Welcome To Trivandrum Logic

  • Extra Police Rd, Nandavanam, Opposite Vivanta Hotel, Palayam, Trivandrum
  • 0471 2000020, 9947030005
logo
  • Home
  • About Us
  • Training|Certification
    • Networking/System Trainings
    • Software Trainings
    • Cloud Computing Trainings
    • Internship
  • Academic Project
  • Placement
  • Contacts/Enquiry
logo
  • Home
  • About Us
  • Networking/System Trainings
  • Software Trainings
  • Cloud Computing Trainings
  • Internship
  • Academic Project
  • Placement
  • Contacts/Enquiry

Cloud Computer Trainings

 

The Cloud Architect program is designed to make you an expert in cloud applications and architecture. It will enable you to master the core skillsets required for designing and deploying dynamically scalable, highly available, fault-tolerant, and reliable applications on two of the top Cloud platform providers — Amazon Web Services (AWS) and Microsoft Azure. The program will give you an in-depth understanding of cloud services such as AWS Cloud formation, Azure resource manager, EC2, S3, Route53, VPC, Azure App Services and more. You’ll acquire the knowledge and skills for passing cloud architect certifications such as AWS Architect and Azure Architect.

Microsoft Azure Security Technologies course is designed for Microsoft Azure security engineers who implement security controls, maintain the security posture, manages identity and access, and protects data, applications, and networks. After taking these course candidates will identify and remediate vulnerabilities by using a variety of security tools, implements threat protection, and responds to security incident escalations.

Ideal Candidate

This Course are for Microsoft Azure security engineers who implement security controls, maintain the security posture, manages identity and access, and protects data, applications, and networks. Candidates identify and remediate vulnerabilities by using a variety of security tools, implements threat protection, and responds to security incident escalations. As a Microsoft Azure security engineer, candidates often serve as part of a larger team dedicated to cloud-based management and security and may also secure hybrid environments as part of an end-to-end infrastructure

About the training

In this course, you will gain insights into Azure Security services to help secure your services and data within Azure.You will learn Azure security best practice and understand the terminology, tools, and techniques for creating a secure resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune

Course Duration

40 Hrs

Course Outline

Manage identity and access

Configure Microsoft Azure Active Directory for workloads

  • create App registration
  • configure App registration permission scopes
  • manage App registration permission consent
  • configure multi-factor authentication settings
  • manage Microsoft Azure AD directory groups
  • manage Microsoft Azure AD users
  • install and configure Microsoft Azure AD Connect
  • configure authentication methods
  • implement conditional access policies
  • configure Microsoft Azure AD identity protection

Configure Microsoft Azure AD Privileged Identity Management

  • monitor privileged access
  • configure access reviews
  • activate Privileged Identity Management

Configure Microsoft Azure tenant security

  • transfer Microsoft Azure subscriptions between Microsoft Azure AD tenants
  • manage API access to Microsoft Azure subscriptions and resources

Implement platform protection

Implement network security

  • configure virtual network connectivity
  • configure Network Security Groups (NSGs)
  • create and configure Microsoft Azure firewall
  • create and configure application security groups
  • configure remote access management
  • configure baseline
  • configure resource firewall

Implement host security

  • configure endpoint security within the VM
  • configure VM security
  • harden VMs in Microsoft Azure
  • configure system updates for VMs in Microsoft Azure
  • configure baseline

Configure container security

  • configure network
  • configure authentication
  • configure container isolation
  • configure AKS security
  • configure container registry
  • configure container instance security
  • implement vulnerability management

Implement Microsoft Azure Resource management security

  • create Microsoft Azure resource locks
  • manage resource group security
  • configure Microsoft Azure policies
  • configure custom RBAC roles
  • configure subscription and resource permissions

Manage security operations

Configure security services

  • configure Microsoft Azure monitor
  • configure Microsoft Azure log analytics
  • configure diagnostic logging and log retention
  • configure vulnerability scanning

Configure security policies

  • configure centralized policy management by using Microsoft Azure Security Center
  • configure Just in Time VM access by using Microsoft Azure Security Center

Manage security alerts

  • create and customize alerts
  • review and respond to alerts and recommendations
  • configure a playbook for a security event by using Microsoft Azure Security Center
  • investigate escalated security incidents

Secure data and applications

Configure security policies to manage data

  • configure data classification
  • configure data retention
  • configure data sovereignty

Configure security for data infrastructure

  • enable database authentication
  • enable database auditing
  • configure Microsoft Azure SQL Database threat detection
  • configure access control for storage accounts
  • configure key management for storage accounts
  • create and manage Shared Access Signatures (SAS)
  • configure security for HDInsights
  • configure security for Cosmos DB
  • configure security for Microsoft Azure Data Lake

Configure encryption for data at rest

  • implement Microsoft Azure SQL Database Always Encrypted
  • implement database encryption
  • implement Storage Service Encryption
  • implement disk encryption
  • implement backup encryption

Implement security for application delivery

  • implement security validations for application development
  • configure synthetic security transactions

Configure application security

  • configure SSL/TLS certs
  • configure Microsoft Azure services to protect web apps
  • create an application security baseline

Configure and manage Key Vault

  • manage access to Key Vault
  • manage permissions to secrets, certificates, and keys
  • manage certificates
  • manage secrets
  • configure key rotation

Related Trainings

  • Microsoft Certified Azure Administrator Training(AZ -103)
  • Amazon Web Services(AWS) Certified Solutions Architect Training(SAA-C01)
  • AWS Certified Security - Specialty(SCS-C01)
  • System/Networking Trainings
  • Software Trainings
  • Internship Programme
  • Other Trainings

    courch-img

    MCSE :Cloud Platform and Infrastructure

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    This certification validates that you have the skills needed to run a highly efficient and modern data center, with expertise in cloud technologies, identity management, systems management, virtualization,

    Read More
    courch-img

    MCSA :Windows Server 2012

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    Microsoft Certified Solutions Associate is intended for people who seek entry-level jobs in an information technology environment,

    Read More
    courch-img

    MCSA :Windows Server 2016

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    Microsoft Certified Solutions Associate is intended for people who seek entry-level jobs in an information technology environment,

    Read More
    courch-img

    CCNA : Routing and Switching

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    As Enterprises migrate toward controller based architectures, the role and skills required of a core network engineer are evolving and more vital than ever.To prepare for this network transition, ,

    Read More
    courch-img

    CCNP : Routing and Switching

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    Cisco Certified Network Professional Routing and Switching certification validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks,

    Read More
    courch-img

    CCNA :Security                                  

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification,,

    Read More
    courch-img

    CCNA :Collaboration                                  

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    For network video engineers, IP telephony and IP network engineers who want to develop and advance their collaboration and video skills in line with the convergence of voice,

    Read More
    courch-img

    RHCSA: Red Hat Certified System Administrator

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    An IT professional who has earned the Red Hat Certified System Administrator (RHCSA®) is able to perform the core system administration skills required in Red Hat Enterprise Linux environments,

    Read More
    courch-img

    RHCE: Red Hat Certified Engineer

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    A Red Hat® Certified Engineer (RHCE®) is a Red Hat Certified System Administrator (RHCSA) who possesses the additional skills, knowledge, and abilities required of a senior system administrator,

    Read More
    courch-img

    Administering Linux Training

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    Never learned Linux? Want a refresh? Take this course to learn the basics of this popular open source operating system,

    Read More
    courch-img

    Storage Area Network (SAN) Training

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    This course is designed to introduce to the participants, the fundamentals of Network Storage technologies, focusing on Storage Area Networks (SAN) and Network Attached Storage (NAS),

    Read More
    courch-img

    AWS Certified Solutions Architect Training

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    This Training is intended for individuals who perform a solutions architect role and have one or more years of hands-on experience designing available,

    Read More
    courch-img

    AWS Certified Security Training

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    Achieving the Amazon Web Services (AWS) Security – Specialty certification enables tenured cloud security professional to demonstrate their ability to secure the AWS cloud

    Read More
    courch-img

    Microsoft Certified Azure Administrator Training

     

    •  
    •  
    •  
    •  
    •  
    • Share It :
    •  
    •  
    •  
    •  
    images

    Course Details

    This course teaches IT Professionals how to manage their Azure subscriptions, create and scale virtual machines,

    Read More
    id="Network">

    Site Map

    • Home
    • About Us
    • Placement
    • Contacts/Enquiry
    • Networking/System Training
    • Software Training
    • Cloud Computing Trainings
    • Internship
    • Academic Project

    Contacts

    • (0471) 2000020 , 9947030005
    • info@cicadosoft.com info@tvmlogic.com
    • Extra Police Rd, Nandavanam, Opposite Vivanta Hotel, Palayam, Thiruvananthapuram, Kerala
      India-695033
    • Monday-Friday   9:00 AM - 8:00 PM
    • Saturday               9:30 AM - 5:30 PM
    •  
    •  
    •  
    © 2018 Cicadosoft Technologies All Rights Reserved.Designed By Eztansa Technologies