Cargando…

MCA Microsoft Certified Associate Azure Security Engineer Study Guide Exam AZ-500.

Prepare for the MCA Azure Security Engineer certification exam faster and smarter with help from Sybex In the MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500, cybersecurity veteran Shimon Brathwaite walks you through every step you need to take to prepare for the M...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Brathwaite, Shimon (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2022.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents at a Glance
  • Contents
  • Introduction
  • What Does This Book Cover?
  • Who Should Read This Book
  • Study Guide Features
  • Interactive Online Learning Environment and Test Bank
  • Additional Resources
  • MCA Azure Security Engineer Study Guide Exam Objectives
  • Objective Map
  • How to Contact Wiley or the Author
  • Assessment Test
  • Answers to Assessment Test
  • Chapter 1 Introduction to Microsoft Azure
  • What Is Microsoft Azure?
  • Cloud Environment Security Objectives
  • Confidentiality
  • Integrity
  • Availability
  • Nonrepudiation
  • Common Security Issues
  • Principle of Least Privilege
  • Zero-Trust Model
  • Defense in Depth
  • Avoid Security through Obscurity
  • The AAAs of Access Management
  • Encryption
  • End-to-End Encryption
  • Symmetric Key Encryption
  • Asymmetric Key Encryption
  • Network Segmentation
  • Basic Network Configuration
  • Unsegmented Network Example
  • Internal and External Compliance
  • Cybersecurity Considerations for the Cloud Environment
  • Configuration Management
  • Unauthorized Access
  • Insecure Interfaces/APIs
  • Hijacking of Accounts
  • Compliance
  • Lack of Visibility
  • Accurate Logging
  • Cloud Storage
  • Vendor Contracts
  • Link Sharing
  • Major Cybersecurity Threats
  • DDoS
  • Social Engineering
  • Password Attacks
  • Malware
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 2 Managing Identity and Access in Microsoft Azure
  • Identity and Access Management
  • Identifying Individuals in a System
  • Identifying and Assigning Roles in a System and to an Individual
  • Assigning Access Levels to Individuals or Groups
  • Adding, Removing, and Updating Individuals and Their Roles in a System
  • Protecting a System's Sensitive Data and Securing the System
  • Enforcing Accountability
  • IAM in the Microsoft Azure Platform
  • Creating and Managing Azure AD Identities
  • Managing Azure AD Groups
  • Managing Azure Users
  • Adding Users to Your Azure AD
  • Managing External Identities Using Azure AD
  • Managing Secure Access Using Azure Active Directory
  • Implementing Conditional Access Policies, Including MFA
  • Implementing Azure AD Identity Protection
  • Enabling the Policies
  • Implement Passwordless Authentication
  • Configuring an Access Review
  • Managing Application Access
  • Integrating Single Sign-On and Identity Providers for Authentication
  • Creating an App Registration
  • Configuring App Registration Permission Scopes
  • Managing App Registration Permission Consent
  • Managing API Permission to Azure Subscriptions
  • Configuring an Authentication Method for a Service Principal
  • Managing Access Control
  • Interpret Role and Resource Permissions
  • Configuring Azure Role Permissions for Management Groups, Subscriptions, Resource Groups, and Resources
  • Assigning Built-In Azure AD Roles
  • Creating and Assigning Custom Roles, Including Azure Roles and Azure AD Roles
  • Summary
  • Exam Essentials
  • Review Questions