AZ-500

Notes from AZ-500

Labs

Certification

Azure AD

Features

AD DS vs. Azure AD

Roles in Azure

Azure Domain Services

Users

AD Groups

Administrative Units

Passwordless

AD Connect

Auth Options

Pass Hash Sync

Pass-Through Auth

Federation with Azure AD

Identity Protection

Risk Events

Policies

User

Sign-In

Azure MFA

AD Conditional Access

Zero Trust Model

Azure AD Privileged Identity Management (PIM)

Module 2

Defense in Depth

Virtual Network

(D)DoS

Firewall

VPN

Defined Routes and Network Virtual Appliances

Hub & Spoke

Network Security Groups

Application Security Groups

Service Endpoints

Private Endpoint

Load Ballancer

Azure Application Gateway

WAF

Front Door

ExpressRoute

Endpoint Protection

Privileged Access Strategy

Virtual Machine Templates

Remote Access Management

Update Management

Disc Encryption

Defender for Endpoint

Securing Azure Workloads with Azure Security Benchmark

Defender for Cloud Recommendations

Containers

ACI Security

Azure Container Registry

ACR Auth

Azure Kubernetes Service

Terminology

Security Capabilities

Module 3

Key Vault

Features

Access

Example

Certificates

Customer Managed Keys

Secrets

Key and Secret Rotation

Safety a Recovery Features

Azure Dedicated HSM

Module 3

Key Vault

Features

Access

Example

Certificates

Custom Managed Keys

Secrets

Key & Secret Location

Safety and Recovery Features

Azure Dedicated HSM

Application Security

Scenarios

App Registration

Graph Permissions

Managed Identities

Web App Certificates

Database Security

Auth for SQL

SQL DB Firewalls

DB Auditing

Data Discovery & Classification

Defender for Cloud SQL

Vulnerability Assesment

Advanced Threat Protection

Dynamic Data Masking

Transparent Data Encryption

Always Encrypted

Storage Security

Shared Access Signatures

Storage Auth

Storage Service Encryption

Blob Data Policies

Files Auth

Secure Transfer

Module 4

Monitor Architecture

Metrics and Logs

Log Analytics

Connected Sources

Azure Monitor Alerts

Diagnostic

Defender

Cloud Policies

Recommendations

Security Score

Coverage

Brute Force Attack

Sentinel

Data Connections

Workbooks

Incidents

Playbooks

Hunting

Last updated