialized Knowledge

    Red Hat Linux is a popular distribution used in enterprise environments due to its stability, security, and support offerings. By gaining expertise in Red Hat Linux through a certification course, you position yourself as a specialist in this specific distribution, which can make you more attractive to employers who use or plan to use Red Hat Linux.

    Job Opportunities

    Holding a Red Hat certification opens up various job opportunities in roles such as Linux system administrator, DevOps engineer, cloud engineer, network engineer, and more. Many job postings in these fields specifically mention Red Hat certifications as desired or required qualifications.

    Salary Potential

    Professionals with Red Hat certifications often command higher salaries compared to their non-certified counterparts. Employers value certified individuals for their proven skills and expertise, leading to potentially higher earning potential.

    Career Advancement

    Red Hat certifications can help you advance your career by providing a clear path for skill development and progression. As you gain more advanced certifications, you become eligible for more senior roles and responsibilities within organizations.

    Like the Curriculum ? Let's Get Started

    Global Certification

    Radical Technologies is the leading IT certification institute in Bangalore, offering a wide range of globally recognized certifications across various domains. With expert trainers and comprehensive course materials, it ensures that students gain in-depth knowledge and hands-on experience to excel in their careers. The institute’s certification programs are tailored to meet industry standards, helping professionals enhance their skillsets and boost their career prospects. From cloud technologies to data science, Radical Technologies covers it all, empowering individuals to stay ahead in the ever-evolving tech landscape. Achieve your professional goals with certifications that matter.

    course certificate

    Red Hat Linux Fees in Bangalore

    Online Classroom PREFERRED

    16 jul

    TUE - FRI
    07.00AM TO 09.00
    AM LST (GMT +5:30)
    Radical

    20 jul

    SAT - SUN
    10.00AM TO 01.00
    PM LST (GMT +5:30)
    Radical

    20 jul

    SAT - SUN
    08.00PM TO 11.00
    PM LST (GMT +5:30)
    Radical

    ₹ 85,044

    Discount Voucher

    "Register Now to Secure Your Spot in Our Featured Course !"

    BOOK HERE

    career services

    About Us