fbpx

AZ-500 Microsoft Azure Security Technologies

Microsoft Azure Security Technologies including Certification Exam AZ-500

AZ-500 Microsoft Azure Security Technologies certification training course boosts your knowledge as a Security engineer. Microsoft Azure Security certification is an associate-level certificate within role-based certifications.

AZ-500 exam validates your proficiency to manage security operations, securing data and applications, implementing platform protection, and managing identity and access. This certification training course provides you with an in-depth understanding of firewalls, network security groups, container security, Azure Monitor, Log Analytics, Azure security center, configuring security policy, leveraging key vault, and enabling auditing.

In the AZ-500 Microsoft Azure Security Technologies certification training course you will learn how to develop and deploy identity management to protect the Azure platform, authentication techniques on Azure, security configuration for container and virtual machine, manage subscription, manage Azure, configure access control, capturing log data, monitor various application, encryption techniques, security audits, implement Azure security network, data protection, SSL/TLS toolkit, Azure Key Vault and more.

  • Training: get practical technical skills
  • Receive a certificate of course attendance
  • Small class size: increased instructor interaction
  • Authorised test center: exams taken at our premises
  • Expert trainers: imparting real-world experience
  • This course requires intermediate-level knowledge of Azure service and IT security principles.

Candidates can achieve this certification by passing the following exam(s).

  • Exam AZ-500: Microsoft Azure Security Technologies

The certification exam can be registered and attempted within 3 months of course/module completion at Logitrain training centre on weekdays during normal business hours (excludes public holidays)

AZ-500 Course Material
  • Configure and manage Key Vault
  • Configure security for databases
  • Configure security for storage
  • Configure security policies
  • Monitor security by using Azure Sentinel
  • Monitor security by using Azure Security Centre
  • Monitor security by using Azure Monitor
  • Configure advanced security for compute
  • Implement advanced network security
  • Manage access control
  • Manage application access
  • Configure secure access by using Azure AD

 

This course is likely to add to the employment-related skills of the participants. The skills developed are likely to be used in the course of being an employee or working in a business.

  • Azure administrators
  • Azure engineers
  • Cloud computing professionals
  • Professionals interested in Microsoft certifications
  • Configure security for service principals
  • Manage Azure ad directory groups
  • Manage Azure ad users
  • Configure password write back
  • Configure authentication methods including password hash and pass-through
  • Authentication (PTA), OAUTH, and password less
  • Transfer Azure subscriptions between Azure ad tenants
  • Monitor privileged access for Azure AD privileged identity management (PIM)
  • Configure access reviews
  • Activate and configure PIM
  • Implement conditional access policies including multi-factor authentication
  • Configure Azure AD identity protection
  • Create app registration
  • Configure app registration permission scopes
  • Manage app registration permission consent
  • Manage API access to Azure subscriptions and resources
  • Configure subscription and resource permissions
  • Configure resource group permissions
  • Configure custom RBAC roles
  • Identify the appropriate role
  • Apply principle of least privilege
  • Interpret permissions
  • Check access
  • Secure the connectivity of virtual networks
  • Configure network security groups and application security groups
  • Create and configure Azure firewall
  • Configure azure front door service as an application gateway
  • Configure a web application firewall on Azure application gateway
  • Configure Azure bastion
  • Configure a firewall on a storage account, Azure SQL, key vault, or app service
  • Implement service endpoints
  • Implement DDOS protection
  • Configure endpoint protection
  • Configure and monitor system updates for VMs
  • Configure authentication for Azure container registry
  • Configure security for different types of containers
  • Implement vulnerability management
  • Configure isolation for AKS
  • Configure security for container registry
  • Implement Azure disk encryption
  • Configure authentication and security for azure app service
  • Configure SSL/TLS certs
  • Configure authentication for azure KUBERNETES service
  • Configure automatic updates
  • Create and customize alerts
  • Monitor security logs by using Azure monitor
  • Configure diagnostic logging and log retention
  • Evaluate vulnerability scans from Azure security center
  • Configure just in time VM access by using Azure security center
  • Configure centralized policy management by using azure security center
  • Configure compliance policies and evaluate for compliance by using azure security center
  • Create and customize alerts
  • Configure data sources to Azure sentinel
  • Evaluate results from Azure sentinel
  • Configure workflow automation by using Azure sentinel
  • Configure security settings by using Azure policy
  • Configure security settings by using Azure blueprint
  • Configure a playbook by using azure sentinel
  • Configure access control for storage accounts
  • Configure key management for storage accounts
  • Configure Azure AD authentication for Azure storage
  • Configure Azure AD domain services authentication for Azure files
  • Create and manage shared access signatures (SaS)
  • Create a shared access policy for a blob or blob container
  • Configure storage service encryption
  • Enable database authentication
  • Enable database auditing
  • Configure azure SQL database advanced threat protection
  • Implement database encryption
  • Implement Azure SQL database always encrypted
  • Manage access to key vault
  • Manage permissions to secrets, certificates, and keys
  • Configure RBAC usage in Azure key vault
  • Manage certificates
  • Manage secrets
  • Configure key rotation
Request Information
  • five star ratings
    High-quality, cost-effective training since 2004
  • This field is for validation purposes and should be left unchanged.
What is included with the Microsoft AZ-500 Microsoft Azure Security Technologies Course?
Logitrain course includes official certification exam fee.
Includes Official Exam Fee

Take the certification exam within 3 months of course / module completion

Logitrain is an Authorised Pearson VUE Test Centre.
Authorised Test Centre

Take the official certification exam at Logitrain, a local VUE test centre or online

Logitrain courses, programs and packages includes course material.
Includes Course Material

Course material in digital format is included for flexibility and ease of use

Logitrain courses, packages and programs includes sample practise questions.
Includes Mock & Test Questions

Mock test is included in the full-time courses to assist with your preparation

Skilled Trainers
Highly Skilled Trainers

Our trainers are highly skilled with expertise and extensive hands-on experience

Logitrain courses include price beat guarantee.
Our Price Beat Guarantee

Relax, we will beat competitor’s advertised price. Our course has no extra costs

Proposed Dates, Locations & Prices
Logitrain Live Online Training Banner

Location Type Duration Price Dates
Location Type Duration Price Dates

The supply of this course/package/program is governed by our terms and conditions. Please read them carefully before enrolling, as enrolment is conditional on acceptance of these terms and conditions. Courses run subject to availability and minimum registrations.

OUR ACCREDITATIONS

Find out why we are the leading choice to help boost your career in Australia

medal first placePrepare to get IT job ready in 8 weeks

Classroom trainingsTrained 15,000+ professionals and counting

training accessibilityExperienced Provider: Operating Since 2004

TeamworkTrained staff from 1200+ Australian Businesses

We Have Placed Candidates In
SATISFIED CUSTOMERS

“The trainer explained everything very well. Logitrain was very helpful for me in getting a better overall understanding of CCNA. I previously had studied it 2 years earlier but required revision.”
– Felice Amenta, Senior Service Management Officer at Optus, Rating: 4.8/5

“I recently followed the ITIL Foundation course at Logitrain. The training, materials and facilities were excellent and I would not hesitate to train with Logitrain again.”
– Rob Stockey, Senior Engineer at APAC, Rating: 4.8/5

“Had a blast! Great course, will be back soon to do another.”
– Justin Blackford, Systems Administrator at Gloria Jean’s Coffee, Rating: 4.8/5

“The trainer was very patient and gave everybody the opportunity to participate.”
– Tim Symonds, Solutions Architect at MSC Mobility Solutions, Rating: 4.8/5

Attend live virtual training program
SOME OF OUR CLIENTS

Over 1000 organisations have relied on Logitrain to be their trusted training partner.

five star ratings
High-quality, cost-effective training since 2004
Learn More
  • This field is for validation purposes and should be left unchanged.
create

Don’t Wait. Please fill the form now.