{"id":7311,"date":"2025-09-04T11:00:00","date_gmt":"2025-09-04T05:30:00","guid":{"rendered":"https:\/\/www.testpreptraining.com\/blog\/?p=7311"},"modified":"2025-09-04T13:26:46","modified_gmt":"2025-09-04T07:56:46","slug":"microsoft-azure-security-technologies-az-500-study-guide","status":"publish","type":"post","link":"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/","title":{"rendered":"Microsoft Azure Security Technologies AZ-500 Study Guide &#8211;  Updated 2025"},"content":{"rendered":"\n<p>Cyber threats are evolving faster than ever, and cloud platforms like Microsoft Azure are right at the center of the storm. If you are serious about building a career in cloud security, there\u2019s no better way to prove your expertise than by conquering the Microsoft Azure Security Technologies AZ-500 exam.<\/p>\n\n\n\n<p>The AZ-500 certification has become a benchmark for cloud security professionals who want to demonstrate their ability to design, implement, and manage security controls in Azure. As businesses shift more workloads to the cloud in 2025, the pressure on skilled professionals to protect sensitive data, defend against cyberattacks, and ensure compliance with regulations has never been higher. That\u2019s exactly where the AZ-500 steps in\u2014it validates your ability to safeguard Azure environments in real-world, high-stakes scenarios.<\/p>\n\n\n\n<p>But here is the catch: this is not a beginner-friendly certification. The exam challenges you with complex scenarios around identity and access management, platform protection, data security, network security, threat detection, and incident response. Passing it requires more than just memorizing concepts\u2014you need hands-on skills, a clear strategy, and a focused study path tailored to the updated 2025 exam objectives.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-content-bg-color has-content-primary-background-color has-text-color has-background has-link-color wp-elements-692c80e64df12c2207e0d313c430c4ab\"><strong>About the Microsoft Azure Security Technologies AZ-500<\/strong><\/h3>\n\n\n\n<p>That\u2019s why this study guide exists. It\u2019s designed to give you a roadmap, break down the exam domains, highlight what\u2019s changed in the latest update, and share practical tips so you can prepare smarter, not harder. Whether you\u2019re aiming to land a cloud security role, level up your career, or simply prove your skills in one of the most critical areas of IT today, this guide will be your companion every step of the way.<\/p>\n\n\n\n<p>The <strong><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-practice-exam\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure Security Technologies (AZ-500)<\/a><\/strong> exam is designed for IT professionals who want to validate their ability to manage and secure Azure environments. It focuses heavily on real-world security scenarios rather than just theory, making it one of the most hands-on and practical certifications in Microsoft\u2019s lineup.<\/p>\n\n\n\n<p>The exam measures your skills in four key domains:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Manage Identity and Access \u2013 Configuring and managing Azure Active Directory, securing identities, and enabling role-based access control (RBAC).<\/li>\n\n\n\n<li>Implement Platform Protection \u2013 Securing networks, managing firewalls, configuring security policies, and protecting workloads.<\/li>\n\n\n\n<li>Manage Security Operations \u2013 Setting up monitoring, detecting threats, responding to incidents, and integrating security solutions.<\/li>\n\n\n\n<li>Secure Data and Applications \u2013 Implementing data encryption, securing app services, and managing key vaults.<\/li>\n<\/ol>\n\n\n\n<p>In the updated 2025 version, Microsoft has refined the objectives to align with the latest cloud security challenges. Expect more emphasis on Zero Trust principles, hybrid security, advanced monitoring, and automation with tools like Microsoft Defender and Sentinel.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exam format: Multiple-choice, scenario-based, case studies, and hands-on labs.<\/li>\n\n\n\n<li>Duration: Around 150 minutes.<\/li>\n\n\n\n<li>Passing score: 700 out of 1000.<\/li>\n\n\n\n<li>Recommended experience: Candidates should have prior knowledge of Azure services, general IT security, and hands-on practice with security tools.<\/li>\n<\/ul>\n\n\n\n<p>Earning the AZ-500 proves you\u2019re not just familiar with Azure but capable of defending it against today\u2019s evolving threats\u2014a skill set highly sought after in roles like Cloud Security Engineer, Security Administrator, or Information Security Analyst.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-questions\">Microsoft Azure Security Technologies AZ-500\u00a0<\/a>exam checks if you can do technical tasks like handling who gets access, protecting the platform, running security operations, and keeping data and apps secure. This exam is designed for individuals responsible for ensuring the security of Microsoft Azure, controlling access, protecting data and applications, and managing security.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Who should take the AZ-500 Exam?<\/strong><\/h4>\n\n\n\n<p>Microsoft Azure Security Technologies (AZ-500) is a certification exam for professionals seeking to demonstrate their knowledge of securing data, devices, and infrastructure in Microsoft Azure. The exam covers a range of security topics, including identity and access management, platform protection, and security management. The target audience for the Microsoft Azure AZ-500 certification exam includes-<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firstly, those candidates who aspire to make their careers in the tech field.<\/li>\n\n\n\n<li>Then professionals who want to gain an understanding of Azure fundamentals.<\/li>\n\n\n\n<li>Further, the individuals who have prior knowledge of advanced security.<\/li>\n\n\n\n<li>Also, those who have prior working experience with Microsoft Azure.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><span style=\"text-decoration: underline;\">Basic terms to get familiar with<\/span>:<\/strong><\/h4>\n\n\n\n<p>Here are some basic terms that are commonly associated with the AZ-500 exam:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Azure Active Directory (Azure AD): Azure AD is Microsoft&#8217;s online service for handling who can access what. It helps organizations control user identities and access to things in Azure and other Microsoft services.<\/li>\n\n\n\n<li>Network Security Group (NSG): An NSG is a firewall that allows or blocks traffic to virtual machines or subnets in Azure. It uses rules to control inbound and outbound traffic.<\/li>\n\n\n\n<li>Azure Key Vault: Azure Key Vault is a cloud-based service that allows organizations to store and manage cryptographic keys, certificates, and secrets used in their applications and services.<\/li>\n\n\n\n<li>Security Center: Security Center is a built-in Azure service that provides a unified view of security across an organization&#8217;s Azure resources. It provides security recommendations and alerts to help organizations identify and mitigate potential security threats.<\/li>\n\n\n\n<li>Azure Information Protection (AIP): AIP is a cloud-based service that allows organizations to classify, label, and protect their sensitive data using encryption and access controls. It integrates with Azure AD to provide identity-based access to protected data.<\/li>\n\n\n\n<li>Security and Compliance Center: Security and Compliance Center is a centralized portal that provides a unified view of an organization&#8217;s compliance status across Microsoft services, including Azure. It provides tools to help organizations manage their compliance and security policies.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Learning Objectives<\/strong> &#8211; <strong>Microsoft Azure AZ-500<\/strong><\/h3>\n\n\n\n<p>Microsoft certification is a well-known player in the field of cloud computing. This particular vendor states pertinent details on the different domains included in a specific certification exam. As a result, you are easily able to locate the required detailed information along with the subtopics included in each domain. The AZ-500 exam focuses on four key areas:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Firstly, manage identity and access&nbsp;<\/li>\n\n\n\n<li>Secondly, Implement platform protection&nbsp;<\/li>\n\n\n\n<li>Also, Manage security operations&nbsp;<\/li>\n\n\n\n<li>Finally, Secure data and applications<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/learning-path-750x352.jpg\" alt=\"Microsoft Azure Security Technologies AZ-500  Learning Path\" style=\"width:661px;height:310px\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-content-bg-color has-content-primary-background-color has-text-color has-background has-link-color wp-elements-04896dedd83b75cb88ce54c0bb9404c2\"><strong>Microsoft Azure AZ-500 Exam <strong>Study Guide 2025<\/strong><\/strong>  <\/h2>\n\n\n\n<p>Preparations for this exam are a huge task given its vast syllabus. You must have access to authentic study resources during your preparation journey. Moreover, this exam is a stepping stone to your dream career; therefore, you should prepare with all your focus. The Microsoft Azure AZ-500 exam is designed to test your knowledge and skills in securing Microsoft Azure. The exam covers various areas such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Management of identity and access: covers Azure Active Directory (AD) concepts, Multi-Factor Authentication (MFA), Azure AD Identity protection, etc.<\/li>\n\n\n\n<li>Platform protection: covers Virtual network protection, network security groups, Azure AD Domain Services, etc.<\/li>\n\n\n\n<li>Security operations: covers security incident management, security event logging, threat protection, etc.<\/li>\n\n\n\n<li>Data and application protection: covers encryption, Azure Key Vault, Azure Information Protection, Azure Security Center, etc.<\/li>\n<\/ul>\n\n\n\n<p>It is recommended to have hands-on experience with Azure and its security services before appearing for the exam. You can refer to the official Microsoft Azure Security Technologies (AZ-500) certification page for more details and study resources. Here is a step-by-step AZ-500 study guide to get the most from your efforts in exam preparation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Microsoft Azure AZ-500 Step-by-Step Preparation Guide 2025<\/strong><\/h3>\n\n\n\n<p>Preparing for the AZ-500 exam requires more than just knowing security concepts\u2014you need to structure your learning around the updated domains, practice with real Azure tools, and test yourself with exam-style questions. This study guide breaks down the exam into clear sections, helping you focus on the right topics, allocate time effectively, and build confidence for the big day.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Domain<\/strong><\/th><th><strong>Weight (2025)<\/strong><\/th><th><strong>Key Topics<\/strong><\/th><th><strong>Study Resources<\/strong><\/th><th><strong>Practice Activities<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>Secure Identity and Access<\/strong><\/td><td>15\u201320%<\/td><td>Azure AD, Conditional Access, MFA, RBAC, Privileged Identity Management (PIM)<\/td><td>Microsoft Learn Identity modules, \u201cExam Ref AZ-500\u201d (Identity section)<\/td><td>Configure Conditional Access in Azure AD, Set up PIM for admin roles<\/td><\/tr><tr><td><strong>Secure Networking<\/strong><\/td><td>20\u201325%<\/td><td>Network Security Groups, Azure Firewall, Application Gateway, DDoS Protection, Virtual Network Manager<\/td><td>Azure Networking Docs, Hands-on labs on MS Learn<\/td><td>Deploy and secure VNets, Configure Azure Firewall rules<\/td><\/tr><tr><td><strong>Secure Compute, Storage, and Databases<\/strong><\/td><td>20\u201325%<\/td><td>VM security, Disk encryption, Key Vault, Storage account security, SQL security, Backup and recovery<\/td><td>Microsoft Learn Compute + Storage modules, Tim Warner AZ-500 video series<\/td><td>Enable disk encryption, Set up Key Vault secrets, Configure SQL firewall rules<\/td><\/tr><tr><td><strong>Secure Azure using Microsoft Defender for Cloud &amp; Sentinel<\/strong><\/td><td>30\u201335%<\/td><td>Defender for Cloud posture management, Security alerts, Automation rules, Sentinel workbooks, DCRs, DevOps security<\/td><td>MS Learn Security Operations modules, Azure Sentinel Labs<\/td><td>Enable Defender for Cloud, Set up Sentinel analytics rules, Create a workbook dashboard<\/td><\/tr><tr><td><strong>Exam Readiness and Practice<\/strong><\/td><td>N\/A<\/td><td>Practice questions, Sandbox, Time management<\/td><td>MeasureUp practice tests, Whizlabs simulator, Exam Sandbox<\/td><td>Attempt timed practice tests, Review incorrect answers, Take mock exams under exam conditions<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Microsoft Azure AZ-500 Preparation Strategy (2025)<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Step<\/strong><\/th><th><strong>Focus Area<\/strong><\/th><th><strong>What to Do<\/strong><\/th><th><strong>Deliverables \/ Outcomes<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>1<\/strong><\/td><td>Get Oriented<\/td><td>Review official exam page, note domains &amp; weights, set up a prep tracker (Excel\/Notion).<\/td><td>Personal exam tracker with topics &amp; weak spots.<\/td><\/tr><tr><td><strong>2<\/strong><\/td><td>Set Up Lab<\/td><td>Create Azure subscription\/free trial, make resource groups per domain, enable cost alerts.<\/td><td>Ready-to-use Azure lab environment.<\/td><\/tr><tr><td><strong>3<\/strong><\/td><td>Warm-Up Fundamentals<\/td><td>Refresh basics: RBAC, Conditional Access, encryption, networking, monitoring. Do one hands-on task per area.<\/td><td>Confidence in core security concepts.<\/td><\/tr><tr><td><strong>4<\/strong><\/td><td>Deep Dive: Identity &amp; Access (15\u201320%)<\/td><td>Study AAD, Conditional Access, MFA, RBAC, PIM. Do labs for CA policies, PIM, access reviews.<\/td><td>\u201cIdentity hardening checklist.\u201d<\/td><\/tr><tr><td><strong>5<\/strong><\/td><td>Deep Dive: Networking (20\u201325%)<\/td><td>Cover NSGs, Azure Firewall, WAF, DDoS, Private Endpoints, VNet Manager. Labs for NSGs, Firewall rules, WAF.<\/td><td>Network diagram + security rationale.<\/td><\/tr><tr><td><strong>6<\/strong><\/td><td>Deep Dive: Compute, Storage, DBs (20\u201325%)<\/td><td>Study VM security, Defender plans, Key Vault, storage encryption, backups. Labs: enable Defender, secure Key Vault, harden storage.<\/td><td>\u201cData protection playbook.\u201d<\/td><\/tr><tr><td><strong>7<\/strong><\/td><td>Deep Dive: Defender &amp; Sentinel (30\u201335%)<\/td><td>Master Secure Score, automation rules, DCRs, Sentinel connectors, analytics rules, playbooks. Labs for Defender posture, Sentinel setup.<\/td><td>\u201cSOC runbook\u201d with triage + automation.<\/td><\/tr><tr><td><strong>8<\/strong><\/td><td>Governance &amp; Guardrails<\/td><td>Apply Azure Policy, configure locks, enforce tagging rules.<\/td><td>Documented governance baseline.<\/td><\/tr><tr><td><strong>9<\/strong><\/td><td>Quick-Reference Kit<\/td><td>Build cheat sheets &amp; flashcards for key concepts (CA, Firewall priorities, Key Vault RBAC, Sentinel rules).<\/td><td>Personal revision kit.<\/td><\/tr><tr><td><strong>10<\/strong><\/td><td>Practice Tests &amp; Review Loop<\/td><td>Attempt timed mocks (MeasureUp\/Whizlabs). Analyze misses, reinforce with labs\/docs. Repeat until stable.<\/td><td>Consistent 750+ scores in mocks.<\/td><\/tr><tr><td><strong>11<\/strong><\/td><td>Scenario Rehearsal<\/td><td>Draft 3\u20135 mini-scenarios per domain, walk through objectives, steps, validation, rollback.<\/td><td>Scenario playbook for real exam logic.<\/td><\/tr><tr><td><strong>12<\/strong><\/td><td>Final 48-Hour Polish<\/td><td>Light labs, review cheat sheets, deliverables, and flashcards. Do 1 short timed quiz.<\/td><td>Exam-day confidence and calm.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/Instructor-Led-Training-1.png\" alt=\"Preparatory Guide for AZ-500\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-content-bg-color has-content-primary-background-color has-text-color has-background has-link-color wp-elements-cb8915a6d91bbba7fc7ec1b00784b1ed\"><strong>Microsoft Azure Security Technologies AZ-500 Course Outline<\/strong><\/h3>\n\n\n\n<p>First and foremost, you need to be fully aware of the regulations and guidelines for the test. To perform well in the test, you should familiarize yourself with the topics and course material. Also, it is crucial for your preparations that you design your study schedule around the exam goals. You must give each of the four domains this exam covers ample time. The AZ-500 subjects cover<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Manage identity and access (25\u201330%)<\/strong><\/h4>\n\n\n\n<p>Manage Microsoft Entra identities<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure Microsoft Entra users<\/li>\n\n\n\n<li>Secure Microsoft Entra groups<\/li>\n\n\n\n<li>Recommend when to use external identities&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/external-identities\/external-identities-overview\" target=\"_blank\" rel=\"noreferrer noopener\">External Identities in Azure Active Directory<\/a>)<\/li>\n\n\n\n<li>Secure external identities<\/li>\n\n\n\n<li>Implement Microsoft Entra ID Protection<\/li>\n<\/ul>\n\n\n\n<p>Manage Microsoft Entra authentication<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementing multi-factor authentication (MFA)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-mfa-howitworks\" target=\"_blank\" rel=\"noreferrer noopener\">Azure AD Multi-Factor Authentication<\/a>)<\/li>\n\n\n\n<li>Configure Microsoft Entra Verified ID<\/li>\n\n\n\n<li>Implement passwordless authentication&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/authentication\/howto-authentication-passwordless-phone\" target=\"_blank\" rel=\"noreferrer noopener\">Enable passwordless sign-in with Microsoft Authenticator<\/a>)<\/li>\n\n\n\n<li>Implement password protection&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-password-ban-bad-on-premises\" target=\"_blank\" rel=\"noreferrer noopener\">Enforce on-premises Azure AD Password Protection for Active Directory Domain Services<\/a>)<\/li>\n\n\n\n<li>Implementing single sign-on (SSO)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/what-is-single-sign-on\" target=\"_blank\" rel=\"noreferrer noopener\">What is single sign-on in Azure Active Directory?<\/a>)<\/li>\n\n\n\n<li>Integrate single sign on (SSO) and identity providers<\/li>\n\n\n\n<li>Recommend and enforce modern authentication protocols&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/block-legacy-authentication\" target=\"_blank\" rel=\"noreferrer noopener\">Block legacy authentication with Azure AD with Conditional Access<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Manage Microsoft Entra authorization<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure Azure role permissions for management groups, subscriptions, resource groups, and resources&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/governance\/management-groups\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What are Azure management groups<\/a>)<\/li>\n\n\n\n<li>Assign Microsoft Entra built-in roles<\/li>\n\n\n\n<li>Assign built-in roles in Azure<\/li>\n\n\n\n<li>Create and assign custom roles, including Azure roles and Microsoft Entra roles<\/li>\n\n\n\n<li>Implement and manage Microsoft Entra Permissions Management&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/cloud-infrastructure-entitlement-management\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What\u2019s Permissions Management?<\/a>)<\/li>\n\n\n\n<li>Configure Microsoft Entra Privileged Identity Management<\/li>\n\n\n\n<li>Configure role management and access reviews by using Microsoft Entra&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/governance\/access-reviews-overview\" target=\"_blank\" rel=\"noreferrer noopener\">What are access reviews?<\/a>)<\/li>\n\n\n\n<li>Implement Conditional Access policies&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Conditional Access?<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Manage Microsoft Entra application access<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/grant-admin-consent?pivots=portal\" target=\"_blank\" rel=\"noreferrer noopener\">Grant tenant-wide admin consent to an application<\/a>)<\/li>\n\n\n\n<li>Manage Microsoft Entra app registrations<\/li>\n\n\n\n<li>Configure app registration permission scopes&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/develop\/permissions-consent-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Introduction to permissions and consent<\/a>)<\/li>\n\n\n\n<li>Managing app registration permission consent&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/configure-user-consent?pivots=portal\" target=\"_blank\" rel=\"noreferrer noopener\">Configure how users consent to applications<\/a>)<\/li>\n\n\n\n<li>Manage and use service principals&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/develop\/app-objects-and-service-principals\" target=\"_blank\" rel=\"noreferrer noopener\">Application and service principal objects in Azure Active Directory<\/a>)<\/li>\n\n\n\n<li>Manage managed identities for Azure resources&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/managed-identities-azure-resources\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What are managed identities for Azure resources?<\/a>)<\/li>\n\n\n\n<li>Recommend when to use and configure an Microsoft Entra Application Proxy, including authentication<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Secure networking (20\u201325%)<\/strong><\/h4>\n\n\n\n<p>Plan and Implement security for virtual networks<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-network\/application-security-groups\" target=\"_blank\" rel=\"noreferrer noopener\">Application security groups<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-network\/network-security-groups-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Network security groups<\/a>)<\/li>\n\n\n\n<li>Plan and implement user-defined routes (UDRs)<\/li>\n\n\n\n<li>Planning and implement VNET peering or VPN gateway&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-howto-vnet-vnet-resource-manager-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Configure a VNet-to-VNet VPN gateway connection by using the Azure portal<\/a>)<\/li>\n\n\n\n<li>Plan and implement Virtual WAN, including a secured virtual hub&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/firewall-manager\/secured-virtual-hub\" target=\"_blank\" rel=\"noreferrer noopener\">What is a secured virtual hub?<\/a>)<\/li>\n\n\n\n<li>Secure VPN connectivity, including point-to-site and site-to-site&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/vpn-gateway\/point-to-site-about\" target=\"_blank\" rel=\"noreferrer noopener\">About Point-to-Site VPN<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/vpn-gateway\/tutorial-site-to-site-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Create a site-to-site VPN connection<\/a>)<\/li>\n\n\n\n<li>Implement encryption over ExpressRoute&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/expressroute\/expressroute-about-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">ExpressRoute encryption<\/a>)<\/li>\n\n\n\n<li>Configure firewall settings on PaaS resources&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/common\/storage-network-security?tabs=azure-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Configure Azure Storage firewalls and virtual networks<\/a>)<\/li>\n\n\n\n<li>Monitor network security by using Network Watcher, including NSG flow logging&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/network-watcher-nsg-flow-logging-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Introduction to flow logs for network security groups<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/network-watcher-nsg-flow-logging-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Log network traffic to and from a virtual machine using the Azure portal<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Plan and implement security for private access to Azure resources<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan and implement virtual network Service Endpoints&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-network\/virtual-network-service-endpoints-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Virtual Network service endpoints<\/a>)<\/li>\n\n\n\n<li>Planning and implement Private Endpoints&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/private-link\/private-endpoint-overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is a private endpoint?<\/a>)<\/li>\n\n\n\n<li>Plan and implement Private Link services&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/private-link\/private-link-overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Private Link?<\/a>)<\/li>\n\n\n\n<li>Plan and implement network integration for Azure App Service and Azure Functions<\/li>\n\n\n\n<li>Plan and implement network security configurations for an App Service Environment (ASE)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/app-service\/environment\/network-info\" target=\"_blank\" rel=\"noreferrer noopener\">Networking considerations for App Service Environment<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/app-service\/environment\/networking\" target=\"_blank\" rel=\"noreferrer noopener\">App Service Environment networking<\/a>)<\/li>\n\n\n\n<li>Planning and implement network security configurations for an Azure SQL Managed Instance&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-sql\/database\/security-overview?view=azuresql\" target=\"_blank\" rel=\"noreferrer noopener\">Azure SQL Database and SQL Managed Instance security capabilities<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/infrastructure-sql\" target=\"_blank\" rel=\"noreferrer noopener\">Azure SQL Database security features<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Plan and implement security for public access to Azure resources<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/app-service\/configure-ssl-certificate?tabs=apex%2Cportal\" target=\"_blank\" rel=\"noreferrer noopener\">Add and manage TLS\/SSL certificates in Azure App Service<\/a>)<\/li>\n\n\n\n<li>Plan and implement, and manager an Azure Firewall including Azure Firewall Manager and firewall policies&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/firewall-manager\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Firewall Manager?<\/a>)<\/li>\n\n\n\n<li>Plan and implement an Azure Application Gateway&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/application-gateway\/configuration-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">Application Gateway infrastructure configuration<\/a>)<\/li>\n\n\n\n<li>Plan and implement an Azure Front Door, including Content Delivery Network (CDN)<\/li>\n\n\n\n<li>Plan and implement a Web Application Firewall (WAF)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/web-application-firewall\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Web Application Firewall?<\/a>)<\/li>\n\n\n\n<li>Recommend when to use Azure DDoS Protection Standard&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ddos-protection\/ddos-protection-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure DDoS Protection<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Secure compute, storage, and databases (20\u201325%)<\/strong><\/h4>\n\n\n\n<p>Plan and implement advanced security for compute<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan and implement remote access to public endpoints, including Azure Bastion and just-in-time (JIT) virtual machine (VM) access&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/bastion\/bastion-overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Bastion?<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/ready\/azure-best-practices\/plan-for-virtual-machine-remote-access\" target=\"_blank\" rel=\"noreferrer noopener\">Plan for virtual machine remote access<\/a>)<\/li>\n\n\n\n<li>Configure network isolation for Azure Kubernetes Service (AKS)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/aks\/concepts-network\" target=\"_blank\" rel=\"noreferrer noopener\">Network concepts for applications in Azure Kubernetes Service (AKS)<\/a>)<\/li>\n\n\n\n<li>Secure and monitor AKS&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/aks\/monitor-aks\" target=\"_blank\" rel=\"noreferrer noopener\">Monitoring Azure Kubernetes Service (AKS) with Azure Monitor<\/a>)<\/li>\n\n\n\n<li>Configuring authentication for AKS&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/aks\/concepts-identity\" target=\"_blank\" rel=\"noreferrer noopener\">Access and identity options for Azure Kubernetes Service (AKS)<\/a>)<\/li>\n\n\n\n<li>Configure security monitoring for Azure Container Instances (ACIs)<\/li>\n\n\n\n<li>Configure security monitoring for Azure Container Apps (ACAs)<\/li>\n\n\n\n<li>Manage access to Azure Container Registry (ACR)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/container-registry\/container-registry-roles?tabs=azure-cli\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Container Registry roles and permissions<\/a>)<\/li>\n\n\n\n<li>Configure disk encryption, including Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-machines\/disk-encryption-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Overview of managed disk encryption options<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-machines\/windows\/disk-encryption-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Disk Encryption for Windows VMs<\/a>)<\/li>\n\n\n\n<li>Recommend security configurations for Azure API Management&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/baselines\/api-management-security-baseline\" target=\"_blank\" rel=\"noreferrer noopener\">Azure security baseline for API Management<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Plan and implement security for storage<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure access control for storage accounts&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/common\/authorize-data-access\" target=\"_blank\" rel=\"noreferrer noopener\">Authorize access to data in Azure Storage<\/a>)<\/li>\n\n\n\n<li>Manage life cycle for storage account access keys&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/lifecycle-management-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Optimize costs by automatically managing the data lifecycle<\/a>)<\/li>\n\n\n\n<li>Selecting and configure an appropriate method for access to Azure Files&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/files\/storage-how-to-use-files-windows\" target=\"_blank\" rel=\"noreferrer noopener\">Mount SMB Azure file share on Windows<\/a>)<\/li>\n\n\n\n<li>Select and configure an appropriate method for access to Azure Blob Storage&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/authorize-access-azure-active-directory\" target=\"_blank\" rel=\"noreferrer noopener\">Authorize access to blobs using Azure Active Directory<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/authorize-data-operations-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Choose how to authorize access to blob data in the Azure portal<\/a>)<\/li>\n\n\n\n<li>Select and configure an appropriate method for access to Azure Tables&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/tables\/authorize-access-azure-active-directory\" target=\"_blank\" rel=\"noreferrer noopener\">Authorize access to tables using Azure Active Directory<\/a>)<\/li>\n\n\n\n<li>Selecting and configure an appropriate method for access to Azure Queues&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/queues\/storage-dotnet-how-to-use-queues?tabs=dotnet\" target=\"_blank\" rel=\"noreferrer noopener\">Get started with Azure Queue Storage using .NET<\/a>)<\/li>\n\n\n\n<li>Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/immutable-storage-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Store business-critical blob data with immutable storage<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/data-protection-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Data protection overview<\/a>)<\/li>\n\n\n\n<li>Configure Bring your own key (BYOK)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/information-protection\/byok-price-restrictions\" target=\"_blank\" rel=\"noreferrer noopener\">Bring your own key (BYOK) details for Azure Information Protection<\/a>)<\/li>\n\n\n\n<li>Enable double encryption at the Azure Storage infrastructure level&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/common\/infrastructure-encryption-enable?tabs=portal\" target=\"_blank\" rel=\"noreferrer noopener\">Enable infrastructure encryption for double encryption of data<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Plan and implement security for Azure SQL Database and Azure SQL Managed Instance<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable Microsoft Entra database authentication<\/li>\n\n\n\n<li>Enable database auditing&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-sql\/database\/auditing-overview?view=azuresql\" target=\"_blank\" rel=\"noreferrer noopener\">Auditing for Azure SQL Database and Azure Synapse Analytics<\/a>)<\/li>\n\n\n\n<li>Identify use cases for the Microsoft Purview governance portal&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/purview\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What\u2019s available in the Microsoft Purview governance portal?<\/a>)<\/li>\n\n\n\n<li>Implement data classification of sensitive information by using the Microsoft Purview governance portal&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/purview\/concept-classification\" target=\"_blank\" rel=\"noreferrer noopener\">Data classification in the Microsoft Purview governance portal<\/a>)<\/li>\n\n\n\n<li>Plan and implement dynamic masking&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/relational-databases\/security\/dynamic-data-masking?view=sql-server-ver16\" target=\"_blank\" rel=\"noreferrer noopener\">Dynamic Data Masking<\/a>)<\/li>\n\n\n\n<li>Implement Transparent Database Encryption (TDE)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/transparent-data-encryption?view=sql-server-ver16\" target=\"_blank\" rel=\"noreferrer noopener\">Transparent data encryption (TDE)<\/a>)<\/li>\n\n\n\n<li>Recommend when to use Azure SQL Database Always Encrypted&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/always-encrypted-database-engine?view=sql-server-ver16\" target=\"_blank\" rel=\"noreferrer noopener\">Always Encrypted<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Manage security operations (25\u201330%)<\/strong><\/h4>\n\n\n\n<p>Plan, implement, and manage governance for security<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create, assign, and interpret security policies and initiatives in Azure Policy&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/governance\/policy\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Policy?<\/a>)<\/li>\n\n\n\n<li>Configure security settings by using Azure Blueprint&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/governance\/blueprints\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Blueprints?<\/a>)<\/li>\n\n\n\n<li>Deploy secure infrastructures by using a landing zone&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/ready\/landing-zone\/\" target=\"_blank\" rel=\"noreferrer noopener\">What is an Azure landing zone?<\/a>)<\/li>\n\n\n\n<li>Create and configure an Azure Key Vault&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/general\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">About Azure Key Vault<\/a>)<\/li>\n\n\n\n<li>Recommend when to use a dedicated Hardware Security Module (HSM)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/dedicated-hsm\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Dedicated HSM?<\/a>)<\/li>\n\n\n\n<li>Configure access to Key Vault, including vault access policies and Azure Role-Based Access Control&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/general\/rbac-guide?tabs=azure-cli\" target=\"_blank\" rel=\"noreferrer noopener\">Provide access to Key Vault keys, certificates, and secrets<\/a>)<\/li>\n\n\n\n<li>Manage certificates, secrets, and keys&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/general\/about-keys-secrets-certificates\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Key Vault keys, secrets and certificates overview<\/a>)<\/li>\n\n\n\n<li>Configure key rotation&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/keys\/how-to-configure-key-rotation\" target=\"_blank\" rel=\"noreferrer noopener\">Configure cryptographic key auto-rotation in Azure Key Vault<\/a>)<\/li>\n\n\n\n<li>Configure backup and recovery of certificates, secrets, and keys<\/li>\n<\/ul>\n\n\n\n<p>Manage security posture by using Microsoft Defender for Cloud<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/secure-score-security-controls\" target=\"_blank\" rel=\"noreferrer noopener\">Security posture for Microsoft Defender for Cloud<\/a>)<\/li>\n\n\n\n<li>Assess compliance against security frameworks and Microsoft Defender for Cloud&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/regulatory-compliance-dashboard\" target=\"_blank\" rel=\"noreferrer noopener\">Improve your regulatory compliance<\/a>)<\/li>\n\n\n\n<li>Add industry and regulatory standards to Microsoft Defender for Cloud<\/li>\n\n\n\n<li>Add custom initiatives to Microsoft Defender for Cloud&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/custom-security-policies?pivots=azure-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Create custom Azure security initiatives and policies<\/a>)<\/li>\n\n\n\n<li>Connect hybrid cloud and multi-cloud environments to Microsoft Defender for Cloud&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/defender-for-cloud-introduction\" target=\"_blank\" rel=\"noreferrer noopener\">What is Microsoft Defender for Cloud?<\/a>)<\/li>\n\n\n\n<li>Identify and monitor external assets by using Microsoft Defender External Attack Surface Management<\/li>\n<\/ul>\n\n\n\n<p>Configure and manage threat protection by using Microsoft Defender for Cloud<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS<\/li>\n\n\n\n<li>Configure Microsoft Defender for Servers&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/configure-server-endpoints?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Onboard Windows servers to the Microsoft Defender for Endpoint service<\/a>)<\/li>\n\n\n\n<li>Configure Microsoft Defender for Azure SQL Database&nbsp;<strong>(Microsoft Documentation:<\/strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-sql\/database\/azure-defender-for-sql?view=azuresql\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;Microsoft Defender for SQL<\/a>)<\/li>\n\n\n\n<li>Manage and respond to security alerts in Microsoft Defender for Cloud&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/managing-and-responding-alerts\" target=\"_blank\" rel=\"noreferrer noopener\">Manage and respond to security alerts in Microsoft Defender for Cloud<\/a>)<\/li>\n\n\n\n<li>Configure workflow automation by using Microsoft Defender for Cloud<\/li>\n\n\n\n<li>Evaluate vulnerability scans from Microsoft Defender for Server&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/deploy-vulnerability-assessment-vm\" target=\"_blank\" rel=\"noreferrer noopener\">Defender for Cloud\u2019s integrated Qualys vulnerability scanner for Azure and hybrid machines<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Configure and manage security monitoring and automation solutions<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitor security events by using Azure Monitor&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-monitor\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Monitor overview<\/a>)<\/li>\n\n\n\n<li>Configure data connectors in Microsoft Sentinel&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/connect-data-sources\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel data connectors<\/a>)<\/li>\n\n\n\n<li>Create and customize analytics rules in Microsoft Sentinel&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/detect-threats-custom\" target=\"_blank\" rel=\"noreferrer noopener\">Create custom analytics rules to detect threats<\/a>)<\/li>\n\n\n\n<li>Evaluate alerts and incidents in Microsoft Sentinel&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/investigate-cases\" target=\"_blank\" rel=\"noreferrer noopener\">Investigate incidents with Microsoft Sentinel<\/a>)<\/li>\n\n\n\n<li>Configure automation in Microsoft Sentinel<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Learning Resource 1: Microsoft Learning Platform<\/strong><\/h3>\n\n\n\n<p>Once you make up your mind to appear for the AZ-500 exam, the very next step should be a visit to the&nbsp;Microsoft official site. This official page provides trustworthy and updated information about the exam. A mandatory visit to the <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/certifications\/exams\/az-500\" target=\"_blank\" rel=\"noreferrer noopener\">official AZ-500 page<\/a> on the Microsoft website is the ideal place to start your AZ-500 exam preparation.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"951\" height=\"150\" src=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2020\/08\/Microsoft-Azure-Security-Technologies-1.png\" alt=\"Microsoft Azure Security Technologies AZ-500  Online Tutorials\" class=\"wp-image-7318\" srcset=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2020\/08\/Microsoft-Azure-Security-Technologies-1.png 951w, https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2020\/08\/Microsoft-Azure-Security-Technologies-1-300x47.png 300w\" sizes=\"(max-width: 951px) 100vw, 951px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Learning Source 2: Instructor-Led Training<\/strong><\/h3>\n\n\n\n<p>Instructor-led training is like an online class taught by experts or certified instructors. It&#8217;s a great option for busy folks because it&#8217;s very flexible. You can pick the times that work best for you. Plus, with this kind of training, you can focus on the areas where you&#8217;re not so strong, which makes it easier to pass the exam. The Training offered by microsoft for this course is <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/certifications\/courses\/az-500t00\" target=\"_blank\" rel=\"noreferrer noopener\">Course AZ-500T00-A: Microsoft Azure Security Technologies<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Learning Resource 3: AZ-500 Books<\/strong><\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img decoding=\"async\" width=\"188\" height=\"268\" src=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2020\/08\/image-1.jpeg\" alt=\"Buy Pro Azure Governance and Security: A Comprehensive Guide to ...\" class=\"wp-image-7315\" style=\"width:108px;height:154px\"\/><\/figure>\n<\/div>\n\n\n<p>Books are a crucial part of getting ready for certification. They&#8217;ve been around for a long time and are a really effective way to study for the exam. There are lots of AZ-500 books available, and using them can really boost your preparation. Here are some popular ones:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pro Azure Governance and Security by Peter De Tender<\/li>\n\n\n\n<li>Microsoft Azure Security Infrastructure by Yuri Diogenes<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Learning Resource 4: Online Forums<\/strong><\/h3>\n\n\n\n<p>The best additions to the test preparation method are online forums. Applicants frequently run through challenges and distractions while preparing. Online discussion boards and study groups seem to be the applicants&#8217; best hope at this specific time. You can meet like-minded people who are studying for the AZ-500 and other Azure certification tests by joining community centers. You can maintain your focus on the main goal by taking use of the additional assistance provided by the community.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Attempt Practice Test<\/strong><\/h3>\n\n\n\n<p>The next piece of advice for your study guide involves AZ-500 practice exams. By simulating an actual test, practice exams help students by enhancing their preparation. They offer prompt results and thorough performance reports, which enable candidates to identify their areas of strength and weakness across several fields. Also, take several practice exams to keep an eye on your preparedness. Your confidence will therefore increase, and you&#8217;ll be prepared for exams. <a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-free-practice-test\" target=\"_blank\" rel=\"noreferrer noopener\">Start Practising Now!<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-free-practice-test\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/Add-a-heading-2.png\" alt=\"AZ-500 Free Practice Test\" style=\"width:804px;height:99px\"\/><\/a><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Exam Tips:<\/strong><\/h3>\n\n\n\n<p>Here are some tips that could help you prepare and succeed in the Microsoft Azure AZ-500 exam:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Study the official Microsoft Azure Security Technologies (AZ-500) certification page and understand the exam objectives and format.<\/li>\n\n\n\n<li>Get hands-on experience with Azure and its security services. The more you practice, the better you will understand the concepts and scenarios.<\/li>\n\n\n\n<li>Use Microsoft\u2019s official study resources like the Azure Security Center, Azure documentation, and online courses.<\/li>\n\n\n\n<li>Join online forums and connect with other certified professionals to learn from their experiences and exchange study tips.<\/li>\n\n\n\n<li>Practice with sample exams and test your knowledge regularly.<\/li>\n\n\n\n<li>Keep yourself informed about the newest security threats and the best ways to do things in the field.<\/li>\n\n\n\n<li>Take notes and review them regularly to reinforce your understanding of the concepts.<\/li>\n\n\n\n<li>Plan your study schedule and stick to it. Make sure you allocate enough time for each topic.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Get ready to Practice and <a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-questions\" target=\"_blank\" rel=\"noreferrer noopener\">Prepare for Microsoft Azure Security Technologies AZ-500 Exam<\/a>Now!<\/strong><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Cyber threats are evolving faster than ever, and cloud platforms like Microsoft Azure are right at the center of the storm. If you are serious about building a career in cloud security, there\u2019s no better way to prove your expertise than by conquering the Microsoft Azure Security Technologies AZ-500 exam. The AZ-500 certification has become&#8230;<\/p>\n","protected":false},"author":1,"featured_media":7312,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[131],"tags":[1016,1018,1017,1015],"class_list":["post-7311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-azure","tag-microsoft-azure-az-500-exam-guide","tag-microsoft-azure-az-500-preparatory-resources","tag-microsoft-azure-az-500-study-guide","tag-microsoft-azure-security-technologies-study-guide"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Azure Security Technologies AZ-500 Study Guide - Updated 2025 - Blog<\/title>\n<meta name=\"description\" content=\"Validate your skills and advance your career by qualifying the Microsoft Azure Security Technologies AZ-500 exam | Study Guide\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Azure Security Technologies AZ-500 Study Guide - Updated 2025 - Blog\" \/>\n<meta property=\"og:description\" content=\"Validate your skills and advance your career by qualifying the Microsoft Azure Security Technologies AZ-500 exam | Study Guide\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-04T05:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T07:56:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2020\/08\/Tutorials-Preparatory-Guide-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TestPrepTraining\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TestPrepTraining\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/\",\"name\":\"Microsoft Azure Security Technologies AZ-500 Study Guide - Updated 2025 - Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#website\"},\"datePublished\":\"2025-09-04T05:30:00+00:00\",\"dateModified\":\"2025-09-04T07:56:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/b46daaf932dbfb07cbe7db807006780c\"},\"description\":\"Validate your skills and advance your career by qualifying the Microsoft Azure Security Technologies AZ-500 exam | Study Guide\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Azure Security Technologies AZ-500 Study Guide &#8211; Updated 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/blog\/\",\"name\":\"Learning Resources\",\"description\":\"Testprep Training Blogs\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/b46daaf932dbfb07cbe7db807006780c\",\"name\":\"TestPrepTraining\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4cd4f7acc79865d9ba457114e386c039833599aae3707598a92eda256c6a5278?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4cd4f7acc79865d9ba457114e386c039833599aae3707598a92eda256c6a5278?s=96&d=mm&r=g\",\"caption\":\"TestPrepTraining\"},\"description\":\"Testprep Training offers a wide range of practice exams and online courses for Professional certification exam curated by field experts and working professionals. Evaluate your skills and build confidence to appear for the exam.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Azure Security Technologies AZ-500 Study Guide - Updated 2025 - Blog","description":"Validate your skills and advance your career by qualifying the Microsoft Azure Security Technologies AZ-500 exam | Study Guide","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Azure Security Technologies AZ-500 Study Guide - Updated 2025 - Blog","og_description":"Validate your skills and advance your career by qualifying the Microsoft Azure Security Technologies AZ-500 exam | Study Guide","og_url":"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/","og_site_name":"Blog","article_published_time":"2025-09-04T05:30:00+00:00","article_modified_time":"2025-09-04T07:56:46+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2020\/08\/Tutorials-Preparatory-Guide-2.png","type":"image\/png"}],"author":"TestPrepTraining","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TestPrepTraining","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/","url":"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/","name":"Microsoft Azure Security Technologies AZ-500 Study Guide - Updated 2025 - Blog","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/blog\/#website"},"datePublished":"2025-09-04T05:30:00+00:00","dateModified":"2025-09-04T07:56:46+00:00","author":{"@id":"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/b46daaf932dbfb07cbe7db807006780c"},"description":"Validate your skills and advance your career by qualifying the Microsoft Azure Security Technologies AZ-500 exam | Study Guide","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/blog\/microsoft-azure-security-technologies-az-500-study-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Azure Security Technologies AZ-500 Study Guide &#8211; Updated 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/blog\/#website","url":"https:\/\/www.testpreptraining.ai\/blog\/","name":"Learning Resources","description":"Testprep Training Blogs","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/b46daaf932dbfb07cbe7db807006780c","name":"TestPrepTraining","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4cd4f7acc79865d9ba457114e386c039833599aae3707598a92eda256c6a5278?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4cd4f7acc79865d9ba457114e386c039833599aae3707598a92eda256c6a5278?s=96&d=mm&r=g","caption":"TestPrepTraining"},"description":"Testprep Training offers a wide range of practice exams and online courses for Professional certification exam curated by field experts and working professionals. Evaluate your skills and build confidence to appear for the exam."}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/posts\/7311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/comments?post=7311"}],"version-history":[{"count":20,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/posts\/7311\/revisions"}],"predecessor-version":[{"id":38081,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/posts\/7311\/revisions\/38081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/media\/7312"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/media?parent=7311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/categories?post=7311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/tags?post=7311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}