Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft Azure Security Technologies (AZ-500) Cert Prep: 4 Secure Data and Applications

Description

Start your preparations for the “Secure data and applications” domain of the AZ-500 exam.

Tags

Syllabus

Syllabus IntroductionSecuring data and apps in AzureWhat you should knowExam overview1. Configure Security for StorageConfigure access control for Storage accountsConfigure Storage account access keysConfigure Azure AD authentication for Azure StorageAzure AD Domain Services authentication for Azure Files2. Configure Security for DatabasesEnable database authentication using Azure ADEnable database auditingConfigure dynamic masking on SQL workloadsImplement database encryption for Azure SQL DatabaseImplement network isolation for data solutions3. Configure and Manage Azure Key VaultCreate and configure Key VaultConfigure access to Azure Key VaultManage certificates, secrets, and keysConfigure key rotationBackup and recovery of certificates, secrets, and keysConclusionNext steps


Microsoft Azure Security Technologies (AZ-500) Cert Prep: 4 Secure Data and Applications

Affiliate notice

Start your preparations for the “Secure data and applications” domain of the AZ-500 exam.

Syllabus IntroductionSecuring data and apps in AzureWhat you should knowExam overview1. Configure Security for StorageConfigure access control for Storage accountsConfigure Storage account access keysConfigure Azure AD authentication for Azure StorageAzure AD Domain Services authentication for Azure Files2. Configure Security for DatabasesEnable database authentication using Azure ADEnable database auditingConfigure dynamic masking on SQL workloadsImplement database encryption for Azure SQL DatabaseImplement network isolation for data solutions3. Configure and Manage Azure Key VaultCreate and configure Key VaultConfigure access to Azure Key VaultManage certificates, secrets, and keysConfigure key rotationBackup and recovery of certificates, secrets, and keysConclusionNext steps