{"id":5467,"date":"2020-06-04T04:41:21","date_gmt":"2020-06-04T04:41:21","guid":{"rendered":"https:\/\/www.testpreptraining.com\/tutorial\/?page_id=5467"},"modified":"2024-05-22T10:35:27","modified_gmt":"2024-05-22T10:35:27","slug":"exam-az-500-microsoft-azure-security-technologies","status":"publish","type":"page","link":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/","title":{"rendered":"Exam AZ-500: Microsoft Azure Security Technologies"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2021\/03\/az-500-2-750x400.png\" alt=\"Microsoft Azure Security Technologies (AZ-500)\" class=\"wp-image-35748\"\/><\/figure>\n<\/div>\n\n\n<p>The Microsoft Azure Security Technologies (AZ-500) exam assesses your technical skills in areas such as managing identity and access, establishing platform protection, managing security operations, and safeguarding data and applications. The Microsoft Azure Security Technologies (AZ-500) exam is meant to validate professional skills in implementing platform protection, managing identity and access, securing data and applications, and managing security operations for Microsoft Azure Security Engineers.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Who should take the exam?<\/strong><\/h4>\n\n\n\n<p>The target audience for the Microsoft Azure AZ-500 includes-<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Candidates who aspire to make their careers in the tech field. <\/li>\n\n\n\n<li>Candidates who want to learn about the fundamentals of Azure.<\/li>\n\n\n\n<li>Individuals with a background in sophisticated security.<\/li>\n\n\n\n<li>Candidates who have prior working experience with Microsoft Azure.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Learning Objectives<\/strong><\/h4>\n\n\n\n<p>In the world of cloud computing, Microsoft certification is a well-known player. This vendor provides important information about the many domains included in a certification exam. As a result, candidates are easily able to locate the required detailed information along with the subtopics included in each domain. The AZ-500 exam focuses on four key areas:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Manage identity and access&nbsp;<\/li>\n\n\n\n<li>Implement platform protection&nbsp;<\/li>\n\n\n\n<li>Manage security operations&nbsp;<\/li>\n\n\n\n<li>Secure data and applications<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to prepare for Microsoft Azure Security Technologies (AZ-500) ?\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/nB76VTXHPuw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Learning Path<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Azure AZ-500 exam teaches candidates how to manage identities, grant role-based access, and protect data in an Azure environment.<\/li>\n\n\n\n<li>Microsoft&#8217;s new role-based certification program includes the AZ-500 test.<\/li>\n\n\n\n<li>The Microsoft Certified: Azure Security Engineer Associate credential is awarded to candidates who pass the AZ-500 exam.<\/li>\n\n\n\n<li>This learning route is structured similarly to the AZ-500 exam, which examines your knowledge in four different subject areas.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"352\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/learning-path-750x352.jpg\" alt=\"\" class=\"wp-image-5468\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/learning-path-750x352.jpg 750w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/learning-path-scaled.jpg 1000w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Exam Format<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Microsoft Azure AZ-500 test consists of 40-60 questions that must be answered within 150 minutes.<\/li>\n\n\n\n<li>When it comes to the AZ-500 exam structure, there are several types of questions available, including case studies, short answers, multiple-choice, mark review, drag and drop, and so on.<\/li>\n\n\n\n<li>For AZ-500 exam passing score, Microsoft states that the candidate has to score a minimum of 700 or more points in order to pass the exam. <\/li>\n\n\n\n<li>Further, the AZ-500 certification cost is $165 USD. Also, the exam is available in 4 languages, namely English, Japanese, Chinese (Simplified), and Korean.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"684\" height=\"483\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/exam-detauils.jpg\" alt=\"Exam Format of AZ-500\" class=\"wp-image-5534\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/exam-detauils.jpg 684w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/exam-detauils-566x400.jpg 566w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>How to schedule the exam?<\/strong><\/h3>\n\n\n\n<p>The AZ-500 exam is built to measure your ability to accomplish the following technical tasks: manage identity and access; implement platform protection; manage security operations; and secure data and applications. However, the candidate can schedule their exam with the Pearson VUE. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies-interview-questions\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2021\/05\/FAQ-4-1.png\" alt=\"\" class=\"wp-image-41319\"\/><\/a><\/figure>\n<\/div>\n\n\n<h5 class=\"wp-block-heading has-text-align-center\"><strong><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies-interview-questions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Exam AZ-500: Microsoft Azure Security Technologies Interview Questions<\/a><\/strong><\/h5>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Exam Detailed Course Outline<\/strong><\/h3>\n\n\n\n<p>Below is the course outline for the AZ-500 certification exam that contains the topics with sections. The AZ-500 exam topics will help you have better exam preparation. This include:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Manage identity and access (25\u201330%)<\/strong><\/h4>\n\n\n\n<p>Manage Microsoft Entra identities<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure Microsoft Entra users<\/li>\n\n\n\n<li>Secure Microsoft Entra groups<\/li>\n\n\n\n<li>Recommend when to use external identities&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/external-identities\/external-identities-overview\" target=\"_blank\" rel=\"noreferrer noopener\">External Identities in Azure Active Directory<\/a>)<\/li>\n\n\n\n<li>Secure external identities<\/li>\n\n\n\n<li>Implement Microsoft Entra ID Protection<\/li>\n<\/ul>\n\n\n\n<p>Manage Microsoft Entra authentication<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementing multi-factor authentication (MFA)\u00a0<strong>(Microsoft Documentation:<\/strong>\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-mfa-howitworks\" target=\"_blank\" rel=\"noreferrer noopener\">Azure AD Multi-Factor Authentication<\/a>)<\/li>\n\n\n\n<li>Configure Microsoft Entra Verified ID<\/li>\n\n\n\n<li>Implement passwordless authentication&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/authentication\/howto-authentication-passwordless-phone\" target=\"_blank\" rel=\"noreferrer noopener\">Enable passwordless sign-in with Microsoft Authenticator<\/a>)<\/li>\n\n\n\n<li>Implement password protection&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-password-ban-bad-on-premises\" target=\"_blank\" rel=\"noreferrer noopener\">Enforce on-premises Azure AD Password Protection for Active Directory Domain Services<\/a>)<\/li>\n\n\n\n<li>Implementing single sign-on (SSO)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/what-is-single-sign-on\" target=\"_blank\" rel=\"noreferrer noopener\">What is single sign-on in Azure Active Directory?<\/a>)<\/li>\n\n\n\n<li>Integrate single sign on (SSO) and identity providers<\/li>\n\n\n\n<li>Recommend and enforce modern authentication protocols&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/block-legacy-authentication\" target=\"_blank\" rel=\"noreferrer noopener\">Block legacy authentication with Azure AD with Conditional Access<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Manage Microsoft Entra authorization<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure Azure role permissions for management groups, subscriptions, resource groups, and resources&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/governance\/management-groups\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What are Azure management groups<\/a>)<\/li>\n\n\n\n<li>Assign Microsoft Entra built-in roles<\/li>\n\n\n\n<li>Assign built-in roles in Azure<\/li>\n\n\n\n<li>Create and assign custom roles, including Azure roles and Microsoft Entra roles<\/li>\n\n\n\n<li>Implement and manage Microsoft Entra Permissions Management&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/cloud-infrastructure-entitlement-management\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What\u2019s Permissions Management?<\/a>)<\/li>\n\n\n\n<li>Configure Microsoft Entra Privileged Identity Management<\/li>\n\n\n\n<li>Configure role management and access reviews by using Microsoft Entra <strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/governance\/access-reviews-overview\" target=\"_blank\" rel=\"noreferrer noopener\">What are access reviews?<\/a>)<\/li>\n\n\n\n<li>Implement Conditional Access policies&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Conditional Access?<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Manage Microsoft Entra application access<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/grant-admin-consent?pivots=portal\" target=\"_blank\" rel=\"noreferrer noopener\">Grant tenant-wide admin consent to an application<\/a>)<\/li>\n\n\n\n<li>Manage Microsoft Entra app registrations<\/li>\n\n\n\n<li>Configure app registration permission scopes&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/develop\/permissions-consent-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Introduction to permissions and consent<\/a>)<\/li>\n\n\n\n<li>Managing app registration permission consent&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/configure-user-consent?pivots=portal\" target=\"_blank\" rel=\"noreferrer noopener\">Configure how users consent to applications<\/a>)<\/li>\n\n\n\n<li>Manage and use service principals&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/develop\/app-objects-and-service-principals\" target=\"_blank\" rel=\"noreferrer noopener\">Application and service principal objects in Azure Active Directory<\/a>)<\/li>\n\n\n\n<li>Manage managed identities for Azure resources&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/managed-identities-azure-resources\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What are managed identities for Azure resources?<\/a>)<\/li>\n\n\n\n<li>Recommend when to use and configure an Microsoft Entra Application Proxy, including authentication<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Secure networking (20\u201325%)<\/strong><\/h4>\n\n\n\n<p>Plan and Implement security for virtual networks<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-network\/application-security-groups\" target=\"_blank\" rel=\"noreferrer noopener\">Application security groups<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-network\/network-security-groups-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Network security groups<\/a>)<\/li>\n\n\n\n<li>Plan and implement user-defined routes (UDRs)<\/li>\n\n\n\n<li>Planning and implement VNET peering or VPN gateway&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-howto-vnet-vnet-resource-manager-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Configure a VNet-to-VNet VPN gateway connection by using the Azure portal<\/a>)<\/li>\n\n\n\n<li>Plan and implement Virtual WAN, including a secured virtual hub&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/firewall-manager\/secured-virtual-hub\" target=\"_blank\" rel=\"noreferrer noopener\">What is a secured virtual hub?<\/a>)<\/li>\n\n\n\n<li>Secure VPN connectivity, including point-to-site and site-to-site&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/vpn-gateway\/point-to-site-about\" target=\"_blank\" rel=\"noreferrer noopener\">About Point-to-Site VPN<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/vpn-gateway\/tutorial-site-to-site-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Create a site-to-site VPN connection<\/a>)<\/li>\n\n\n\n<li>Implement encryption over ExpressRoute&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/expressroute\/expressroute-about-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">ExpressRoute encryption<\/a>)<\/li>\n\n\n\n<li>Configure firewall settings on PaaS resources&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/common\/storage-network-security?tabs=azure-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Configure Azure Storage firewalls and virtual networks<\/a>)<\/li>\n\n\n\n<li>Monitor network security by using Network Watcher, including NSG flow logging&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/network-watcher-nsg-flow-logging-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Introduction to flow logs for network security groups<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/network-watcher-nsg-flow-logging-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Log network traffic to and from a virtual machine using the Azure portal<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Plan and implement security for private access to Azure resources<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan and implement virtual network Service Endpoints&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-network\/virtual-network-service-endpoints-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Virtual Network service endpoints<\/a>)<\/li>\n\n\n\n<li>Planning and implement Private Endpoints&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/private-link\/private-endpoint-overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is a private endpoint?<\/a>)<\/li>\n\n\n\n<li>Plan and implement Private Link services&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/private-link\/private-link-overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Private Link?<\/a>)<\/li>\n\n\n\n<li>Plan and implement network integration for Azure App Service and Azure Functions<\/li>\n\n\n\n<li>Plan and implement network security configurations for an App Service Environment (ASE)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/app-service\/environment\/network-info\" target=\"_blank\" rel=\"noreferrer noopener\">Networking considerations for App Service Environment<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/app-service\/environment\/networking\" target=\"_blank\" rel=\"noreferrer noopener\">App Service Environment networking<\/a>)<\/li>\n\n\n\n<li>Planning and implement network security configurations for an Azure SQL Managed Instance&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-sql\/database\/security-overview?view=azuresql\" target=\"_blank\" rel=\"noreferrer noopener\">Azure SQL Database and SQL Managed Instance security capabilities<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/infrastructure-sql\" target=\"_blank\" rel=\"noreferrer noopener\">Azure SQL Database security features<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Plan and implement security for public access to Azure resources<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/app-service\/configure-ssl-certificate?tabs=apex%2Cportal\" target=\"_blank\" rel=\"noreferrer noopener\">Add and manage TLS\/SSL certificates in Azure App Service<\/a>)<\/li>\n\n\n\n<li>Plan and implement, and manager an Azure Firewall including Azure Firewall Manager and firewall policies&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/firewall-manager\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Firewall Manager?<\/a>)<\/li>\n\n\n\n<li>Plan and implement an Azure Application Gateway&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/application-gateway\/configuration-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">Application Gateway infrastructure configuration<\/a>)<\/li>\n\n\n\n<li>Plan and implement an Azure Front Door, including Content Delivery Network (CDN)<\/li>\n\n\n\n<li>Plan and implement a Web Application Firewall (WAF)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/web-application-firewall\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Web Application Firewall?<\/a>)<\/li>\n\n\n\n<li>Recommend when to use Azure DDoS Protection Standard&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ddos-protection\/ddos-protection-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure DDoS Protection<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Secure compute, storage, and databases (20\u201325%)<\/strong><\/h4>\n\n\n\n<p>Plan and implement advanced security for compute<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan and implement remote access to public endpoints, including Azure Bastion and just-in-time (JIT) virtual machine (VM) access&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/bastion\/bastion-overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Bastion?<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/ready\/azure-best-practices\/plan-for-virtual-machine-remote-access\" target=\"_blank\" rel=\"noreferrer noopener\">Plan for virtual machine remote access<\/a>)<\/li>\n\n\n\n<li>Configure network isolation for Azure Kubernetes Service (AKS)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/aks\/concepts-network\" target=\"_blank\" rel=\"noreferrer noopener\">Network concepts for applications in Azure Kubernetes Service (AKS)<\/a>)<\/li>\n\n\n\n<li>Secure and monitor AKS&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/aks\/monitor-aks\" target=\"_blank\" rel=\"noreferrer noopener\">Monitoring Azure Kubernetes Service (AKS) with Azure Monitor<\/a>)<\/li>\n\n\n\n<li>Configuring authentication for AKS&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/aks\/concepts-identity\" target=\"_blank\" rel=\"noreferrer noopener\">Access and identity options for Azure Kubernetes Service (AKS)<\/a>)<\/li>\n\n\n\n<li>Configure security monitoring for Azure Container Instances (ACIs)<\/li>\n\n\n\n<li>Configure security monitoring for Azure Container Apps (ACAs)<\/li>\n\n\n\n<li>Manage access to Azure Container Registry (ACR)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/container-registry\/container-registry-roles?tabs=azure-cli\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Container Registry roles and permissions<\/a>)<\/li>\n\n\n\n<li>Configure disk encryption, including Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-machines\/disk-encryption-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Overview of managed disk encryption options<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-machines\/windows\/disk-encryption-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Disk Encryption for Windows VMs<\/a>)<\/li>\n\n\n\n<li>Recommend security configurations for Azure API Management&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/baselines\/api-management-security-baseline\" target=\"_blank\" rel=\"noreferrer noopener\">Azure security baseline for API Management<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Plan and implement security for storage<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure access control for storage accounts&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/common\/authorize-data-access\" target=\"_blank\" rel=\"noreferrer noopener\">Authorize access to data in Azure Storage<\/a>)<\/li>\n\n\n\n<li>Manage life cycle for storage account access keys&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/lifecycle-management-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Optimize costs by automatically managing the data lifecycle<\/a>)<\/li>\n\n\n\n<li>Selecting and configure an appropriate method for access to Azure Files&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/files\/storage-how-to-use-files-windows\" target=\"_blank\" rel=\"noreferrer noopener\">Mount SMB Azure file share on Windows<\/a>)<\/li>\n\n\n\n<li>Select and configure an appropriate method for access to Azure Blob Storage&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/authorize-access-azure-active-directory\" target=\"_blank\" rel=\"noreferrer noopener\">Authorize access to blobs using Azure Active Directory<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/authorize-data-operations-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Choose how to authorize access to blob data in the Azure portal<\/a>)<\/li>\n\n\n\n<li>Select and configure an appropriate method for access to Azure Tables&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/tables\/authorize-access-azure-active-directory\" target=\"_blank\" rel=\"noreferrer noopener\">Authorize access to tables using Azure Active Directory<\/a>)<\/li>\n\n\n\n<li>Selecting and configure an appropriate method for access to Azure Queues&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/queues\/storage-dotnet-how-to-use-queues?tabs=dotnet\" target=\"_blank\" rel=\"noreferrer noopener\">Get started with Azure Queue Storage using .NET<\/a>)<\/li>\n\n\n\n<li>Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/immutable-storage-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Store business-critical blob data with immutable storage<\/a>,&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/blobs\/data-protection-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Data protection overview<\/a>)<\/li>\n\n\n\n<li>Configure Bring your own key (BYOK)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/information-protection\/byok-price-restrictions\" target=\"_blank\" rel=\"noreferrer noopener\">Bring your own key (BYOK) details for Azure Information Protection<\/a>)<\/li>\n\n\n\n<li>Enable double encryption at the Azure Storage infrastructure level&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/storage\/common\/infrastructure-encryption-enable?tabs=portal\" target=\"_blank\" rel=\"noreferrer noopener\">Enable infrastructure encryption for double encryption of data<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Plan and implement security for Azure SQL Database and Azure SQL Managed Instance<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable Microsoft Entra database authentication<\/li>\n\n\n\n<li>Enable database auditing&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-sql\/database\/auditing-overview?view=azuresql\" target=\"_blank\" rel=\"noreferrer noopener\">Auditing for Azure SQL Database and Azure Synapse Analytics<\/a>)<\/li>\n\n\n\n<li>Identify use cases for the Microsoft Purview governance portal&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/purview\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What\u2019s available in the Microsoft Purview governance portal?<\/a>)<\/li>\n\n\n\n<li>Implement data classification of sensitive information by using the Microsoft Purview governance portal&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/purview\/concept-classification\" target=\"_blank\" rel=\"noreferrer noopener\">Data classification in the Microsoft Purview governance portal<\/a>)<\/li>\n\n\n\n<li>Plan and implement dynamic masking&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/relational-databases\/security\/dynamic-data-masking?view=sql-server-ver16\" target=\"_blank\" rel=\"noreferrer noopener\">Dynamic Data Masking<\/a>)<\/li>\n\n\n\n<li>Implement Transparent Database Encryption (TDE)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/transparent-data-encryption?view=sql-server-ver16\" target=\"_blank\" rel=\"noreferrer noopener\">Transparent data encryption (TDE)<\/a>)<\/li>\n\n\n\n<li>Recommend when to use Azure SQL Database Always Encrypted&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/always-encrypted-database-engine?view=sql-server-ver16\" target=\"_blank\" rel=\"noreferrer noopener\">Always Encrypted<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Manage security operations (25\u201330%)<\/strong><\/h4>\n\n\n\n<p>Plan, implement, and manage governance for security<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create, assign, and interpret security policies and initiatives in Azure Policy&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/governance\/policy\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Policy?<\/a>)<\/li>\n\n\n\n<li>Configure security settings by using Azure Blueprint&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/governance\/blueprints\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Blueprints?<\/a>)<\/li>\n\n\n\n<li>Deploy secure infrastructures by using a landing zone&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/ready\/landing-zone\/\" target=\"_blank\" rel=\"noreferrer noopener\">What is an Azure landing zone?<\/a>)<\/li>\n\n\n\n<li>Create and configure an Azure Key Vault&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/general\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">About Azure Key Vault<\/a>)<\/li>\n\n\n\n<li>Recommend when to use a dedicated Hardware Security Module (HSM)&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/dedicated-hsm\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">What is Azure Dedicated HSM?<\/a>)<\/li>\n\n\n\n<li>Configure access to Key Vault, including vault access policies and Azure Role-Based Access Control&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/general\/rbac-guide?tabs=azure-cli\" target=\"_blank\" rel=\"noreferrer noopener\">Provide access to Key Vault keys, certificates, and secrets<\/a>)<\/li>\n\n\n\n<li>Manage certificates, secrets, and keys&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/general\/about-keys-secrets-certificates\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Key Vault keys, secrets and certificates overview<\/a>)<\/li>\n\n\n\n<li>Configure key rotation&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/keys\/how-to-configure-key-rotation\" target=\"_blank\" rel=\"noreferrer noopener\">Configure cryptographic key auto-rotation in Azure Key Vault<\/a>)<\/li>\n\n\n\n<li>Configure backup and recovery of certificates, secrets, and keys<\/li>\n<\/ul>\n\n\n\n<p>Manage security posture by using Microsoft Defender for Cloud<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/secure-score-security-controls\" target=\"_blank\" rel=\"noreferrer noopener\">Security posture for Microsoft Defender for Cloud<\/a>)<\/li>\n\n\n\n<li>Assess compliance against security frameworks and Microsoft Defender for Cloud&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/regulatory-compliance-dashboard\" target=\"_blank\" rel=\"noreferrer noopener\">Improve your regulatory compliance<\/a>)<\/li>\n\n\n\n<li>Add industry and regulatory standards to Microsoft Defender for Cloud<\/li>\n\n\n\n<li>Add custom initiatives to Microsoft Defender for Cloud&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/custom-security-policies?pivots=azure-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Create custom Azure security initiatives and policies<\/a>)<\/li>\n\n\n\n<li>Connect hybrid cloud and multi-cloud environments to Microsoft Defender for Cloud&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/defender-for-cloud-introduction\" target=\"_blank\" rel=\"noreferrer noopener\">What is Microsoft Defender for Cloud?<\/a>)<\/li>\n\n\n\n<li>Identify and monitor external assets by using Microsoft Defender External Attack Surface Management<\/li>\n<\/ul>\n\n\n\n<p>Configure and manage threat protection by using Microsoft Defender for Cloud<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS<\/li>\n\n\n\n<li>Configure Microsoft Defender for Servers&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/configure-server-endpoints?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Onboard Windows servers to the Microsoft Defender for Endpoint service<\/a>)<\/li>\n\n\n\n<li>Configure Microsoft Defender for Azure SQL Database&nbsp;<strong>(Microsoft Documentation:<\/strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-sql\/database\/azure-defender-for-sql?view=azuresql\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;Microsoft Defender for SQL<\/a>)<\/li>\n\n\n\n<li>Manage and respond to security alerts in Microsoft Defender for Cloud&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/managing-and-responding-alerts\" target=\"_blank\" rel=\"noreferrer noopener\">Manage and respond to security alerts in Microsoft Defender for Cloud<\/a>)<\/li>\n\n\n\n<li>Configure workflow automation by using Microsoft Defender for Cloud<\/li>\n\n\n\n<li>Evaluate vulnerability scans from Microsoft Defender for Server&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/deploy-vulnerability-assessment-vm\" target=\"_blank\" rel=\"noreferrer noopener\">Defender for Cloud\u2019s integrated Qualys vulnerability scanner for Azure and hybrid machines<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Configure and manage security monitoring and automation solutions<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitor security events by using Azure Monitor&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-monitor\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Monitor overview<\/a>)<\/li>\n\n\n\n<li>Configure data connectors in Microsoft Sentinel&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/connect-data-sources\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel data connectors<\/a>)<\/li>\n\n\n\n<li>Create and customize analytics rules in Microsoft Sentinel&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/detect-threats-custom\" target=\"_blank\" rel=\"noreferrer noopener\">Create custom analytics rules to detect threats<\/a>)<\/li>\n\n\n\n<li>Evaluate alerts and incidents in Microsoft Sentinel&nbsp;<strong>(Microsoft Documentation:<\/strong>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/investigate-cases\" target=\"_blank\" rel=\"noreferrer noopener\">Investigate incidents with Microsoft Sentinel<\/a>)<\/li>\n\n\n\n<li>Configure automation in Microsoft Sentinel<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Exam Policies<\/strong><\/h3>\n\n\n\n<p>Microsoft upholds the responsibility to provide exam policies in order to make sure that the planning and management of&nbsp;the exams&nbsp;are conducted efficiently and in the best interest of aspirants. <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/certifications\/certification-exam-policies\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Certification exam policies<\/a> are a compendium of all the exam-related details along with the before and after exam procedures.  These exam policies are the inclusion of certain rules that need to be followed during exam time or at testing centers. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"315\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/faq-1.png\" alt=\"AZ-500 FAQs\" class=\"wp-image-5537\"\/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>For More Queries Visit : <a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-azure-az-500-exam-basic-faq\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure AZ-500 FAQs<\/a><\/strong><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Microsoft Azure Preparation Resources<\/strong><\/h3>\n\n\n\n<p>&nbsp;We will be providing the step by step AZ-500 exam study guide to get the most from your efforts in the exam preparation.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1587\" height=\"2245\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/Instructor-Led-Training-1.png\" alt=\"Preparatory Guide for AZ-500\" class=\"wp-image-5577\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/Instructor-Led-Training-1.png 1587w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/Instructor-Led-Training-1-283x400.png 283w\" sizes=\"auto, (max-width: 1587px) 100vw, 1587px\" \/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>Learning Resource 1: Microsoft Learning Platform<\/strong><\/h4>\n\n\n\n<p>When you&#8217;ve decided to take the AZ-500 exam, the next thing you should do is go to Microsoft&#8217;s official website. This official portal gives reliable and up-to-date exam information. On the official page, aspirants may find eligibility criteria, pricing information, exam objectives, and other important information. A mandatory visit to the Microsoft website&#8217;s official AZ-500 exam page is the best spot to begin your AZ-500 exam preparation.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Learning Source 2: Instructor Led Training<\/strong><\/h4>\n\n\n\n<p>Instructor-led training is an online learning and training session led by industry professionals or certified instructors. This training could not be more beneficial to individuals who just have a few minutes to spare in between their other responsibilities. These are completely self-contained classrooms where you can schedule sessions and learn at your own speed. Aspirants can use instructor-led instruction to improve their deficiencies and increase their chances of passing the exam.<\/p>\n\n\n\n<p><strong>Enroll in Microsoft Azure Security Technologies (AZ-500) Online Course and earn yourself a digital badge from Microsoft. <\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-practice-exam\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/Add-a-heading-2-1.png\" alt=\"AZ-500 Online Course\" class=\"wp-image-5551\"\/><\/a><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>Learning Resource 3: AZ-500 Books<\/strong><\/h4>\n\n\n\n<p>The most crucial component of certification preparation is books. They are the most traditional, yet most effective, methods of exam preparation. The market is inundated with AZ-500 books that will undoubtedly give you an advantage in your preparation. The following are some of the most popular Microsoft AZ-500 books:<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"59\" class=\"wp-image-5580\" style=\"width: 40px;\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/bkkk.png\" alt=\"\"> <strong>Pro Azure Governance and Security by Peter De Tender<\/strong><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"47\" class=\"wp-image-5581\" style=\"width: 40px;\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/bkkk-1.png\" alt=\"\"> <strong>Microsoft Azure Security Infrastructure by Yuri Diogenes<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Learning Resource 4: Online Forums<\/strong><\/h4>\n\n\n\n<p>Online forums are excellent supplements to the exam preparation process. During their preparation, candidates are frequently confronted with diversions and roadblocks. Candidates&#8217; ultimate salvation comes in the form of internet forums and study groups at this time. Joining community centers allows you to meet others who are studying for the AZ-500 and other azure certification examinations. The amount of support you receive from the community might help you keep focused on the end goal.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Learning Resource 5: Practice Test<\/strong><\/h4>\n\n\n\n<p>The final recommendation for your preparatory guide involves practice tests. Practice tests provide assistance to the candidates by providing the experience of a real examination. They provide quick results and detailed reports of the candidate\u2019s performance, which eventually helps the candidate to find out the areas of strengths and weaknesses in different domains. So, find the unique AZ-500 exam practice tests to have a good reason.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Get ready to Practice and Prepare for Microsoft Azure Security Technologies (AZ-500) Exam<\/strong><\/h4>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-free-practice-test\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/Add-a-heading-2.png\" alt=\"AZ-500 Free Practice Test\" class=\"wp-image-5550\"\/><\/a><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Microsoft Azure Security Technologies (AZ-500) Online Tutorial<\/strong><\/h3>\n\n\n\n<p>Testprep Training provides Online Tutorials to assist you during the preparation for Exam AZ-500: Microsoft Azure Security Technologies. These online tutorials are built to help you acquire the required knowledge of the domain areas and structure the learning path to support your preparation. The online tutorial covers the learning objectives including \u2013<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Manage identity and access<\/li>\n\n\n\n<li>Implement platform protection<\/li>\n\n\n\n<li>Manage security operations<\/li>\n\n\n\n<li>Secure data and applications<\/li>\n<\/ul>\n\n\n\n<p>However, for the AZ-500 exam, a candidate should have skills in implementing security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure. So, let\u2019s get into the details for achieving the required skills and knowledge.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/AZ-500-1.png\" alt=\"AZ-500 online course\" class=\"wp-image-16079\"\/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 1: Manage Identity and Access <\/strong><\/h4>\n\n\n\n<p>1.1 <em>Configure Azure Active Directory for workloads<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/app-registration-with-microsoft-identity-platform\/\" target=\"_blank\" rel=\"noreferrer noopener\">App Registration with Microsoft Identity Platform<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-app-registration-permission-and-scopes\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring App Registration Permission and Scopes <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-app-registration-permission-consent\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing App Registration Permission Consent <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-azure-multi-factor-authentication-settings\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Azure Multi-Factor Authentication settings<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-group-using-azure-ad\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing groups using Azure AD<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-user-using-azure-ad\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing user using Azure AD <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/installing-azure-ad-connect\/\" target=\"_blank\" rel=\"noreferrer noopener\">Installing Azure AD Connect <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-authentication-methods\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring authentication methods <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/building-a-conditional-access-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Building a Conditional Access policies<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-and-enabling-risk-policies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configure and Enabling Risk policies<\/a><\/li>\n<\/ul>\n\n\n\n<p>1.2 <em>Configure Azure AD Privileged<\/em> <em>Identity Management<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/monitoring-privileged-identity-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monitoring Privileged Identity Management<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-access-reviews-in-azure-ad\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Access Reviews in Azure AD<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/using-privileged-identity-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Using Privileged Identity Management<\/a><\/li>\n<\/ul>\n\n\n\n<p>1.3 <em>Configure Azure tenant security<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/adding-azure-subscription-to-azure-ad-tenant\/\" target=\"_blank\" rel=\"noreferrer noopener\">Adding Azure subscription to Azure AD Tenant<\/a><\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 2: Implement platform protection<\/strong><\/h4>\n\n\n\n<p>2.1 <em>Implement network security<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configure-virtual-networks-connectivity-using-azure-portal\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configure Virtual Networks connectivity using Azure Portal<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configure-network-security-groups-nsgs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configure Network Security Groups (NSGs) <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/deploying-and-configuring-azure-firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">Deploying and configuring Azure Firewall <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/creating-and-configuring-azure-front-door-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Creating and configuring Azure Front Door service<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/creating-and-configuring-application-security-groups\/\" target=\"_blank\" rel=\"noreferrer noopener\">Creating and configuring application security groups<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configure-azure-storage-firewalls-and-virtual-networks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configure Azure Storage Firewalls and Virtual Networks<\/a><\/li>\n<\/ul>\n\n\n\n<p>2.2 <em>Implement host security<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/endpoint-protection-solutions-with-virtual-machines-vms\/\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoint Protection Solutions with Virtual Machines VMs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/security-best-practices-for-vms\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security best practices for VMs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-updates-and-patches-for-vms-in-azure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing updates and patches for VMs in Azure<\/a><\/li>\n<\/ul>\n\n\n\n<p>2.3 <em>Configure container security<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/enabling-containers-for-using-azure-virtual-network-capabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enabling containers for using Azure Virtual Network Capabilities<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/authenticating-using-azure-container-registry\/\" target=\"_blank\" rel=\"noreferrer noopener\">Authenticating using Azure Container Registry<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/security-concepts-in-azure-kubernetes-service-aks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security concepts in Azure Kubernetes Service (AKS)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/creating-a-private-container-registry-using-azure-powershell\/\" target=\"_blank\" rel=\"noreferrer noopener\">Creating a private container registry using Azure PowerShell<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/vulnerability-assessments-for-azure-virtual-machines\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vulnerability Assessments for Azure Virtual Machines<\/a><\/li>\n<\/ul>\n\n\n\n<p>2.4 <em>Implement Azure Resource management security<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/creating-azure-resource-locks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Creating Azure Resource Locks<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-azure-policies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Azure policies<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/enabling-custom-rbac-roles-using-azure-powershell\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enabling custom RBAC roles using Azure PowerShell<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-subscription-and-resource-permissions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Subscription and Resource Permissions<\/a><\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-practice-exam\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"961\" height=\"150\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/AZ-500-online-course-3.png\" alt=\"Az-500 online course\" class=\"wp-image-16086\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/AZ-500-online-course-3.png 961w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/AZ-500-online-course-3-750x117.png 750w\" sizes=\"auto, (max-width: 961px) 100vw, 961px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 3: Manage Security Operations<\/strong><\/h4>\n\n\n\n<p>3.1 <em>Configure security services<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-azure-monitor\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Azure Monitor<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-diagnostic-logging-and-data-retention\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Diagnostic logging and Data retention<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-vulnerability-scanning\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Vulnerability scanning<\/a><\/li>\n<\/ul>\n\n\n\n<p>3.2 <em>Configure security policies<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-security-policies-using-azure-security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Security Policies using Azure Security Center<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-just-in-time-jit-vm-access-by-using-azure-security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Just in Time (JIT) VM access by using Azure Security Center<\/a><\/li>\n<\/ul>\n\n\n\n<p>3.3 <em>Manage security alerts<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/responding-and-managing-security-alerts-in-azure-security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responding and Managing Security alerts in Azure Security Center<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/workflow-automation-in-azure-security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Workflow automation in Azure Security Center<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/investigating-security-incidents\/\" target=\"_blank\" rel=\"noreferrer noopener\">Investigating Security Incidents<\/a><\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 4: Secure data and applications <\/strong><\/h4>\n\n\n\n<p><em>4.1 Configure security for storage<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-access-control-for-storage-accounts-using-azure-ad\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Access Control for Storage accounts using Azure AD<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-key-management-for-storage-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing Key Management for Storage accounts<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-azure-ad-authentication-for-azure-storage-using-azure-portal\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Azure AD authentication for Azure Storage using Azure Portal<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/enabling-azure-ad-domain-services-authentication-on-azure-files\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enabling Azure AD Domain Services Authentication on Azure Files<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-shared-access-signatures-sas\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing Shared Access Signatures (SAS)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-azure-storage-encryption-for-data-at-rest\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Azure Storage Encryption for Data at rest<\/a><\/li>\n<\/ul>\n\n\n\n<p><em>4.2 Configure security for databases<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/using-azure-active-directory-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">Using Azure Active Directory Authentication<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/auditing-for-azure-sql-database\/\" target=\"_blank\" rel=\"noreferrer noopener\">Auditing for Azure SQL Database<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-advanced-threat-protection-for-azure-sql-database\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Advanced Threat Protection for Azure SQL Database<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/transparent-data-encryption-for-sql-database\/\" target=\"_blank\" rel=\"noreferrer noopener\">Transparent Data Encryption for SQL Database<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-always-encrypted-by-using-azure-key-vault\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Always Encrypted by using Azure Key Vault<\/a><\/li>\n<\/ul>\n\n\n\n<p><em>4.3 Configure and manage Key Vault<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-azure-key-vault-security-access\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing Azure Key Vault Security Access<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/understanding-keys-secrets-and-certificates\/\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Keys, Secrets and Certificates<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-rbac-usage-in-azure-key-vault\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring RBAC usage in Azure Key Vault<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-certificates-through-azure-key-vault\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing Certificates through Azure Key Vault<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/managing-secrets\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing secrets<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/configuring-key-rotation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Key rotation<\/a><\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-security-technologies-az-500-practice-exam\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"961\" height=\"150\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/AZ-500-online-course-2.png\" alt=\"az500 online course\" class=\"wp-image-16082\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/AZ-500-online-course-2.png 961w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/AZ-500-online-course-2-750x117.png 750w\" sizes=\"auto, (max-width: 961px) 100vw, 961px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft Azure Security Technologies (AZ-500) exam assesses your technical skills in areas such as managing identity and access, establishing platform protection, managing security operations, and safeguarding data and applications. The Microsoft Azure Security Technologies (AZ-500) exam is meant to validate professional skills in implementing platform protection, managing identity and access, securing data and applications,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":5545,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[5717,174,5728],"tags":[766,767,768,4,765],"class_list":["post-5467","page","type-page","status-publish","has-post-thumbnail","hentry","category-cloud-computing","category-microsoft-azure","category-security","tag-az-500-exam","tag-az-500-exam-study-guide","tag-az-500-exam-tutorials","tag-m4f","tag-microsoft-azure-security-technologies-az-500"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Exam AZ-500: Microsoft Azure Security Technologies<\/title>\n<meta name=\"description\" content=\"Get ready to boost your learning and prepare to pass Microsoft Security technologies Exam . Practice and Prepare for AZ-500 Exam Now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exam AZ-500: Microsoft Azure Security Technologies\" \/>\n<meta property=\"og:description\" content=\"Get ready to boost your learning and prepare to pass Microsoft Security technologies Exam . Practice and Prepare for AZ-500 Exam Now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"Testprep Training Tutorials\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-22T10:35:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/featured-image-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/\",\"name\":\"Exam AZ-500: Microsoft Azure Security Technologies\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\"},\"datePublished\":\"2020-06-04T04:41:21+00:00\",\"dateModified\":\"2024-05-22T10:35:27+00:00\",\"description\":\"Get ready to boost your learning and prepare to pass Microsoft Security technologies Exam . Practice and Prepare for AZ-500 Exam Now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exam AZ-500: Microsoft Azure Security Technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"name\":\"Testprep Training Tutorials\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\",\"name\":\"Testprep Training\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"contentUrl\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"width\":583,\"height\":153,\"caption\":\"Testprep Training\"},\"image\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exam AZ-500: Microsoft Azure Security Technologies","description":"Get ready to boost your learning and prepare to pass Microsoft Security technologies Exam . Practice and Prepare for AZ-500 Exam Now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/","og_locale":"en_US","og_type":"article","og_title":"Exam AZ-500: Microsoft Azure Security Technologies","og_description":"Get ready to boost your learning and prepare to pass Microsoft Security technologies Exam . Practice and Prepare for AZ-500 Exam Now!","og_url":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/","og_site_name":"Testprep Training Tutorials","article_modified_time":"2024-05-22T10:35:27+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/featured-image-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/","url":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/","name":"Exam AZ-500: Microsoft Azure Security Technologies","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website"},"datePublished":"2020-06-04T04:41:21+00:00","dateModified":"2024-05-22T10:35:27+00:00","description":"Get ready to boost your learning and prepare to pass Microsoft Security technologies Exam . Practice and Prepare for AZ-500 Exam Now!","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-500-microsoft-azure-security-technologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/tutorial\/"},{"@type":"ListItem","position":2,"name":"Exam AZ-500: Microsoft Azure Security Technologies"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","name":"Testprep Training Tutorials","description":"","publisher":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization","name":"Testprep Training","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/","url":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","contentUrl":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","width":583,"height":153,"caption":"Testprep Training"},"image":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/5467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/comments?post=5467"}],"version-history":[{"count":79,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/5467\/revisions"}],"predecessor-version":[{"id":62791,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/5467\/revisions\/62791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media\/5545"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media?parent=5467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/categories?post=5467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/tags?post=5467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}