AZ-500: Azure Platform Protection Competency (Intermediate Level)

  • 29m
  • 29 questions
The Azure Platform Protection Competency (Intermediate Level) benchmark measures your comprehensive understanding of securing and safeguarding the Azure platform. You will be evaluated on your ability to restrict resource access with roles, implement Azure network security, secure network access with VPNs, and more. A learner who scores high on this benchmark demonstrates competency in many areas of this domain and can make informed decisions to ensure that the Azure platform remains protected against potential security threats and unauthorized access, thereby ensuring the safety and integrity of the platform and its users.

Topics covered

  • configure an ExpressRoute dedicated circuit
  • configure a point-to-site VPN
  • configure a site-to-site VPN
  • configure Azure Firewall application rules
  • configure Azure Firewall network address translation (NAT) rules
  • configure Azure Firewall network rules
  • configure Azure VM JIT
  • configure private endpoints for Azure services
  • configure software extensions within Azure VMs
  • create a custom role definition
  • create a NSG using PowerShell
  • create a NSG using the CLI
  • create key pairs used for Secure Shell (SSH) authentication
  • enable Bastion as a jump box virtual machine management solution
  • enable SSH public key authentication for a Linux virtual machine (VM)
  • identify how roles are used in Azure
  • manage application security groups
  • manage RBAC using PowerShell
  • manage RBAC using the CLI
  • manage role-based access control (RBAC) using the GUI
  • manage user defined routes (UDRs)
  • recognize how ExpressRoute network connections work
  • recognize when to use distributed denial-of-service (DDoS) protection
  • use PowerShell to configure vnet peering
  • use PowerShell to generate PKI certificates
  • use PowerShell to manage vnets
  • use role-based access control (RBAC) to grant VM permissions
  • use the CLI to configure vnet peering
  • use the CLI to manage vnets