Exam Ref AZ-500 Microsoft Azure Security Technologies, 3rd Edition
- Length: 400 pages
- Edition: 3
- Language: English
- Publisher: Microsoft Press
- Publication Date: 2025-01-08
- ISBN-10: 0135364892
- ISBN-13: 9780135364895
Prepare for Microsoft Exam AZ-500 and demonstrate your real-world knowledge of Microsoft Azure security, including the skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level.
Focus on the expertise measured by these objectives:
- Manage identity and access
- Secure networking
- Secure compute, storage, and databases
- Manage security operations
This Microsoft Exam Ref:
- Organizes its coverage by exam objectives
- Features strategic, what-if scenarios to challenge you
- Assumes you have experience in administration of Microsoft Azure and hybrid environments, and familiarity with compute, network, and storage in Azure and Microsoft Entra ID
About the Exam
Exam AZ-500 focuses on knowledge needed to manage Microsoft Entra identities, authentication, authorization, and application access; plan and implement security for virtual networks, as well as for private and public access to Azure resources; plan and implement advanced security for compute, storage, Azure SQL Database, and Azure SQL managed instance; plan, implement, and manage governance for security, manage security posture and configure and manage threat protection using Microsoft Defender for Cloud, and configure and manage security monitoring and automation solutions.
About Microsoft Certification
Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of managing an organization’s security posture, identifying, and remediating vulnerabilities, performing threat modeling, implementing threat protection, responding to security incident escalations, and participating in the planning and implementation of cloud-based management and security.