Mapa Mental - Azure Certification AZ-500 Prova em Portugues

Get Started. It's Free
or sign up with your email address
Mapa Mental - Azure Certification AZ-500 Prova em Portugues by Mind Map: Mapa Mental - Azure Certification AZ-500 Prova em Portugues

1. MANAGE SECURITY OPERATIONS

1.1. Configure centralized policy management

1.1.1. configure a custom security policy

1.1.2. create a policy initiative

1.1.3. configure security settings and auditing by using Azure Policy

1.2. Configure and manage threat protection

1.2.1. configure Azure Defender for Servers (not including Microsoft Defender for Endpoint)

1.2.2. evaluate vulnerability scans from Azure Defender

1.2.3. configure Azure Defender for SQL

1.2.4. use the Microsoft Threat Modeling Tool

1.3. Configure and manage security monitoring solutions

1.3.1. create and customize alert rules by using Azure Monitor

1.3.2. configure diagnostic logging and log retention by using Azure Monitor

1.3.3. monitor security logs by using Azure Monitor

1.3.4. create and customize alert rules in Azure Sentinel

1.3.5. configure connectors in Azure Sentinel

1.3.6. evaluate alerts and incidents in Azure Sentinel

2. SECURE DATA AND APPLICATIONS

2.1. Configure Security for Storage

2.1.1. Configure access control for storage accounts

2.1.2. configure storage account access keys

2.1.3. Configure Azure AD authentication for Azure Storage and Azure Files

2.1.4. configure delegated access

2.2. Configure Security for Databases

2.2.1. enable database authentication by using Azure AD

2.2.2. Enable database auditing

2.2.3. configure dynamic masking on SQL workloads

2.2.4. Implement database encryption for Azure SQL Database

2.2.5. implement network isolation for data solutions, including Azure Synapse Analytics and AzureCosmos DB

2.3. Configure and manage Azure Key Vault

2.3.1. create and configure Key Vault

2.3.2. Configure access to Key Vault

2.3.3. Manage certificates, secrets, and keys

2.3.4. Configure key rotation

2.3.5. configure backup and recovery of certificates, secrets, and keys

3. MANAGE IDENTITY AND ACCESS

3.1. Manage Azure Active Directory (AzureAD) identities

3.1.1. create and manage a managed identity for Azure resources

3.1.2. Manage Azure AD groups

3.1.3. Manage Azure AD users

3.1.4. manage external identities by using Azure AD

3.1.5. manage administrative units

3.2. Manage secure access by using Azure AD

3.2.1. configure Azure AD Privileged Identity Management (PIM)

3.2.2. implement Conditional Access policies, including multifactor authentication

3.2.3. implement Azure AD Identity Protection

3.2.4. implement passwordless authentication

3.2.5. configure access reviews

3.3. Manage Application Access

3.3.1. integrate single sign-on (SSO)and identity providers for authentication

3.3.2. Create an app registration

3.3.3. Configure App Registration permission scopes

3.3.4. Manage App Registration permission consent

3.3.5. Manage API access to Azure subscriptions and resources

3.3.6. configure an authentication method for a service principal

3.4. Manage Access Control

3.4.1. configure Azure role permissions for management groups, subscriptions, resource groups, and resources

3.4.2. Apply principle of least privilege

3.4.3. interpret role and resource permissions

3.4.4. assign built-in Azure AD roles

3.4.5. create and assign custom roles, including Azure roles and Azure AD roles

4. IMPLEMENT PLATAFORM PROTECTION

4.1. Implement Advanced Network Security

4.1.1. secure the connectivity of hybrid networks

4.1.2. secure the connectivity of virtual networks

4.1.3. Create and configure Azure Firewall

4.1.4. Implement Azure Firewall Manager

4.1.5. create and configure Azure Application Gateway

4.1.6. create and configure Azure Front Door

4.1.7. create and configure Web Application Firewall (WAF)

4.1.8. configure a resource firewall, including storage account, Azure SQL, Azure Key Vault, or Azure App Service

4.1.9. configure network isolation for Web Apps and Azure Functions

4.1.10. implement Azure Service Endpoints

4.1.11. implement Azure Private Endpoints, including integrating with other services

4.1.12. implement Azure Private Links

4.1.13. implement Azure DDoS Protection

4.2. Configure Advanced Security for Compute

4.2.1. configure Azure Endpoint Protection for virtual machines (VMs)

4.2.2. Implement and manage security updates for VMs

4.2.3. configure security for container services

4.2.4. manage access to Azure Container Registry

4.2.5. configure security for serverless compute

4.2.6. configure security for an Azure App Service

4.2.7. configure encryption at rest

4.2.8. configure encryption in transit