🎄 Special Offer! 🎅🎁 Flat 40% OFF on all courses!
All Courses
Programming Courses
Python Certification Training Course
Trending
Python Django Certification Training Course
Node.js Certification Training Course
Java Certification Training Course
Best Seller
Spring Framework Certification Training Course
Spring Boot Certification Training Course
Trending
Hibernate Certification Training Course
Microsoft .NET Framework Certification Training Course
Data Analytics Certification Training Course
Trending
PHP MYSQL with MVC Certification Training Course
Advanced Java Certification Training
Go Language Certification Training
Flutter Certification Training
Get your free demo class
Call Us
Master Program
Full Stack Certification Training Course
Trending
DevOps Master Program Certification Training Course
New
Cloud Masters Program Certification Training Course
Popular
Data Science Master Program Certification Training Course
Popular
Software Testing Master Program Certification Training Course
Get your free demo class
Call Us
Cloud Computing
AWS Solution Architect Associate Certification Training
Trending
AWS Certified DevOps Engineer Professional Training
Popular
AWS Development Certification Training Course
New
Microsoft Azure Certification Training Course (AZ-104 & AZ-304)
Microsoft Azure DevOps Certification Training Course (AZ-400)
Microservices Certification Training Course
Salesforce Developer Certification Training Course
Salesforce Administrator Certification Training Course
Linux Certification Training Course
Get your free demo class
Call Us
DevOps
DevOps Certification Training Course
Trending
Kubernetes Certification Training Course
Docker Certification Training Course
Ansible Certification Training Course
Chef Certification Training Course
GIT Certification Training Course
DevSecOps Certification Training Course in Bangalore
Get your free demo class
Get now
Data science
DataScience with Python Certification Training Course
Best Seller
Machine Learning Certification Training Course
Deep Learning Certification Training Course
(AI) Artificial Intelligence Certification Training Course
Trending
Get your free demo class
Call Us
Big Data
Big Data Hadoop Certification Training Course
Trending
Apache Spark and Scala Certification Training Course
Apache Kafka Certification Training Course
Best Seller
Get Your Free Demo Class
Call Us
Software Testing
Selenium Certification Training Course
Trending
Selenium with Python Certification Training Course
New
Selenium with C# Certification Training Course
Manual Testing Certification Training Course
Get your free demo class
Call Us
Robotic Process Automation
RPA using UiPath Certification Training Course
Trending
RPA using Automation Anywhere Certification Training Course
RPA using Blue Prism Certification Training Course
Get your free demo class
Call Us
Frontend Development
Angular Certification Training Course
Trending
React JS Certification Training Course
Best Seller
Web Development Certification Training Course
MERN Stack Certification Training Course
Get your free demo class
Call Us
Databases
MySQL Certification Training Course
Oracle Certification Training Course
MongoDB Certification Training Course
Trending
Get your free demo class
Call Us
Mobile Development
Android Certification Training Course
Trending
Get your free demo class
Call Us
Home
Courses
Programming & Frameworks
DevOps
Data Science
Cloud Computing
Robotic Process Automation
Software Testing
Frontend Development
Master Program
Databases
Big Data
Mobile Development
About
FAQs
Blog
Gallery
Success Stories
X
Contact Us
Microsoft Azure Security Technologies Training Course (AZ-500)
Curriculum
16 Sections
79 Lessons
10 Weeks
Expand all sections
Collapse all sections
Secure identity and access (15–20%)
0
Manage security controls for identity and access
6
2.1
Manage Azure built-in role assignments
2.2
Manage custom roles, including Azure roles and Microsoft Entra roles
2.3
Implement and manage Microsoft Entra Permissions Management
2.4
Plan and manage Azure resources in Microsoft Entra Privileged Identity Management, including settings and assignments
2.5
Implement multi-factor authentication (MFA) for access to Azure resources
2.6
Implement Conditional Access policies for cloud resources in Azure
Manage Microsoft Entra application access
6
3.1
Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants
3.2
Manage Microsoft Entra app registrations
3.3
Configure app registration permission scopes
3.4
Manage app registration permission consent
3.5
Manage and use service principals
3.6
Manage managed identities
Secure networking (20–25%)
0
Plan and implement security for virtual networks
9
5.1
Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)
5.2
Manage virtual networks by using Azure Virtual Network Manager
5.3
Plan and implement user-defined routes (UDRs)
5.4
Plan and implement Virtual Network peering or VPN gateway
5.5
Plan and implement Virtual WAN, including secured virtual hub
5.6
Secure VPN connectivity, including point-to-site and site-to-site
5.7
Implement encryption over ExpressRoute
5.8
Configure firewall settings on Azure resources
5.9
Monitor network security by using Network Watcher
Plan and implement security for private access to Azure resources
6
6.1
Plan and implement virtual network Service Endpoints
6.2
Plan and implement Private Endpoints
6.3
Plan and implement Private Link services
6.4
Plan and implement network integration for Azure App Service and Azure Functions
6.5
Plan and implement network security configurations for an App Service Environment (ASE)
6.6
Plan and implement network security configurations for an Azure SQL Managed Instance
Plan and implement security for public access to Azure resources
6
7.1
Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management
7.2
Plan, implement, and manage an Azure Firewall, including Azure Firewall Manager and firewall policies
7.3
Plan and implement an Azure Application Gateway
7.4
Plan and implement an Azure Front Door, including Content Delivery Network (CDN)
7.5
Plan and implement a Web Application Firewall (WAF)
7.6
Recommend when to use Azure DDoS Protection Standard
Secure compute, storage, and databases (20–25%)
0
Plan and implement advanced security for compute
9
9.1
Plan and implement remote access to virtual machines, including Azure Bastion and just-in-time (JIT)
9.2
Configure network isolation for Azure Kubernetes Service (AKS)
9.3
Secure and monitor AKS
9.4
Configure authentication for AKS
9.5
Configure security monitoring for Azure Container Instances (ACIs)
9.6
Configure security monitoring for Azure Container Apps (ACAs)
9.7
Manage access to Azure Container Registry (ACR)
9.8
Configure disk encryption, including Azure Disk Encryption (ADE), encryption at host, and confidential disk encryption
9.9
Recommend security configurations for Azure API Management
Plan and implement security for storage
7
10.1
Configure access control for storage accounts
10.2
Manage storage account access keys
10.3
Select and configure an appropriate method for access to Azure Files
10.4
Select and configure an appropriate method for access to Azure Blob Storage
10.5
Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage
10.6
Configure Bring your own key (BYOK)
10.7
Enable double encryption at the Azure Storage infrastructure level
Plan and implement security for Azure SQL Database and Azure SQL Managed Instance
5
11.1
Enable Microsoft Entra database authentication
11.2
Enable database auditing
11.3
Plan and implement dynamic masking
11.4
Implement Transparent Data Encryption (TDE)
11.5
Recommend when to use Azure SQL Database Always Encrypted
Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel (30–35%)
0
Implement and manage enforcement of cloud governance policies
8
13.1
Create, assign, and interpret policies and initiatives in Azure Policy
13.2
Configure Azure Key Vault network settings
13.3
Configure access to Key Vault, including vault access policies and Azure Role Based Access Control
13.4
Manage certificates, secrets, and keys
13.5
Configure key rotation
13.6
Perform backup and recovery of certificates, secrets, and keys
13.7
Implement security controls to protect backups
13.8
Implement security controls for asset management
Manage security posture by using Microsoft Defender for Cloud
6
14.1
Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory
14.2
Assess compliance against security frameworks by using Microsoft Defender for Cloud
14.3
Manage compliance standards in Microsoft Defender for Cloud
14.4
Add custom standards to Microsoft Defender for Cloud
14.5
Connect hybrid cloud and multi-cloud environments to Microsoft Defender for Cloud, including Amazon Web Services (AWS) and Google Cloud Platform (GCP)
14.6
Implement and use Microsoft Defender External Attack Surface Management (EASM)
Configure and manage threat protection by using Microsoft Defender for Cloud
5
15.1
Enable workload protection services in Microsoft Defender for Cloud
15.2
Configure Microsoft Defender for Servers, Microsoft Defender for Databases, and Microsoft Defender for Storage
15.3
Implement and manage agentless scanning for virtual machines in Microsoft Defender for Servers
15.4
Implement and manage Microsoft Defender Vulnerability Management for Azure virtual machines
15.5
Connect to and configure settings in Microsoft Defender for Cloud Devops Security, including GitHub, Azure DevOps, and GitLab
Configure and manage security monitoring and automation solutions
6
16.1
Manage and respond to security alerts in Microsoft Defender for Cloud
16.2
Configure workflow automation by using Microsoft Defender for Cloud
16.3
Monitor network security events and performance data by configuring data collection rules (DCRs) in Azure Monitor
16.4
Configure data connectors in Microsoft Sentinel
16.5
Enable analytics rules in Microsoft Sentinel
16.6
Configure automation in Microsoft Sentinel
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content