<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.de/css/xml-course.xsl"?><course productid="22751" language="en" source="https://portal.flane.de/ibb/en/xml-course/microsoft-az-500t00" lastchanged="2026-04-01T14:39:19+02:00" parent="https://portal.flane.de/ibb/en/xml-courses"><title>Secure cloud resources with Microsoft security technologies</title><productcode>AZ-500T00</productcode><vendorcode>MS</vendorcode><vendorname>Microsoft</vendorname><fullproductcode>MS-AZ-500T00</fullproductcode><version>A</version><objective>&lt;ul&gt;
&lt;li&gt;Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.&lt;/li&gt;&lt;li&gt;Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.&lt;/li&gt;&lt;li&gt;Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.&lt;/li&gt;&lt;li&gt;Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.&lt;/li&gt;&lt;li&gt;Implement Azure AD Connect including authentication methods and on-premises directory synchronization.&lt;/li&gt;&lt;li&gt;Implement perimeter security strategies including Azure Firewall.&lt;/li&gt;&lt;li&gt;Implement network security strategies including Network Security Groups and Application Security Groups.&lt;/li&gt;&lt;li&gt;Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.&lt;/li&gt;&lt;li&gt;Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.&lt;/li&gt;&lt;li&gt;Implement Azure Key Vault including certificates, keys, and secretes.&lt;/li&gt;&lt;li&gt;Implement application security strategies including app registration, managed identities, and service endpoints.&lt;/li&gt;&lt;li&gt;Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.&lt;/li&gt;&lt;li&gt;Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.&lt;/li&gt;&lt;li&gt;Implement Azure Monitor including connected sources, log analytics, and alerts.&lt;/li&gt;&lt;li&gt;Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.&lt;/li&gt;&lt;li&gt;Implement Azure Sentinel including workbooks, incidents, and playbooks.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Successful learners will have prior knowledge and understanding of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.&lt;/li&gt;&lt;li&gt;Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.&lt;/li&gt;&lt;li&gt;Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.&lt;/li&gt;&lt;li&gt;Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Prior attendance of the course &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/ibb/en/course/microsoft-az-104t00&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Microsoft Azure Administrator &lt;span class=&quot;fl-prod-pcode&quot;&gt;(AZ-104T00)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; is recommended.&lt;/p&gt;</essentials><audience>&lt;p&gt;This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization&amp;#039;s data.&lt;/p&gt;</audience><contents>&lt;h5&gt;Module 1: Manage Identity and Access&lt;/h5&gt;&lt;p&gt;This module covers Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Azure Active Directory&lt;/li&gt;&lt;li&gt;Azure Identity Protection&lt;/li&gt;&lt;li&gt;Enterprise Governance&lt;/li&gt;&lt;li&gt;Azure AD Privileged Identity Management&lt;/li&gt;&lt;li&gt;Hybrid Identity&lt;/li&gt;&lt;li&gt;Lab: Role-Based Access Control&lt;/li&gt;&lt;li&gt;Lab: Azure Policy&lt;/li&gt;&lt;li&gt;Lab: Resource Manager Locks&lt;/li&gt;&lt;li&gt;Lab: MFA, Conditional Access and AAD Identity Protection&lt;/li&gt;&lt;li&gt;Lab: Azure AD Privileged Identity Management&lt;/li&gt;&lt;li&gt;Lab: Implement Directory Synchronization&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.&lt;/li&gt;&lt;li&gt;Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.&lt;/li&gt;&lt;li&gt;Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.&lt;/li&gt;&lt;li&gt;Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.&lt;/li&gt;&lt;li&gt;Implement Azure AD Connect including authentication methods and on-premises directory synchronization.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 2: Implement Platform Protection&lt;/h5&gt;&lt;p&gt;This module covers perimeter, network, host, and container security.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Perimeter Security&lt;/li&gt;&lt;li&gt;Network Security&lt;/li&gt;&lt;li&gt;Host Security&lt;/li&gt;&lt;li&gt;Container Security&lt;/li&gt;&lt;li&gt;Lab: Network Security Groups and Application Security Groups&lt;/li&gt;&lt;li&gt;Lab: Azure Firewall&lt;/li&gt;&lt;li&gt;Lab: Configuring and Securing ACR and AKS&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Implement perimeter security strategies including Azure Firewall.&lt;/li&gt;&lt;li&gt;Implement network security strategies including Network Security Groups and Application Security Groups.&lt;/li&gt;&lt;li&gt;Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.&lt;/li&gt;&lt;li&gt;Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 3: Secure Data and Applications&lt;/h5&gt;&lt;p&gt;This module covers Azure Key Vault, application security, storage security, and SQL database security.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Azure Key Vault&lt;/li&gt;&lt;li&gt;Application Security&lt;/li&gt;&lt;li&gt;Storage Security&lt;/li&gt;&lt;li&gt;SQL Database Security&lt;/li&gt;&lt;li&gt;Lab: Key Vault (Implementing Secure Data by setting up Always Encrypted)&lt;/li&gt;&lt;li&gt;Lab: Securing Azure SQL Database&lt;/li&gt;&lt;li&gt;Lab: Service Endpoints and Securing Storage&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Implement Azure Key Vault including certificates, keys, and secretes.&lt;/li&gt;&lt;li&gt;Implement application security strategies including app registration, managed identities, and service endpoints.&lt;/li&gt;&lt;li&gt;Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.&lt;/li&gt;&lt;li&gt;Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 4: Manage Security Operations&lt;/h5&gt;&lt;p&gt;This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.&lt;/p&gt;
&lt;h5&gt;Lessons&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Azure Monitor&lt;/li&gt;&lt;li&gt;Azure Security Center&lt;/li&gt;&lt;li&gt;Azure Sentinel&lt;/li&gt;&lt;li&gt;Lab: Azure Monitor&lt;/li&gt;&lt;li&gt;Lab: Azure Security Center&lt;/li&gt;&lt;li&gt;Lab: Azure Sentinel&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After completing this module, students will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Implement Azure Monitor including connected sources, log analytics, and alerts.&lt;/li&gt;&lt;li&gt;Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.&lt;/li&gt;&lt;li&gt;Implement Azure Sentinel including workbooks, incidents, and playbooks.&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>- Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
- Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
- Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
- Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
- Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
- Implement perimeter security strategies including Azure Firewall.
- Implement network security strategies including Network Security Groups and Application Security Groups.
- Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
- Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
- Implement Azure Key Vault including certificates, keys, and secretes.
- Implement application security strategies including app registration, managed identities, and service endpoints.
- Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
- Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
- Implement Azure Monitor including connected sources, log analytics, and alerts.
- Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
- Implement Azure Sentinel including workbooks, incidents, and playbooks.</objective_plain><essentials_plain>Successful learners will have prior knowledge and understanding of:


- Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
- Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
- Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
- Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.
Prior attendance of the course Microsoft Azure Administrator (AZ-104T00) is recommended.</essentials_plain><audience_plain>This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data.</audience_plain><contents_plain>Module 1: Manage Identity and Access

This module covers Azure Active Directory, Azure Identity Protection, Enterprise Governance, Azure AD PIM, and Hybrid Identity.

Lessons


- Azure Active Directory
- Azure Identity Protection
- Enterprise Governance
- Azure AD Privileged Identity Management
- Hybrid Identity
- Lab: Role-Based Access Control
- Lab: Azure Policy
- Lab: Resource Manager Locks
- Lab: MFA, Conditional Access and AAD Identity Protection
- Lab: Azure AD Privileged Identity Management
- Lab: Implement Directory Synchronization
After completing this module, students will be able to:


- Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
- Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
- Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
- Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
- Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
Module 2: Implement Platform Protection

This module covers perimeter, network, host, and container security.

Lessons


- Perimeter Security
- Network Security
- Host Security
- Container Security
- Lab: Network Security Groups and Application Security Groups
- Lab: Azure Firewall
- Lab: Configuring and Securing ACR and AKS
After completing this module, students will be able to:


- Implement perimeter security strategies including Azure Firewall.
- Implement network security strategies including Network Security Groups and Application Security Groups.
- Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
- Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
Module 3: Secure Data and Applications

This module covers Azure Key Vault, application security, storage security, and SQL database security.

Lessons


- Azure Key Vault
- Application Security
- Storage Security
- SQL Database Security
- Lab: Key Vault (Implementing Secure Data by setting up Always Encrypted)
- Lab: Securing Azure SQL Database
- Lab: Service Endpoints and Securing Storage
After completing this module, students will be able to:


- Implement Azure Key Vault including certificates, keys, and secretes.
- Implement application security strategies including app registration, managed identities, and service endpoints.
- Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
- Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
Module 4: Manage Security Operations

This module covers Azure Monitor, Azure Security Center, and Azure Sentinel.

Lessons


- Azure Monitor
- Azure Security Center
- Azure Sentinel
- Lab: Azure Monitor
- Lab: Azure Security Center
- Lab: Azure Sentinel
After completing this module, students will be able to:


- Implement Azure Monitor including connected sources, log analytics, and alerts.
- Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
- Implement Azure Sentinel including workbooks, incidents, and playbooks.</contents_plain><duration unit="d" days="4">4 days</duration><pricelist><price country="DE" currency="EUR">2590.00</price><price country="IT" currency="EUR">1690.00</price><price country="AE" currency="USD">1500.00</price><price country="SE" currency="EUR">2590.00</price><price country="UA" currency="USD">1200.00</price><price country="PL" currency="PLN">3400.00</price><price country="IL" currency="ILS">8990.00</price><price country="MK" currency="EUR">1000.00</price><price country="GR" currency="EUR">1000.00</price><price country="HU" currency="EUR">1000.00</price><price country="IN" currency="USD">1499.00</price><price country="SG" currency="USD">1919.00</price><price country="AU" currency="USD">2395.00</price><price country="BE" currency="EUR">1995.00</price><price country="AT" currency="EUR">2590.00</price><price country="CA" currency="CAD">2595.00</price><price country="US" currency="USD">2595.00</price><price country="GB" currency="GBP">2610.00</price><price country="RU" currency="RUB">65600.00</price><price country="CH" currency="CHF">3380.00</price><price country="NL" currency="EUR">1995.00</price><price country="SI" currency="EUR">2590.00</price><price country="FR" currency="EUR">2950.00</price></pricelist><miles/></course>