AZ-500: Microsoft Azure Security Technologies [AZ-500T00-A] (EN)
Day | Date | Time | Location | Trainer | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Mon | 15-09-2025 | 09:00 - 16:30 | Online Virtual | |||||||
Tue | 16-09-2025 | 09:00 - 16:30 | Online Virtual | |||||||
Wed | 17-09-2025 | 09:00 - 16:30 | Online Virtual | |||||||
Thu | 18-09-2025 | 09:00 - 16:30 | Online Virtual |
What is AZ-500: Microsoft Azure Security Technologies [AZ-500T00-A]
The ‘AZ-500: Microsoft Azure Security Technologies [AZ-500T00-A]’ training is designed to equip IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This training covers security for identity and access, platform protection, data and applications, and security operations. The training uses MOC (Microsoft Official Courseware) and is delivered by an experienced MCT (Microsoft Certified Trainer).
‘Microsoft Azure Security Technologies [AZ-500T00-A]’ training is a transformative learning experience. Our trainers, with their profound expertise, bring theoretical concepts to life by providing practical insights drawn from real-world scenarios. This training is designed to equip you with the skills necessary to implement extensive security measures, thereby fortifying your organization’s Azure environment. It’s not just about learning; it’s about empowering you to make your organization’s Azure environment more secure and robust.
Who should attend AZ-500: Microsoft Azure Security Technologies [AZ-500T00-A]
- IT Security Professionals: Individuals responsible for implementing security controls and maintaining the organization’s security posture.
- System Administrators: Those who manage and maintain systems, including implementing security measures for identity and access, platform protection, and data and applications.
- Network Engineers: Professionals who design and implement network infrastructures, including perimeter and network security strategies.
- Database Administrators: Individuals who manage and secure databases and would benefit from learning about database security strategies.
- Developers: Those who develop applications and would benefit from learning about application security strategies and storage security strategies.
Prerequisites
Participants should have a fundamental understanding of Microsoft Azure and familiarity with IT security. Prior experience in IT security is beneficial but not mandatory.
Objectives
At the end of the training, you will be able to:
- Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
- Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
- Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
- Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
- Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
- Implement perimeter security strategies including Azure Firewall.
- Implement network security strategies including Network Security Groups and Application Security Groups.
- Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
- Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
- Implement Azure Key Vault including certificates, keys, and secrets.
- Implement application security strategies including app registration, managed identities, and service endpoints.
- Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
- Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
- Implement Azure Monitor including connected sources, log analytics, and alerts.
- Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
- Implement Azure Sentinel including workbooks, incidents, and playbooks.
Exam information
Exam Information:
- Exam duration (minutes): 150-210
- % extra time for non-native speakers:
- Number of exam questions: 40-60
- Minimum correct questions:
- Exam style: Multiple choice
- Open book: No
Exam guarantee:
We have full confidence in the quality of our training. Therefore, if you take this training in our open schedule, we offer an exam guarantee. This means that you can retake the training for free, and you’ll receive a complimentary exam voucher if you don’t pass the exam on your first attempt.
The following conditions apply:
- You attended the entire training.
- You took the first exam within 2 months after the training.
- There is a maximum of 1 year between your initial training and the free training.
e-CF competences with this course
- A.5. Architecture Design
- B.6. ICT System Engineering
- C.5. Systems Management
Classroom, online, blended and in-company
At Capgemini Academy you learn in the way that suits you. Do you prefer classroom training, online or a combination of the two (blended)? You can follow most training courses in-company: within your own organization. We use a variety of tools to make learning even more fun and effective. Consider videos, games, quizzes, webinars and case studies, for example. And you can always contact your trainer with any questions.

In-company training courses
With an in-company training you have several advantages:
- You choose the location.
- You train with your colleagues, ensuring it aligns with your practice.
- The trainer tailors explanations, examples and assignments to your organization.
- In consultation, exercises can be adapted to organization-specific questions.
Request more information or a quote.