Microsoft Azure Security Technologies (MCA) Exam Syllabus

Azure Security Technologies PDF, AZ-500 Dumps, AZ-500 PDF, Azure Security Technologies VCE, AZ-500 Questions PDF, Microsoft AZ-500 VCE, Microsoft MCA Azure Security Engineer Dumps, Microsoft MCA Azure Security Engineer PDFUse this quick start guide to collect all the information about Microsoft Azure Security Technologies (AZ-500) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the AZ-500 Microsoft Azure Security Technologies exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Microsoft MCA Azure Security Engineer certification exam.

The Microsoft Azure Security Technologies certification is mainly targeted to those candidates who want to build their career in Microsoft Azure domain. The Microsoft Certified - Azure Security Engineer Associate exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Microsoft MCA Azure Security Engineer.

Microsoft Azure Security Technologies Exam Summary:

Exam Name Microsoft Certified - Azure Security Engineer Associate
Exam Code AZ-500
Exam Price $165 (USD)
Duration 120 mins
Number of Questions 40-60
Passing Score 700 / 1000
Books / Training AZ-500T00-A: Microsoft Azure Security Technologies
Schedule Exam Pearson VUE
Sample Questions Microsoft Azure Security Technologies Sample Questions
Practice Exam Microsoft AZ-500 Certification Practice Exam

Microsoft AZ-500 Exam Syllabus Topics:

Topic Details Weights
Manage identity and access - Manage Azure Active Directory identities
  • configure security for service principals
  • manage Azure AD directory groups
  • manage Azure AD users
  • manage administrative units
  • configure password writeback
  • configure authentication methods including password hash and Pass Through Authentication (PTA), OAuth, and passwordless
  • transfer Azure subscriptions between Azure AD tenants
- Configure secure access by using Azure AD
  • monitor privileged access for Azure AD Privileged Identity Management (PIM)
  • configure Access Reviews
  • activate and configure PIM
  • implement Conditional Access policies including Multi-Factor Authentication (MFA)
  • configure Azure AD identity protection

- Manage application access

  • create App Registration
  • configure App Registration permission scopes
  • manage App Registration permission consent
  • manage API access to Azure subscriptions and resources

- Manage access control

  • configure subscription and resource permissions
  • configure resource group permissions
  • configure custom RBAC roles
  • identify the appropriate role
    apply principle of least privilege
  • interpret permissions
    check access
Implement platform protection - Implement advanced network security
  • secure the connectivity of virtual networks (VPN authentication, Express Route encryption)
  • configure Network Security Groups (NSGs) and Application Security Groups (ASGs)
  • create and configure Azure Firewall
  • implement Azure Firewall Manager
  • configure Azure Front Door service as an Application Gateway
  • configure a Web Application Firewall (WAF) on Azure Application Gateway
  • configure Azure Bastion
  • configure a firewall on a storage account, Azure SQL, KeyVault, or App Service
  • implement Service Endpoints
  • implement DDoS protection
- Configure advanced security for compute
  • configure endpoint protection
  • configure and monitor system updates for VMs
  • configure authentication for Azure Container Registry
  • configure security for different types of container
    - implement vulnerability management
    - configure isolation for AKS
    - configure security for container registry
  • implement Azure Disk Encryption
  • configure authentication and security for Azure App Service
    - configure SSL/TLS certs
    - configure authentication for Azure Kubernetes Service
    - configure automatic updates
Manage security operations - Monitor security by using Azure Monitor
  • create and customize alerts
  • monitor security logs by using Azure Monitor
  • configure diagnostic logging and log retention

- Monitor security by using Azure Security Center

  • evaluate vulnerability scans from Azure Security Center
  • configure Just in Time VM access by using Azure Security Center
  • configure centralized policy management by using Azure Security Center
  • configure compliance policies and evaluate for compliance by using Azure Security Center
  • configure workflow automation by using Azure Security Center

- Monitor security by using Azure Sentinel

  • create and customize alerts
  • configure data sources to Azure Sentinel
  • evaluate results from Azure Sentinel
  • configure a playbook by using Azure Sentinel

- Configure security policies

  • configure security settings by using Azure Policy
  • configure security settings by using Azure Blueprint
Secure data and applications - Configure security for storage
  • configure access control for storage accounts
  • configure key management for storage accounts
  • configure Azure AD authentication for Azure Storage
  • configure Azure AD Domain Services authentication for Azure Files
  • create and manage Shared Access Signatures (SAS
    create a shared access policy for a blob or blob container
  • configure Storage Service Encryption
  • configure Azure Defender for Storage

- Configure security for databases

  • enable database authentication
  • enable database auditing
  • configure Azure Defender for SQL
    configure Azure SQL Database Advanced Threat Protection
  • implement database encryption
    implement Azure SQL Database Always Encrypted
- Configure and manage Key Vault
  • manage access to Key Vault
  • manage permissions to secrets, certificates, and keys
    configure RBAC usage in Azure Key Vault
  • manage certificates
  • manage secrets
  • configure key rotation
  • backup and restore of Key Vault items
  • configure Azure Defender for Key Vault

To ensure success in Microsoft MCA Azure Security Engineer certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Microsoft Azure Security Technologies (AZ-500) exam.

Rating: 5 / 5 (54 votes)