Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

AZ-500: Secure your data and applications

Microsoft via Microsoft Learn

Overview

  • Module 1: Protect your keys, certificates, and secrets in Azure Key Vault. Learn to configure key vault for the most secure deployment.
  • By the end of this module, you will be able to:

    • Define what a key vault is and how it protects certificates and secrets
    • Deploy and configure Azure Key Vault
    • Secure access and administration of your key vault
    • Store keys and secrets in your key vault
    • Explore key security considers like key rotation and backup / recovery
  • Module 2: Register your company applications then use Azure security features to configure and monitor secure access to the application.
  • By the end of this module, you will be able to:

    • Register an application in Azure using app registration
    • Select and configure which Azure AD users can access each application
    • Configure and deploy web app certificates
  • Module 3: Ensure your data is stored, transferred, and accessed in a secure way using Azure storage and file security features.
  • By the end of this module, you will be able to:

    • Define data sovereignty and how that is achieved in Azure
    • Configure Azure Storage access in a secure and managed way
    • Encrypt your data while it is at rest and in transit
    • Apply rules for data retention
  • Module 4: Configure and lock down your SQL database on Azure to protect your corporate data while it is stored.
  • By the end of this module, you will be able to:

    • Configure which users and applications have access to your SQL databases
    • Block access to your servers using firewalls
    • Discover, classify, and audit the use of your data
    • Encrypt and protect your data while is it stored in the database.

Syllabus

  • Module 1: Deploy and secure Azure Key Vault
    • Introduction
    • Explore Azure Key Vault
    • Configure Key Vault access
    • Review a secure Key Vault example
    • Deploy and manage Key Vault certificates
    • Create Key Vault keys
    • Manage customer managed keys
    • Enable Key Vault secrets
    • Configure key rotation
    • Manage Key Vault safety and recovery features
    • Perform Try-This exercises
    • Explore the Azure Hardware Security Module
    • Knowledge check
    • Summary
  • Module 2: Configure application security features
    • Introduction
    • Review the Microsoft identity platform
    • Explore Azure AD application scenarios
    • Register an application with App Registration
    • Configure Microsoft Graph permissions
    • Enable managed identities
    • Deploy web app certificates
    • Perform Try-This exercises
    • Knowledge check
    • Summary
  • Module 3: Implement storage security
    • Introduction
    • Define data sovereignty
    • Configure Azure storage access
    • Deploy shared access signatures
    • Manage Azure AD storage authentication
    • Implement storage service encryption
    • Configure blob data retention policies
    • Configure Azure files authentication​
    • Enable the secure transfer required​ property
    • Perform Try-This exercises
    • Knowledge check
    • Summary
  • Module 4: Configure and manage SQL database security
    • Introduction
    • Enable SQL database authentication
    • Configure SQL database firewalls
    • Enable and monitor database auditing
    • Implement data discovery and classification​
    • Explore vulnerability assessment​
    • Enable Defender for SQL (advanced threat protection)
    • Configure dynamic data masking
    • Implement transparent data encryption​
    • Deploy always encrypted​ features
    • Deploy an always encrypted implementation
    • Perform Try-This exercises
    • Knowledge check
    • Summary

Reviews

Start your review of AZ-500: Secure your data and applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.