WSQ , IBF, SkillsFuture, PEI Approved Training Provider

AZ-500 Azure Security Engineer Associate Training

Embarking on the journey to become a certified Azure Security Engineer is a step towards gaining in-depth knowledge and credibility in the realm of cloud security. Our AZ-500 Exam Preparation Guide is meticulously crafted to offer you an enriching learning experience. Designed by experts, this course helps in acquainting you with the critical concepts and hands-on skills that are quintessential in becoming an Azure Security Engineer. Through this course, we aim to foster a learning environment where you can prepare at your own pace and secure a promising career in Azure security.

Taking the AZ-500 Azure Security Engineer Associate Exam is a significant milestone in validating your proficiency in managing security and identity solutions in Microsoft Azure. Our course provides a structured approach to mastering the skills required to excel in the AZ-500 exam. You will gain access to various modules that cover a broad spectrum of topics, including managing identity and access, implementing platform protection, managing security operations, and securing data and applications. Immerse yourself in a learning journey that not only prepares you for the examination but also lays a robust foundation for a thriving career in the field.

Certification

  • Certificate of Completion from Tertiary Infotech - Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from Tertiary Infotech.

  • External Certification - The participant will be able to attempt the Microsoft Azure Security Engineer Associate (AZ500) exam after attending this course. Upon passing the exam, you will receive the Microsoft Azure Security Engineer Associate (AZ500) accreditation.

Microsoft Learning Partner

We are Authorised Microsoft Learning Partner (Org ID:  5238476). To get the official Microsoft certification, please register your certification exam at Pearson Vue Test Center.

Certification Exam at Pearson Vue

We are Authorised Pearson Vue Testing Center. Once you have prepared for the exam, you can register for the certification here. The course fee does not include the certification exam fee.

You can purchase the exam voucher (one of the lowest prices in Singapore) at Microsoft Role-Based Certification Exam Voucher.

Funding and Grant Applications

No funding is available for this course.

For WSQ funding, please checkout the details at WSQ - Microsoft Azure Security Engineer Associate (AZ-500)

Course Code: C893

Fee

$1,200.00 (GST-exclusive)
$1,308.00 (GST-inclusive)

The course fee listed above is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

Course Date

Course Time

* Required Fields

    Duration

    2 months (Full Time)

      Assessment

      3 hours onine assessment after each module

        Class (No of teacher: student): 1:20

          Intake

          • 3 Nov 2025 to 29 Sep 2026
          • 4 May 2026 to 26 June 2026
          • 2 Jan 2026 to 2 Mar 2026
          • 2 Mar 2026 to 27Apr 2026

          Enrolment Requirement

          • Age: 21 years old and above
          • Language Proficiency: At least C6 for GCE "O" Level English
          • Academic: At least C6 for GCE "O" Level in any 3 subjects

          Graduation Requirement

          • Attendance: 75%
          • Assessment: Passed

          Post-Course Support

          • (TESTING) We provide free consultation related to the subject matter after the course.
          • Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts.

          Course Cancellation/Reschedule Policy

          • You can register your interest without upfront payment. There is no penalty for withdrawal of the course before the class commerce.
          • We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% for any paid amount.
          • Note the venue of the training is subject to changes due to availability of the classroom

          Course Details

          LU1 Manage Identity and Access

          Topic 1 Secure Azure solutions with Azure Active Directory

          • Explore Azure Active Directory features
          • Self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services
          • Azure AD DS and self-managed AD DS
          • Azure AD DS and Azure AD
          • Investigate roles in Azure AD
          • Azure AD built-in roles
          • Deploy Azure AD Domain Services
          • Create and manage Azure AD users
          • Manage users with Azure AD groups
          • Configure Azure AD administrative units
          • Implement passwordless authentication

          Topic 2 Implement Hybrid identity 

          • Deploy Azure AD connect
          • Explore authentication options
          • Configure Password Hash Synchronization (PHS)
          • Implement Pass-through Authentication (PTA)
          • Deploy Federation with Azure AD
          • Explore the authentication decision tree
          • Configure password writeback

          Topic 3 Deploy Azure AD identity protection 

          • Explore Azure AD identity protection
          • Configure risk event detections
          • Implement user risk policy
          • Implement sign-in risk policy
          • Deploy multifactor authentication in Azure
          • Explore multifactor authentication settings
          • Enable multifactor authentication
          • Implement Azure AD conditional access
          • Configure conditional access conditions
          • Implement access reviews

          Topic 4 Configure Azure AD privileged identity management 

          • Explore the zero trust model
          • Review the evolution of identity management
          • Deploy Azure AD privileged identity management
          • Configure privileged identity management scope
          • Implement privileged identity management onboarding
          • Explore privileged identity management configuration settings
          • Implement a privileged identity management workflow

          Topci 5 Design an enterprise governance strategy 

          • Review the shared responsibility model
          • Explore the Azure cloud security advantages
          • Review Azure hierarchy of systems
          • Configure Azure policies
          • Enable Azure role-based access control (RBAC)
          • Compare and contrast Azure RBAC vs Azure policies
          • Configure built-in roles
          • Enable resource locks
          • Deploy Azure blueprints
          • Design an Azure subscription management plan

          LU2 Implement platform protection

          Topic 6 Implement perimeter security 

          • Define defense in depth
          • Explore virtual network security
          • Enable Distributed Denial of Service (DDoS) Protection
          • Configure a distributed denial of service protection implementation
          • Explore Azure Firewall features
          • Deploy an Azure Firewall implementation
          • Configure VPN forced tunneling
          • Create User Defined Routes and Network Virtual Appliances
          • Explore hub and spoke topology

          Topic 7 Configure network security 

          • Explore Network Security Groups (NSG)
          • Deploy a Network Security Groups implementation
          • Create Application Security Groups
          • Enable service endpoints
          • Configure service endpoint services
          • Deploy private links
          • Implement an Azure application gateway
          • Deploy a web application firewall
          • Configure and manage Azure front door

          Topic 8 Configure and manage host security

          • Enable endpoint protection
          • Define a privileged access device strategy
          • Deploy privileged access workstations
          • Create virtual machine templates
          • Enable and secure remote access management
          • Configure update management
          • Deploy disk encryption
          • Managed disk encryption options
          • Deploy and configure Windows Defender
          • Microsoft cloud security benchmark in Defender for Cloud
          • Explore Microsoft Defender for Cloud recommendations

          Topic 9 Enable Containers security 

          • Explore containers
          • Configure Azure Container Instances security
          • Manage security for Azure Container Instances (ACI)
          • Explore the Azure Container Registry (ACR)
          • Enable Azure Container Registry authentication
          • Review Azure Kubernetes Service (AKS)
          • Implement an Azure Kubernetes Service architecture
          • Configure Azure Kubernetes Service networking
          • Deploy Azure Kubernetes Service storage
          • Secure authentication to Azure Kubernetes Service with Active Directory
          • Manage access to Azure Kubernetes Service using Azure role-based access controls

          LU3 Secure your data and applications

          Topic 10 Deploy and secure Azure Key Vault 

          • Explore Azure Key Vault
          • Configure Key Vault access
          • Review a secure Key Vault example
          • Deploy and manage Key Vault certificates
          • Create Key Vault keys
          • Manage customer managed keys
          • Enable Key Vault secrets
          • Configure key rotation
          • Manage Key Vault safety and recovery features
          • Perform Try-This exercises
          • Explore the Azure Hardware Security Module

          Topic 11 Configure application security features 

          • Review the Microsoft identity platform
          • Explore the Application model
          • Register an application with App Registration
          • Configure Microsoft Graph permissions
          • Enable managed identities
          • Azure App Services
          • App Service Environment
          • Azure App Service plan
          • App Service Environment networking
          • Availability Zone Support for App Service Environments
          • App Service Environment Certificates

          Topic 12 Implement storage security 

          • Define data sovereignty
          • Configure Azure storage access
          • Deploy shared access signatures
          • Manage Azure AD storage authentication
          • Implement storage service encryption
          • Configure blob data retention policies
          • Configure Azure files authentication
          • Enable the secure transfer required property

          Topic 13 Configure and manage SQL database security 

          • Enable SQL database authentication
          • Configure SQL database firewalls
          • Enable and monitor database auditing
          • Implement data discovery and classification
          • Microsoft Defender for SQL
          • Vulnerability assessment for SQL Server
          • SQL Advanced Threat Protection
          • Explore detection of a suspicious event
          • SQL vulnerability assessment express and classic configurations
          • Configure dynamic data masking
          • Implement transparent data encryption
          • Deploy always encrypted features
          • Deploy an always encrypted implementation

          LU4 Manage security operation

          Topic 14 Configure and manage Azure Monitor 

          • Explore Azure Monitor
          • Configure and monitor metrics and logs
          • Enable Log Analytics
          • Manage connected sources for log analytics
          • Enable Azure monitor Alerts
          • Configure properties for diagnostic logging

          Topic 15 Enable and manage Microsoft Defender for Cloud 

          • MITRE Attack matrix
          • Implement Microsoft Defender for Cloud
          • Security posture
          • Workload protections
          • Deploy Microsoft Defender for Cloud
          • Azure Arc
          • Azure Arc capabilities
          • Microsoft cloud security benchmark
          • Configure Microsoft Defender for Cloud security policies
          • View and edit security policies
          • Manage and implement Microsoft Defender for Cloud recommendations
          • Explore secure score
          • Define brute force attacks
          • Understand just-in-time VM access
          • Implement just-in-time VM access

          Topic 16 Configure and monitor Microsoft Sentinel 

          • Enable Microsoft Sentinel
          • Configure data connections to Sentinel
          • Create workbooks to monitor Sentinel data
          • Enable rules to create incidents
          • Configure playbooks
          • Hunt and investigate potential breaches

          Practice Exam

          Course Info

          Promotion Code

          Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.

          Minimum Entry Requirement

          Knowledge and Skills

          • Able to operate using computer functions
          • Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

          Attitude

          • Positive Learning Attitude
          • Enthusiastic Learner

          Experience

          • Minimum of 1 year of working experience.

          Target Age Group: 18-65 years old

          Minimum Software/Hardware Requirement

          Software:

          TBD

          Hardware: Window or Mac Laptops

          Job Roles

          • Azure Security Engineer
          • Cloud Security Consultant
          • Cybersecurity Analyst
          • IT Security Specialist
          • Network Security Engineer
          • Systems Administrator
          • Infrastructure Security Engineer
          • Security Architect
          • Compliance Analyst
          • Risk Manager
          • Data Protection Officer
          • Incident Responder
          • Penetration Tester
          • Security Operations Center Analyst
          • Vulnerability Analyst

          Trainers

          Sanjiv Venkatram: Sanjiv i is an ACTA certified experienced leader with a proven track record in business / finance consulting and in developing i) business intelligence (BI) solutions ii) data analytics/analysis solutions and iii) IOT lead BI solutions. Sanjiv's goal through Prudentia Consulting, is to promote the simple joy and excitement of actively using the Microsoft Platform. He believes that the agility afforded by the Microsoft platform helps businesses get time back for deeper business thinking and to spend more time with their end customers

          Sanjiv has rich experiences in diverse/complex high-tech businesses, turn around environments and strategic transformations. His functional expertise is in sales analytics, financial planning and analysis, engineering and program management. He has worked across discrete manufacturing, professional services and higher education verticals. He also has a working knowledge of equities portfolio management within the financial services domain.Sanjiv is the CEO of Prudentia Consulting, an organization committed to promoting the active usage of the Microsoft Platform. Prior to this, he has worked at Microsoft (US & APAC: 9.2 years), Cognizant Tech Solutions (3.3 years), Yazaki North America (8 years) and until recently at Oracle. Here are a few of his BI/analytics projects driven at scale: Built APAC wide BI dashboard using the Power BI umbrella tool set (Power BI online, Power BI desktop and Power Pivot) and a KPI lake (SQL DB), Helped develop key KPIs – identified key KPIs and helped land this in the DB, Developed a budget audit tool that captured budget inputs from a host of countries across the globe, Developed a business unit P&L reporting tool (functional architecture) in Business Objects for the world-wide financial planning and analysis team.

          Alec Tan: Alec Tan is a ACTA certified trainer, He has a number of Comptia certifications. Since 2002, starting off from IT technical background to pre-sales, sales account manager, system integration, operate IT retail / repair shop business in Sim Lim Square 2008 ~ 2012, and back to IT industry employment, freelance IT Trainer till present.

          Quah Chee Yong: Quah Chee Yong is a ACTA certified trainer. Quah Chee Yong Chee Yong is an experienced professional who has held various Technical, Operations and Commercial positions across several industriesA firm believer that AI can create a better world, he has equipped himself with the Knowledge and Skills in the fields of Data Science, Machine Learning, Deep Learning and Cloud Deployment

          He has a deep passion for training & facilitating and is currently a Singapore WSQ certified Adult Educator. He particularly enjoys the interactive engagements with his fellow trainers and learners

          Peter Cheong :  Peter is a ACLP certied trainer. Specialise In IT related knowlege and conduct IT Training which Include Microsoft Window Server Technology (Wintel) and Linux - Centos/Red Hat. Comptia ,ITIL , Motorola Solution Trunking System and Cisco Networking. I was worked in Motorola Solutions Conduct Motorola Astro 25 Trunking System For Police Force Malaysia (RMPnet),Taiwan Navy, Indonesia METRO POLDA (Police Force). After that Peter Join As IT Group Manager For W-Group which include 17 subsidiaries Companies in Real Estate Developer,Plantation, Building Management Services ,Contruction and also Fiber Opti Service Provider in Sabah,Malaysia.

          Alan Tan: Alan Tan is a ACTA certified trainer. Alan Tan hold Masters in Data Science in Singapore University of Technology and Design. He is Microsoft Power Platform PL-900 certified and Microsoft Azure Data Fundamentals  Certified DP-900. He have this skills in Microsoft Power Platform development skills such as Powerapps, Power Automate,Power Portal, Power Virtual Agent, Power BI, Sharepoint, Dataverse, etc. For Programming language such as Python and Robotics Process Automation (RPA) development. He is working as a Senior Data Engineer in an MNC.

          Bernard Peh: Bernard Peh is a Business Development Director and ACTA certified trainer with over 20 years of experience in the financial services industry. He has held key leadership roles and integrated technology, digital marketing, and data science to drive growth in sales, recruitment, and financial planning. As a mentor, Bernard has developed many successful financial professionals who have achieved top industry accolades like TOT, COT, and MDRT.

          With deep expertise in data science, Bernard has advised firms and designed training programs for institutions like NTUC Learning Hub. He continues to apply data science to collective funds, achieving exceptional results such as a 400% increase in assets under management, while empowering financial professionals with technology-driven solutions.

          Ken Hiong: Ken Hiong is a ACTA certified trainer. Ken has over 20 years of work experience in the healthcare and pharmaceutical industry, having assumed various functional and managerial roles in sales, marketing, business development, finance, business analysis and planning. With an interest and experience in scripting, Ken has worked on projects using HTML, CSS, PHP, MySQL, WordPress, MS Office, VBA, Power BI, etc. Notably, Ken is a proven expert Excel user at work who has made efficient many work processes, improved data analysis and enhanced the quality of business planning and reporting for organizations.

          Ken graduated with a Pharmacy degree, holds a Master of Business Administration from the National University of Singapore and a Master of Applied Finance from the University of Adelaide. An ardent advocate of lifelong learning, Ken is ACTA trained and seeks to continually upgrade his IT skills through various channels of learning and Microsoft certifications. With MS Office Master qualification, Ken looks forward to assisting individuals and corporations improve their computer skills, productivity and business outcomes.

          Audrey Lin : Audrey Lin is a ACTA certified trainer. She is a Business Development Director at Gill Technologies, an IT Consulting and Managed Services Provider focused at servicing SMEs. I'm responsible for the operations, sales, marketing, accounting, and finance functions of the organization. She have 13 years of experience in helping businesses and schools maximize their Return on Investment on IT through the use of the right technology, improving their business processes and increasing user adoption. My expertise is around Microsoft 365, MS Teams and Power BI. To help organizations improve employee productivity with tools from the MS 365 stack, she have delivered several classroom & online-styled end user training sessions to organizations from various industries - real estate, F&B, oil & gas, healthcare, schools, logistics. I have also created multiple customized & on-demand videos that end users can refer to for a quick review. Being certified as a Microsoft Data Analyst Associate, She is proficient at helping businesses gather business insights from their wide array of data. She have been involved in BI Projects with healthcare firms, logistics companies, FIs, etc., starting from the design phase, right through to the daily management of the BI system. Her area of knowledge in managing security and compliance in MS 365 is significant and ever-growing. She have good understanding of the Zero Trust Principle and uses that to improve the IT security posture of her clients. With the support of her engineering team at Gill Technologies, we use cloud-based management tools from MS 365, namely Intune, Endpoint Manager, Defender, etc. to manage our clients' endpoints.

          Agus Salim: Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.

          Truman Ng: Truman Ng is a ACTA certified trainer that graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.

          Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.

          Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philippines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.
          As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.
          Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc

          Write Your Own Review

          You're reviewing: AZ-500 Azure Security Engineer Associate Training