Microsoft Azure AZ-500

  • In-depth understanding of Azure fundamentals
  • Exposure to all aspects of Microsoft Azure
  • Interactive Q/A sessions
  • Certification based training
Watch Video

Train Your Team: Get Quote

Instructor

Program Highlights

The AZ-500 Microsoft Azure Security Technologies Training empowers IT professionals to secure Azure environments across identity, platform, data, and operations. Built on the official Microsoft curriculum, the program integrates custom hands-on labs and real-world scenarios to develop practical security expertise. Delivered by industry experts in highly interactive sessions, participants gain skills in Azure AD, key vaults, firewalls, containers, and Microsoft Sentinel, while also benefiting from career mentorship, post-training support, and access to recorded sessions

Official Microsoft Curriculum

Custom + Microsoft Hands-on Labs

Learn from Industry Experts

Career Guidance and Mentorshi

Ask for Demo

Course Certificate

Certificate Example

You'll receive an official certificate upon successful course completion.

Industry Recognized
About Course Course Curriculum Target Audience Pre-requisites Course Objectives Transformation Testimonials FAQ

About Course

The Azure Security Technologies (AZ-500) training by InfosecTrain will prepare professionals to protect and monitor Azure environments through four focused learning paths: Identity & Access, Platform Protection, Data & Application Security, and Security Operations. Learn to secure identities using Azure AD, PIM, and Conditional Access; defend networks and hosts with firewalls, NSGs, and endpoint protection; safeguard data with Key Vault and encryption; and manage threats using Azure Monitor, Defender for Cloud, and Sentinel. Delivered through live interactive sessions and hands-on labs, the course ensures real-world readiness and expert support.

Course Curriculum

Learning Path 1: Manage Identity and Access

 

  • Module 1 – Secure Azure Solution with Azure Active Directory
    • Configure Azure AD and Azure AD domain services for security
    • Create users and groups that enable secure usage of your tenant
    • Use MFA to protect users’ identities
    • Configure passwordless security options
  • Module 2 – Implement Hybrid Identity
    • Deploy Azure AD Connect
    • Pick and configure the best authentication option for your security needs
    • Configure password writeback
  • Module 3 – Deploy Azure AD Identity Protection
    • Deploy and configure identity protection
    • Configure MFA for users, groups, and applications
    • Create conditional access policies to ensure your security
    • Create and follow an access review process
  • Module 4 – Configure Azure AD Privileged Identity Management
    • Describe zero trust and how it impacts security
    • Configure and deploy roles using privileged identity management (PIM)
    • Evaluate the usefulness of each PIM setting as it relates to your security goals
  • Module 5 – Design an Enterprise Governance Strategy
    • Explain the shared responsibility model and how it impacts your security configuration
    • Create Azure policies to protect your solutions
    • Configure and deploy access to services using RBAC

Learning Path 2: Implement Platform Protection

  • Module 1 – Implement Perimeter Security
    • Define defense in depth
    • Protect your environment from denial-of-service attacks
    • Secure your solutions using firewalls and VPNs
    • Explore your end-to-end perimeter security configuration based on your security posture
  • Module 2 – Configure Network Security
    • Deploy and configure network security groups to protect your Azure solutions
    • Configure and lockdown service endpoints and private links
    • Secure your applications with application gateway, web app firewall, and front door
    • Configure ExpressRoute to help protect your network traffic
  • Module 3 – Configure and Manage Host Security
    • Configure and deploy endpoint protection
    • Deploy a privileged access strategy for devices and privileged workstations
    • Secure your virtual machines and access to them
    • Deploy Windows Defender
    • Practice layered security by reviewing and implementing security center and security benchmarks
  • Module 4 – Enable Containers Security
    • Define the available security tools for containers in Azure
    • Configure security settings for containers and Kubernetes services
    • Lock down network, storage, and identity resources connected to your containers
    • Deploy RBAC to control access to containers

Learning Path 3: Secure Your Data and Applications

  • Module 1 – Deploy and Secure Azure Key Vault
    • Define what a key vault is and how it protects certificates and secrets
    • Deploy and configure Azure Key Vault
    • Secure access and administration of your key vault
    • Store keys and secrets in your key vault
    • Explore key security considerations like key rotation and backup/recovery
  • Module 2 – Configure Application Security Features
    • Register an application in Azure using app registration
    • Select and configure which Azure AD users can access each application
    • Configure and deploy web app certificates
  • Module 3 – Implement Storage Security
    • Define data sovereignty and how that is achieved in Azure
    • Configure Azure Storage access in a secure and managed way
    • Encrypt your data while it is at rest and in transit
    • Apply rules for data retention
  • Module 4 – Configure and Manage SQL Database Security
    • Configure which users and applications have access to your SQL databases
    • Block access to your servers using firewalls
    • Discover, classify, and audit the use of your data
    • Encrypt and protect your data while it is stored in the database

Learning Path 4: Manage Security Operations

  • Module 1 – Configure and Manage Azure Monitor
    • Configure and monitor Azure Monitor
    • Define metrics and logs you want to track for your Azure applications
    • Connect data sources to and configure Log Analytics
    • Create and monitor alerts associated with your solution’s security
  • Module 2 – Enable and Manage Microsoft Defender for Cloud
    • Define the most common types of cyber-attacks
    • Configure Azure Security Center based on your security posture
    • Review Secure Score and raise it
    • Lock down your solutions using Security Center and Defender
    • Enable Just-in-Time access and other security features
  • Module 3 – Configure and Monitor Microsoft Sentinel
    • Explain what Azure Sentinel is and how it is used
    • Deploy Azure Sentinel
    • Connect data to Azure Sentinel, like Azure Logs, Azure AD, and others
    • Track incidents using workbooks, playbooks, and hunting techniques

Target Audience

This course is ideal for:

  • Azure Administrators
  • Azure Cloud Engineers
  • IT Professionals looking forward to becoming Azure Security Engineers
  • IT Professionals preparing for Microsoft AZ-500 exam

Pre-requisites

  • Basic understanding of networking
  • Basic understanding of Windows/Linus OS
  • Exposure to working with PowerShell Client on Windows or MacOS
  • Suggested to have knowledge of Microsoft Azure Administrator Associate
  • Understanding of basic IT security principles

Course Objectives

By the end of this training program, participants will be able to:

  • Manage identity and access through Azure AD and conditional policies
  • Configure security for Azure resources, workloads, and virtual networks
  • Protect applications and data using encryption, certificates, and Key Vault
  • Implement advanced security controls across hybrid and multi-cloud environments
  • Monitor threats with Azure Monitor, Defender, and Microsoft Sentinel integration
  • Automate security operations and integrate with DevOps processes and workflows
  • Confidently prepare for Microsoft AZ-500 Azure Security Technologies certification exam

Still unsure?

We're just a click away

Can't wait?

Get in touch now

+91 9372188252

Toll Free Number

Career Transformation

Secure Your Future in Cybersecurity

Join the next generation of security professionals with our industry-leading training programs

3.4 million+

Global Cybersecurity Talent Shortage

Unfilled positions projected by 2025 across all industries

$$4.55 Million

Average Data Breach Cost

Financial impact for organizations without proper security

Our Training Impact

65%+

Companies hiring our graduates

Industry Recognition

Our certified professionals are sought after by leading organizations

Investment in Security

Organizations prioritizing cybersecurity training

72%%

Increased training budgets

Industry Demand

Education

High demand for security professionals

Healthcare

High demand for security professionals

Retail

High demand for security professionals

Government

High demand for security professionals

Manufacturing

High demand for security professionals

Finance

High demand for security professionals

Reviews & Testimonials

Shishir Solanki

Shishir Solanki

"CISA training provided by Cybertech's was excellent—well-structured, expert-led, and packed with insights that greatly enhanced my audit and security..."

Prasad Dhuri

Prasad Dhuri

India.

"CyberTech’s CRTP training was outstanding—hands-on labs, expert instruction, and real-world skills that truly elevate your red teaming capabilities."

Sonali Sahare

Sonali Sahare

India

"CHFI training and certification were outstanding—expert guidance, practical labs, and in-depth content made learning digital forensics truly engaging!"

Kiran Sawant

Kiran Sawant

India

"CyberTech’s ISO 27001:2022 training and certification were exceptional—comprehensive content, expert trainers, and real-world insights into informatio..."

Konain Faroqui

Konain Faroqui

India

"CEH training was phenomenal—comprehensive content, skilled instructors, real-world labs, and up-to-date tools made ethical hacking both engaging and c..."

Arpana Jagtap

Arpana Jagtap

India

"CEH training and certification were outstanding—comprehensive curriculum, expert instructors, hands-on labs, and real-world scenarios made learning et..."

Shubham Maheshwari

Shubham Maheshwari

India

"CyberTech’s CPENT training and certification were exceptional—intense, hands-on, and expertly delivered. The real-world scenarios, advanced techniques..."

Priyanka Yadav

Priyanka Yadav

India

"CISSP training and certification were outstanding—comprehensive, well-structured, and led by expert instructors. The practical insights and detailed c..."

Frequently Asked Questions

AZ-500 exam is the Microsoft Azure Security Technologies certification exam. It is specifically designed to authorize professional abilities to implement platform protection, manage identity and access, secure data and applications, and manage security operations