Microsoft Azure Security Technologies (AZ-500)

Microsoft Azure Security Technologies (AZ-500)

About Education

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization's security posture, and detect and address security vulnerabilities. The course covers identity and access security, platform protection, data and application security, and security operations.

Prerequisites

  • There are no specific requirements listed above, but basic Azure and security knowledge may be helpful.

Duration of Training

  • Face-to-face training: 4 days of hands-on laboratory work
  • Virtual education: 4 days of hands-on lab work in web-based classes

Who Should Participate?

This course is designed for Azure Security Engineers to prepare for the relevant certification exam or to perform security tasks in their daily work. It is suitable for engineers who want to specialize in providing security for Azure-based digital platforms and play a key role in protecting an organization's data.

Educational Content

AZ-500: Managing Identity and Access

  • Managing identities in Microsoft Entra ID
  • Managing authentication with Microsoft Entra ID
  • Managing authorization with Microsoft Entra ID
  • Managing app access in Microsoft Entra ID

AZ-500: Securing the Network

  • Planning and implementing security for virtual networks
  • Planning and implementing security for private access to Azure resources
  • Planning and implementing security for public access to Azure resources

AZ-500: Securing Computing, Storage and Databases

  • Planning and implementing advanced security for computing
  • Planning and implementing security for storage
  • Planning and implementing security for Azure SQL Database and Azure SQL Managed Instance

AZ-500: Managing Security Operations

  • Planning, implementing and managing management for security
  • Managing security posture with Microsoft Defender for Cloud
  • Configure and manage threat protection with Microsoft Defender for Cloud
  • Configure and manage security monitoring and automation solutions

What You Will Gain at the End of the Training Participants will gain knowledge on the following topics:

  • AZ-500: Managing Identity and Access
  • AZ-500: Securing the Network
  • AZ-500: Securing Computing, Storage and Databases
  • AZ-500: Managing Security Operations
Trainings

View more trainings

Contact Us

Write Your Requirements and We Will Contact You

We are happy to answer your questions and help you determine which of our services best suits your needs.

Advantages
Then what happens?
1

We will schedule a call at your convenience

2

We are having an exploratory and advisory meeting

3

We are preparing an offer

Consult Us