Review By: Patrick Evah
Certified
Expiry Month
Expiry Year
Time taken to Prepare
Resources Used
Detailed Review Of Preparation
The first thing I did before I started my preparation was to print out the certificate objective which are
Manage identity and access (20-25%)
Configure Azure Active Directory for workloads
? create App Registration
? configure App Registration permission scopes
? manage App Registration permission consent
? configure Multi-Factor Authentication settings
? manage Azure AD directory groups
? manage Azure AD users
? install and configure Azure AD Connect
? configure authentication methods
? implement Conditional Access policies
? configure Azure AD identity protection
Configure Azure AD Privileged Identity Management
Configure Azure tenant security
? monitor privileged access
? configure Access Reviews
? activate Privileged Identity Management
? transfer Azure subscriptions between Azure AD tenants
? manage API access to Azure subscriptions and resources
Implement platform protection (35-40%)
Implement network security
? configure virtual network connectivity
? configure Network Security Groups (NSGs)
? create and configure Azure Firewall
? create and configure Azure Front Door service
? create and configure application security groups
? configure remote access management
? configure baseline
? configure resource firewall
Implement host security
Configure container security
Implement Azure Resource management security
? configure endpoint security within the VM
? configure VM security
? harden VMs in Azure
? configure system updates for VMs in Azure
? configure baseline
? configure network
? configure authentication
? configure container isolation
? configure AKS security
? configure container registry
? implement vulnerability management
? create Azure resource locks
? manage resource group security
? configure Azure policies
? configure custom RBAC roles
? configure subscription and resource permissions
Manage security operations (15-20%)
Configure security services
? configure Azure Monitor
? configure diagnostic logging and log retention
? configure vulnerability scanning
Configure security policies
? configure centralized policy management by using Azure Security Center
? configure Just in Time VM access by using Azure Security Center
Manage security alerts
? create and customize alerts
? review and respond to alerts and recommendations
? configure a playbook for a security event by using Azure Security Center
? investigate escalated security incidents
Secure data and applications (25-30%)
Configure security policies to manage data
? configure data classification
? configure data retention
? configure data sovereignty
Configure security for data infrastructure
? enable database authentication
? enable database auditing
? configure Azure SQL Database Advanced Threat Protection
? configure access control for storage accounts
? configure key management for storage accounts
? configure Azure AD authentication for Azure Storage
? configure Azure AD Domain Services authentication for Azure Files
? create and manage Shared Access Signatures (SAS)
? configure security for HDInsight
? configure security for Cosmos DB
? configure security for Azure Data Lake
Configure encryption for data at rest
Configure application security
Configure and manage Key Vault
? implement Azure SQL Database Always Encrypted
? implement database encryption
? implement Storage Service Encryption
? implement disk encryption
? configure SSL/TLS certs
? configure Azure services to protect web apps
? create an application security baseline
? manage access to Key Vault
? manage permissions to secrets, certificates, and keys
? configure RBAC usage in Azure Key Vault
? manage certificates
? manage secrets
? configure key rotation
So I checked every box in the objective field and then I did practice questions at exam topics.com
Benefits From Certification