Details

MCA Microsoft Certified Associate Azure Security Engineer Study Guide


MCA Microsoft Certified Associate Azure Security Engineer Study Guide

Exam AZ-500
1. Aufl.

von: Shimon Brathwaite

38,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 18.10.2022
ISBN/EAN: 9781119870395
Sprache: englisch
Anzahl Seiten: 352

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Prepare for the MCA Azure Security Engineer certification exam faster and smarter with help from Sybex</b> <p>In the <i>MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500</i>, cybersecurity veteran Shimon Brathwaite walks you through every step you need to take to prepare for the MCA Azure Security Engineer certification exam and a career in Azure cybersecurity. You’ll find coverage of every domain competency tested by the exam, including identity management and access, platform protection implementation, security operations management, and data and application security. <p>You’ll learn to maintain the security posture of an Azure environment, implement threat protection, and respond to security incident escalations. Readers will also find: <ul> <li>Efficient and accurate coverage of every topic necessary to succeed on the MCA Azure Security Engineer exam</li> <li>Robust discussions of all the skills you need to hit the ground running at your first—or next—Azure cybersecurity job</li> <li>Complementary access to online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossary</li></ul><p>The MCA Azure Security Engineer AZ-500 exam is a challenging barrier to certification. But you can prepare confidently and quickly with this latest expert resource from Sybex. It’s ideal for anyone preparing for the AZ-500 exam or seeking to step into their next role as an Azure security engineer.
<p>Introduction xix</p> <p>Assessment Test xxv</p> <p><b>Chapter 1 Introduction to Microsoft Azure 1</b></p> <p>What Is Microsoft Azure? 3</p> <p>Cloud Environment Security Objectives 4</p> <p>Confidentiality 4</p> <p>Integrity 4</p> <p>Availability 5</p> <p>Nonrepudiation 5</p> <p>Common Security Issues 5</p> <p>Principle of Least Privilege 5</p> <p>Zero- Trust Model 6</p> <p>Defense in Depth 6</p> <p>Avoid Security through Obscurity 9</p> <p>The AAAs of Access Management 9</p> <p>Encryption 10</p> <p>End- to- End Encryption 11</p> <p>Symmetric Key Encryption 11</p> <p>Asymmetric Key Encryption 11</p> <p>Network Segmentation 13</p> <p>Basic Network Configuration 13</p> <p>Unsegmented Network Example 14</p> <p>Internal and External Compliance 15</p> <p>Cybersecurity Considerations for the Cloud Environment 16</p> <p>Configuration Management 17</p> <p>Unauthorized Access 17</p> <p>Insecure Interfaces/APIs 17</p> <p>Hijacking of Accounts 17</p> <p>Compliance 18</p> <p>Lack of Visibility 18</p> <p>Accurate Logging 18</p> <p>Cloud Storage 18</p> <p>Vendor Contracts 19</p> <p>Link Sharing 19</p> <p>Major Cybersecurity Threats 19</p> <p>DDoS 19</p> <p>Social Engineering 20</p> <p>Password Attacks 21</p> <p>Malware 21</p> <p>Summary 24</p> <p>Exam Essentials 24</p> <p>Review Questions 26</p> <p><b>Chapter 2 Managing Identity and Access in Microsoft Azure 29</b></p> <p>Identity and Access Management 31</p> <p>Identifying Individuals in a System 31</p> <p>Identifying and Assigning Roles in a System and to an Individual 32</p> <p>Assigning Access Levels to Individuals or Groups 33</p> <p>Adding, Removing, and Updating Individuals and Their Roles in a System 33</p> <p>Protecting a System’s Sensitive Data and Securing the System 33</p> <p>Enforcing Accountability 34</p> <p>IAM in the Microsoft Azure Platform 34</p> <p>Creating and Managing Azure AD Identities 34</p> <p>Managing Azure AD Groups 37</p> <p>Managing Azure Users 39</p> <p>Adding Users to Your Azure AD 39</p> <p>Managing External Identities Using Azure AD 40</p> <p>Managing Secure Access Using Azure Active Directory 42</p> <p>Implementing Conditional Access Policies, Including MFA 44</p> <p>Implementing Azure AD Identity Protection 45</p> <p>Enabling the Policies 47</p> <p>Implement Passwordless Authentication 50</p> <p>Configuring an Access Review 52</p> <p>Managing Application Access 57</p> <p>Integrating Single Sign- On and Identity Providers for Authentication 57</p> <p>Creating an App Registration 58</p> <p>Configuring App Registration Permission Scopes 58</p> <p>Managing App Registration Permission Consent 59</p> <p>Managing API Permission to Azure Subscriptions 60</p> <p>Configuring an Authentication Method for a Service Principal 61</p> <p>Managing Access Control 62</p> <p>Interpret Role and Resource Permissions 62</p> <p>Configuring Azure Role Permissions for Management Groups, Subscriptions, Resource Groups, and Resources 63</p> <p>Assigning Built- In Azure AD Roles 64</p> <p>Creating and Assigning Custom Roles, Including Azure Roles and Azure AD Roles 65</p> <p>Summary 66</p> <p>Exam Essentials 67</p> <p>Review Questions 70</p> <p><b>Chapter 3 Implementing Platform Protections 73</b></p> <p>Implementing Advanced Network Security 75</p> <p>Securing Connectivity of Hybrid Networks 75</p> <p>Securing Connectivity of Virtual Networks 77</p> <p>Creating and Configuring Azure Firewalls 78</p> <p>Azure Firewall Premium 79</p> <p>Creating and Configuring Azure Firewall Manager 82</p> <p>Creating and Configuring Azure Application Gateway 82</p> <p>Creating and Configuring Azure Front Door 87</p> <p>Creating and Configuring a Web Application Firewall 91</p> <p>Configuring Network Isolation for Web Apps and Azure Functions 93</p> <p>Implementing Azure Service Endpoints 94</p> <p>Implementing Azure Private Endpoints, Including Integrating with Other Services 97</p> <p>Implementing Azure Private Link 98</p> <p>Implementing Azure DDoS Protection 101</p> <p>Configuring Enhanced Security for Compute 102</p> <p>Configuring Azure Endpoint Protection for VMs 102</p> <p>Enabling Update Management in Azure Portal 104</p> <p>Configuring Security for Container Services 108</p> <p>Managing Access to the Azure Container Registry 109</p> <p>Configuring Security for Serverless Compute 109</p> <p>Microsoft Recommendations 111</p> <p>Configuring Security for an Azure App Service 112</p> <p>Exam Essentials 118</p> <p>Review Questions 122</p> <p><b>Chapter 4 Managing Security Operations 125</b></p> <p>Configure Centralized Policy Management 126</p> <p>Configure a Custom Security Policy 126</p> <p>Create Custom Security Policies 127</p> <p>Creating a Policy Initiative 128</p> <p>Configuring Security Settings and Auditing by Using Azure Policy 129</p> <p>Configuring and Managing Threat Protection 130</p> <p>Configuring Microsoft Defender for Cloud for Servers (Not Including Microsoft Defender for Endpoint) 131</p> <p>Configuring Microsoft Defender for SQL 134</p> <p>Using the Microsoft Threat Modeling Tool 139</p> <p>Azure Monitor 147</p> <p>Visualizations in Azure Monitor 148</p> <p>Configuring and Managing Security Monitoring Solutions 149</p> <p>Creating and Customizing Alert Rules by Using Azure Monitor 149</p> <p>Configuring Diagnostic Logging and Retention Using Azure Monitor 157</p> <p>Monitoring Security Logs Using Azure Monitor 159</p> <p>Microsoft Sentinel 167</p> <p>Configuring Connectors in Microsoft Sentinel 170</p> <p>Evaluating Alerts and Incidents in Microsoft Sentinel 175</p> <p>Summary 176</p> <p>Exam Essentials 177</p> <p>Review Questions 179</p> <p><b>Chapter 5 Securing Data and Applications 183</b></p> <p>Configuring Security for Storage in Azure 184</p> <p>Storage Account Access Keys 185</p> <p>Configuring Access Control for Storage Accounts 185</p> <p>Configuring Storage Account Access Keys 189</p> <p>Configuring Azure AD Authentication for Azure Storage and Azure Files 191</p> <p>Configuring Delegated Access for Storage Accounts 202</p> <p>Configuring Security for Databases 220</p> <p>Summary 254</p> <p>Exam Essentials 255</p> <p>Review Questions 257</p> <p><b>Appendix A An Azure Security Tools Overview 261</b></p> <p>Chapter 2, “Managing Identity and Access on Microsoft Azure” 262</p> <p>Azure Active Directory (AD) 262</p> <p>Microsoft Authenticator App 265</p> <p>Azure API Management 265</p> <p>Chapter 3, “Implementing Platform Protections” 266</p> <p>Azure Firewall 266</p> <p>Azure Firewall Manager 267</p> <p>Azure Application Gateway 269</p> <p>Azure Front Door 273</p> <p>Web Application Firewall 273</p> <p>Azure Service Endpoints 274</p> <p>Azure Private Links 274</p> <p>Azure DDoS Protection 275</p> <p>Microsoft Defender for Cloud 276</p> <p>Azure Container Registry 277</p> <p>Azure App Service 278</p> <p>Chapter 4, “Managing Security Operations” 279</p> <p>Azure Policy 279</p> <p>Microsoft Threat Modeling Tool 281</p> <p>Microsoft Sentinel 287</p> <p>How Does Microsoft Sentinel Work? 289</p> <p>Automation 290</p> <p>Chapter 5, “Securing Data and Applications” 290</p> <p>Azure Key Vault 299</p> <p><b>Appendix B Answers to Review Questions 301</b></p> <p>Chapter 1: Introduction to Microsoft Azure 302</p> <p>Chapter 2: Managing Identity and Access in Microsoft Azure 303</p> <p>Chapter 3: Implementing Platform Protections 304</p> <p>Chapter 4: Managing Security Operations 305</p> <p>Chapter 5: Securing Data and Applications 306<br /> Index 309</p>
<P><B>ABOUT THE AUTHOR</B> <P><B>SHIMON BRATHWAITE </B>is Editor-in-Chief of securitymadesimple.org, a website dedicated to teaching business owners how to secure their companies and helping cybersecurity professionals start and advance their careers. He is the author of three cybersecurity books and holds CEH, Security+, and AWS Security specialist certifications.
<p><b>Your comprehensive guide to preparing for the MCA Azure Security Engineer exam</b> <p>The <i>MCA Microsoft Certified Associate Azure Security Engineer Study Guide</i> is your one-stop resource for robust coverage of the challenging Exam AZ-500, Microsoft Azure Security Technologies. This Sybex Study Guide covers all the AZ-500 objectives and skills that are measured by the exam. Prepare for the test smarter and faster with Sybex thanks to efficient and accurate content, including real-world examples and scenarios, practical exercises, and challenging chapter review questions. Use the Sybex online learning environment and test bank, accessible across multiple devices, to reinforce and retain what you’ve learned. Prepare confidently for the MCA Azure Security Engineer Exam AZ-500 with Sybex today. <p><b>Coverage of 100% of all exam objectives in this Study Guide means you’ll be ready to:</b> <ul><li>Manage Identity and Access</li> <li>Implement Platform Protection</li> <li>Manage Security Operations</li> <li>Secure Data and Applications</li></ul> <P><B>ABOUT THE MCA AZURE SECURITY ENGINEER CERTIFICATION</B> <p>The MCA Microsoft Certified Associate Azure Security Engineer certification is the ideal credential for those with comprehensive understanding of implementing Azure security controls that protect identity, access, data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure. Responsibilities for an Azure security engineer include managing the security posture, identifying and remediating vulnerabilities, performing threat modeling, implementing threat protection, and responding to security incident escalations. <p><b>Interactive learning environment</b> <p>Take your exam prep to the next level with Sybex’s superior interactive online study tools. To access our learning environment, simply visit <b>www.wiley.com/go/sybextestprep,</b> register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to: <ul><li><b>Interactive test bank </b>includes a practice exam to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you’re ready to take the certification exam.</li> <li><b>100 electronic flashcards </b>to reinforce learning and last-minute prep before the exam</li> <li><b>Comprehensive glossary </b>in PDF format gives you instant access to the key terms so you are fully prepared</li></ul>

Diese Produkte könnten Sie auch interessieren:

Legal Programming
Legal Programming
von: Brian Subirana, Malcolm Bain
PDF ebook
106,99 €
Privacy and Technologies of Identity
Privacy and Technologies of Identity
von: Katherine J. Strandburg, Daniela Stan Raicu
PDF ebook
149,79 €
Future Interaction Design II
Future Interaction Design II
von: Pertti Saariluoma, Hannakaisa Isomäki
PDF ebook
96,29 €