AZ-500 Exam Study Guide (Microsoft Azure Security Technologies)

AZ-500 Microsoft Azure Security Technologies Exam Certificate Study Guide-02

Preparing for the AZ-500 Microsoft Azure Security Technologies exam? Don’t know where to start? This post is the AZ-500 Certificate Study Guide (with links to each exam objective).

I have curated a list of articles from Microsoft documentation for each objective of the AZ-500 exam. Hope this article will be your AZ-500 Study Guide.

Also, please share the post within your circles so it helps them to prepare for the exam.

Exam Voucher for AZ-500 with 1 Retake

Get 40% OFF with the combo

AZ-500 Azure Security Technologies Course

AZ-500 Azure Security Tech. Practice Test

Other Materials Related to Azure Security

Looking for AZ-500 Security Dumps? Read This!

Using az-500 exam dumps can get you permanently banned from taking any future Microsoft certificate exam. Read the FAQ page for more information. However, I strongly suggest you validate your understanding with practice questions.

AZ-500 Sample Practice Exam Questions

Check out all the other Azure certificate study guides

Full Disclosure: Some of the links in this post are affiliate links. I receive a commission when you purchase through them.

Manage Identity and Access (30-35%)

Manage Azure Active Directory Identities

Configure Secure Access by Using Azure AD

Manage Application Access

Manage Access Control

Implement Platform Protection (15-20%)

Implement Advanced Network Security

Secure the connectivity of virtual networks (VPN authentication, Express Route

Azure network security overview

Create a Site-to-Site VPN connection in the Azure portal

Configure a VPN connection using native Azure certificate authentication

Concepts on ExpressRoute encryption

ExpressRoute encryption: IPsec over ExpressRoute for Virtual WAN

Configure Network Security Groups (NSGs) and Application Security Groups (ASGs)

Create, change, or delete a network security group

Create application security groups

Associate network interfaces to an ASG

Create and configure Azure Firewall

What is Azure Firewall?

Deploy and configure Azure Firewall

Configure Azure Front Door service as an Application Gateway

Create and configure Azure Front Door service as an application gateway

Load-balancing with Azure’s application delivery suite

Configure a Web Application Firewall (WAF) on Azure Application Gateway

Create an application gateway with a Web Application Firewall

Create an Azure WAF v2 on Application Gateway using an ARM template

FAQs for Azure Web Application Firewall on Application Gateway

Configure Azure Bastion

Create an Azure Bastion host using the portal

Configure a firewall on a storage account, Azure SQL, KeyVault, or App Service

Configure Azure Storage firewalls and virtual networks

Create a server-level firewall rule in Azure SQL Database

Configure Azure Key Vault firewalls and virtual networks

Configuring Azure Firewall with your App Service Environment

Implement Service Endpoints

Azure Virtual Network service endpoints

Restrict network access with service endpoints

Implement DDoS protection

Azure DDoS Protection Standard overview

Manage Azure DDoS Protection using the Azure portal

Configure Advanced Security for Compute

Configure endpoint protection

Microsoft Endpoint Protection for Azure

Supported endpoint protection solutions

Endpoint protection in Microsoft Azure

Configure and monitor system updates for VMs

Manage updates and patches for your VMs

How to deploy updates and review results?

Managing updates for your Azure VM

Configure authentication for Azure Container Registry

Authenticate with an Azure container registry

Use Azure managed identity to authenticate to Azure container registry

Authenticate with ACR from Azure Kubernetes Service

Configure security for different types of containers

Container security in Azure Security Center

Implement vulnerability management

Security Control: Vulnerability Management

Configure isolation for AKS

Compute isolation in Azure Kubernetes Service

Best practices for cluster isolation in Azure Kubernetes Service

Configure security for container registry

Azure Security Baseline for Azure Container Registry

Azure Container Registry image scanning by Security Center

Azure Container Registry updates for security and reliability

Implement Azure Disk Encryption

Azure Disk Encryption for Windows VMs

Azure Disk Encryption for Linux VMs

Azure Disk Encryption for Windows VMs FAQ

Configure authentication and security for Azure App Service

Authentication and authorization in Azure App Service

Configure your App Service app to use Azure AD login

Advanced usage of authentication in Azure App Service

Authenticate users end-to-end in Azure App Service

Configure SSL/TLS certs

Add a TLS/SSL certificate in Azure App Service

Configuring TLS for an application in Azure

Configure authentication for Azure Kubernetes Service

Access and identity options for Azure Kubernetes Service

Use managed identities in Azure Kubernetes Service

Best practices for authentication in Azure Kubernetes Service

Configure automatic updates

Update Management overview

Enable Update Management from an Azure VM

Azure Security AZ-500

Amazon link (affiliate)

Manage Security Operations (25-30%)

Monitor Security by Using Azure Monitor

Monitor Security by Using Azure Security Center

Evaluate vulnerability scans from Azure Security Center

Integrated vulnerability assessment solution for Azure virtual machines

Configure Just in Time VM access by using Azure Security Center

Understanding just-in-time (JIT) VM access

Azure Security Center – Just-in-Time Network Access

Secure your management ports with just-in-time access

Configure centralized policy management by using Azure Security Center

Working with security policies in the Security Center

Configure a security policy in Azure Policy using the REST API

Configure compliance policies and evaluate for compliance by using Azure Security Center

Working with security policies

Assess your regulatory compliance in Security Center

Monitor Security by Using Azure Sentinel

Configure Security Policies

Configure security settings by using Azure Policy

Working with security policies

Configure security settings by using Azure Blueprint

Configure your environment for a Blueprint Operator

Configure a playbook by using Azure Sentinel

Create & run a playbook to automate threat responses

Secure Data and Applications (20-25%)

Configure Security for Storage

Configure Security for Databases

Configure and Manage Key Vault

This brings us to the end of the AZ-500 Microsoft Azure Security Technologies Study Guide

What do you think? Let me know in the comments section if I have missed out on anything. Also, I love to hear from you about how your preparation is going on!

In case you are preparing for other Azure certification exams, check out the Azure study guide for those exams.

Follow/Like to Receive Updates

Want to be notified as soon as I post? Subscribe to RSS feed / leave your email address in the subscribe section. Share the article to your social networks with the below links so it can benefit others.

Share the Article in Your Social Media Networks

  • 19
  • 25
  • 36

You may also like