Nux Solutions whatsapp

Microsoft Certified: Microsoft Azure Security Technologies Exam - AZ-500


Nux software Solutions offers the best Training on Microsoft Certified: Designing and Implementing Microsoft DevOps Solutions Exam-AZ-400

Microsoft Certified: Microsoft Azure Security Technologies Exam - AZ-500 is one of the best cloud solutions available and in order to be an expert on this particular application Nux software Solutions is your one-stop destination. Over the years, we have been one of the premium institutes when it comes to rendering quality training in various domains of IT. We have a team of experts and highly qualified faculties who have been rendering quality training to our students.

The Microsoft Azure Security Technologies Exam - AZ-500

At Nux software Solutions, we have designed a highly customized and effective course material that is based in lab work and lots of hands-on application. We have made sure that our students got maximum practical exposure that would help them to achieve their goals in the professional fields.


Microsoft Azure Security Technologies Exam - AZ-500 Syllabus


Manage identity and access (30-35%)

Manage identities in Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra - Create and manage a managed identity for Azure resources

  • Manage Azure AD groups
  • Manage Azure AD users
  • Manage external identities by using Azure AD
  • Manage administrative units

Manage secure access by using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra- Configure Azure AD Privileged Identity Management (PIM)

  • Implement Conditional Access policies, including multifactor Authentication
  • Implement Azure AD Identity Protection
  • Implement passwordless authentication
  • Configure access reviews

Manage application access

  • Integrate single sign-on (SSO) and identity providers for authentication
  • Create an app registration
  • Configure app registration permission scopes
  • Manage app registration permission consent
  • Manage API permissions to Azure subscriptions and resources
  • Configure an authentication method for a service principal

Manage access control

  • Configure Azure role permissions for management groups, subscriptions, resource groups, and resources
  • Interpret role and resource permissions
  • Assign built-in roles in Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
  • Create and assign custom roles, including Azure roles and Azure AD roles

Implement platform protection (15-20%)

Implement advanced network security

  • Secure the connectivity of hybrid networks
  • Secure the connectivity of virtual networks
  • Create and configure Azure Firewall
  • Create and configure Azure Firewall Manager
  • Create and configure Azure Application Gateway
  • Create and configure Azure Front Door
  • Create and configure Web Application Firewall (WAF)
  • Configure a resource firewall, including a storage account, Azure SQL, Azure Key Vault, or Azure App Service
  • Implement Azure Service Endpoints
  • Implement Azure Private Endpoints, including integrating with other services
  • Implement Azure Private Links
  • Implement Azure DDoS Protection

Configure advanced security for computing - Configure Endpoint Protection for virtual machines (VMs)

  • Implement and manage security updates for VMs
  • Configure security for container services
  • Manage access to Azure Container Registry
  • Configure security for serverless computing
  • Configure security for an Azure App Service
  • Configure encryption at rest
  • Configure encryption in transit

Manage security operations (25-30%)

  • Configure centralized policy management - Configure a custom security policy
  • Create a policy initiative
  • Configure security settings and auditing by using Azure Policy

Configure and manage threat protection

  • Configure Microsoft Defender for Servers (not including Microsoft Defender for Endpoint)
  • Evaluate vulnerability scans from Microsoft Defender for Cloud
  • Configure Microsoft Defender for SQL
  • Use the Microsoft Threat Modeling Tool

Configure and manage security monitoring solutions

  • Create and customize alert rules by using Azure Monitor
  • Configure diagnostic logging and log retention by using Azure Monitor
  • Monitor security logs by using Azure Monitor
  • Create and customize alert rules in Microsoft Sentinel
  • Configure data connectors in Microsoft Sentinel
  • Evaluate alerts and incidents in Microsoft Sentinel

Secure data and applications (25-30%)

Configure security for storage

  • Configure access control for storage accounts
  • Configure storage account access keys
  • Configure Azure Files identity-based authentication for SMB access
  • Configure delegated access

Configure security for datas

  • Enable database authentication by using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
  • Enable database auditing
  • Configure dynamic masking on SQL workloads
  • Implement database encryption for Azure SQL Database
  • Implement network isolation for data solutions, including Azure Synapse Analytics and Azure Cosmos DB

Configure and manage Azure Key Vault

  • Create and configure Key Vault
  • Configure access to Key Vault
  • Manage certificates, secrets, and keys
  • Configure key rotation
  • Configure backup and recovery of certificates, secrets, and keys

To ensure success in the Microsoft MCA Azure Security Engineer certification exam, we recommend an authorized training course, practice test, and hands-on experience to prepare for Microsoft Azure Security Technologies (AZ-500) exam.