Microsoft Azure Security Engineer AZ-500
Implement Azure security controls, manage identity and access, protect platforms and data, and respond to security threats. The core certification for cloud security engineers and SOC teams working on Azure.
✓ Exam-Focused Training | ✓ Hands-on Security Labs | ✓ Interview Prep Included
Program Overview
- Full AZ-500 exam objective coverage
- Identity and access management with Azure AD
- Platform protection — network, compute, container security
- Security operations — Sentinel, Defender, SIEM
- Data and application security in Azure
- Hands-on security labs and real attack/defend scenarios
Who Should Attend
Cloud security engineers, SOC analysts, Azure administrators expanding into security, DevSecOps engineers, and anyone targeting the AZ-500 certification or preparing for SC-100 Cybersecurity Architect.
Prerequisites
AZ-104 (Azure Administrator) knowledge strongly recommended. Familiarity with networking, identity concepts, and basic security principles. SC-900 or AZ-900 as a foundation is helpful.
What You Get
Course materials, hands-on Azure security lab access, practice exams, study guides, instructor support, mock interviews, and a clear path to SC-100 Cybersecurity Architect or SC-200 Security Operations Analyst.
Course Curriculum
Comprehensive training covering all four AZ-500 exam domains with hands-on Azure security labs and real-world threat scenarios.
Module 1: Manage Identity and Access (25–30%)
Secure identities using Azure Active Directory, Privileged Identity Management, and Conditional Access policies.
Azure Active Directory (Entra ID)
- Configure Azure AD users, groups, and external identities
- Implement Azure AD Connect and hybrid identity
- Manage Managed Identities for Azure resources
- Configure Azure AD application registrations
Privileged Identity Management (PIM)
- Configure and activate PIM for Azure AD roles
- Implement just-in-time (JIT) privileged access
- Configure access reviews for roles
- Monitor privileged role assignments
Conditional Access and MFA
- Create and manage Conditional Access policies
- Configure Multi-Factor Authentication (MFA)
- Implement Identity Protection risk policies
- Configure Azure AD Password Protection
Module 2: Implement Platform Protection (35–40%)
Secure Azure network perimeter, compute workloads, containers, and the Azure Key Vault.
Network Security
- Configure Network Security Groups (NSG) and ASGs
- Deploy and configure Azure Firewall and Firewall Policy
- Implement Azure DDoS Protection Standard
- Configure Web Application Firewall (WAF) on App Gateway
Compute and Container Security
- Configure VM endpoint protection and disk encryption
- Enable Microsoft Defender for Servers
- Secure Azure Kubernetes Service (AKS) clusters
- Implement container registry security policies
Key Vault and Secrets Management
- Create and configure Azure Key Vault
- Manage keys, secrets, and certificates
- Configure Key Vault access policies and RBAC
- Implement Key Vault managed HSM
Module 3: Manage Security Operations (25–30%)
Monitor, investigate, and respond to threats using Microsoft Sentinel, Defender, and Azure Monitor.
Microsoft Sentinel (SIEM)
- Configure Microsoft Sentinel workspace and connectors
- Create analytics rules and incident detection
- Perform threat hunting with KQL queries
- Configure automation rules and playbooks
Microsoft Defender for Cloud
- Enable and configure Defender for Cloud plans
- Interpret secure score and recommendations
- Configure security policies and compliance
- Manage alerts and threat intelligence
Monitoring and Incident Response
- Configure Azure Monitor diagnostic logs and alerts
- Analyze security logs in Log Analytics
- Investigate security incidents and alerts
- Configure audit logging for Azure resources
Module 4: Secure Data and Applications (5–10%)
Protect Azure storage, databases, and application configurations using encryption and security policies.
Storage and Database Security
- Configure Azure Storage encryption and access policies
- Enable Advanced Threat Protection for SQL
- Implement Transparent Data Encryption (TDE)
- Configure SQL auditing and vulnerability assessments
Application Security
- Configure App Service security and authentication
- Implement OAuth 2.0 and OpenID Connect
- Use Managed Identities for app-to-service auth
- Configure API Management security policies
Career Path After AZ-500
- SC-100 — Microsoft Cybersecurity Architect Expert
- SC-200 — Security Operations Analyst Associate
- SC-300 — Identity and Access Administrator
- AZ-305 — Azure Solutions Architect Expert
Need Batch Dates or Corporate Proposal?
Get trainer availability, pricing, and delivery model based on your timeline.
Request Consultation