• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

449 Courses in Cardiff delivered Online

Cyber Security Awareness Level 4

5.0(1)

By Course Gate

Level up your Cyber Security knowledge with our comprehensive Level 4 course. Explore Cyber Attacks, Data Breaches, Password Management, and more. Perfect for professionals and individuals keen on digital security.

Cyber Security Awareness Level 4
Delivered Online On Demand3 hours
£11.99

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineFlexible Dates
£595

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Microsoft Outlook Mastering Program

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum You Can Master Microsoft Outlook You Can Master Microsoft Outlook Promo 00:02:00 You Can Ask Me Anytime 00:01:00 Your Facebook Support Group 00:01:00 Quick Win - How To Send an Email in Outlook 00:01:00 Quick Win - How To Print an Email in Outlook 00:01:00 Another Quick Win - You Can Work Offline With Outlook 00:01:00 Getting Started With Outlook Outlook Environment 00:03:00 Outlook Opening 00:02:00 Outlook Interface Options 00:04:00 Sending and Receiving Email in Outlook 00:03:00 Sending and Receiving Email in Outlook with Attachments 00:02:00 File Menu Account Settings in Outlook 00:06:00 Automatic Replies in Outlook 00:04:00 Mail Box Settings in Outlook 00:02:00 Rules and Alerts Settings in Outlook 00:04:00 Exporting and Importing Rules and Alerts in Outlook 00:01:00 Opening Options in File Outlook 00:04:00 Home - New Email in Outlook Quick Win - How To Create Folder in Outlook 00:01:00 Quick Win - How To Change Outlook Style 00:01:00 Quick Win - How To Use Quick Access Toolbar 00:01:00 New Email Options in Outlook 00:03:00 Clipboard in New Email 00:05:00 Basic Text in New Email 00:07:00 Name, Include and Tags in New Email 00:03:00 Inserting Table Into New Email 00:10:00 Inserting Images Into New Email 00:10:00 Inserting Shapes Into New Email 00:06:00 Inserting SmartArt Into New Email 00:04:00 Inserting New Chart Into New Email 00:05:00 Taking Screenshot Into New Email 00:02:00 Links, Text and Symbol 00:03:00 Themes, Show Fields, Encrypt, Tracking and More Options in New Email 00:03:00 Formatting Text in New Emails 00:03:00 Text Style in New Email 00:04:00 Reviewing Menu in New Email 00:03:00 Home - New Appointment New Appointment at Home Menu 00:06:00 Home - New Meeting New Meeting at Home Menu 00:01:00 Home - New Contact New Contact in Home Menu 00:05:00 Home - New Task Create New Task 00:03:00 Other New Item in Home 00:02:00 Home - Other Functions Email Deletion in Outlook 00:02:00 Responding to A Email in Outlook 00:02:00 Quick Steps, Tag and Other Functions 00:03:00 Send and Receive Complete Guide of Send and Receive 00:03:00 Home - Folder Complete Folder Guide 00:05:00 Review and Outlook View and Help in Outlook 00:04:00 Options Options Intro 00:03:00 General Options in Outlook 00:05:00 Mail Options in Outlook 00:06:00 Calendar Options in Outlook 00:03:00 Contact Options in Outlook 00:01:00 Task Options in Outlook 00:01:00 Search Options in Outlook 00:02:00 Language Options in Outlook 00:02:00 Ease of Access Options in Outlook 00:02:00 Advanced Option in Outlook 00:04:00 Ribbon and Quick Access Toolbar Customization 00:02:00 Security Is Everything Quick Win - Create Unknown Password 00:01:00 Security Is Everthing 00:01:00 Quick Win - Insecurity Is Coming from You And Others 00:01:00 Understand Security Type or Category 00:02:00 Life Savers - You Should Know These 00:04:00 Have Proper Password - Start Securing You Now 00:03:00 Don't Use the Same Password Anymore 00:02:00 Should You Use Longer Password or Complicated! 00:03:00 Last-Pass & Authy Mobile App 00:02:00 The Best and Only Solution to Make and Keep Password Un-Crack-Able 00:08:00 Lastpass Setup and Configure 00:10:00 Last-Pass Options Part 1 00:03:00 Last-Pass Options Part 2 00:04:00 Last-Pass Option Part 3 00:04:00 2FA Makes You Even Stronger in Password 00:05:00 Security Is Everything, Keep Secured Your Devices 00:07:00 Security on Your Data and Privacy 00:08:00 Conclusion Congratulations 00:01:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Microsoft Outlook Mastering Program
Delivered Online On Demand
£19

The Complete Microsoft Outlook Masterclass

4.9(27)

By Apex Learning

Overview This comprehensive course on The Complete Microsoft Outlook Masterclass will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This The Complete Microsoft Outlook Masterclass comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? At the end of the course there will be an online written test, which you can take either during or after the course. After successfully completing the test you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this The Complete Microsoft Outlook Masterclass. It is available to all students, of all academic backgrounds. Requirements Our The Complete Microsoft Outlook Masterclass is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more!   Course Curriculum 16 sections • 74 lectures • 04:03:00 total length •You Can Master Microsoft Outlook Promo: 00:02:00 •You Can Ask Me Anytime: 00:01:00 •Your Facebook Support Group: 00:01:00 •Quick Win -How To Send an Email in Outlook: 00:01:00 •Quick Win - How To Print an Email in Outlook: 00:01:00 •Another Quick Win - You Can Work Offline with Outlook: 00:01:00 •Outlook Environment: 00:03:00 •Outlook Opening: 00:02:00 •Outlook Interface Options: 00:04:00 •Sending and Receiving Email in Outlook: 00:03:00 •Sending and Receiving Email in Outlook with Attachments: 00:02:00 •Account Settings in Outlook: 00:06:00 •Automatic Replies in Outlook: 00:04:00 •Mail Box Settings in Outlook: 00:02:00 •Rules and Alerts Settings in Outlook: 00:04:00 •Exporting and Importing Rules and Alerts in Outlook: 00:01:00 •Opening Options in File Outlook: 00:04:00 •Quick Win -How to Create Folder in Outlook: 00:01:00 •Quick Win -How to Change Outlook Style: 00:01:00 •Quick Win - How To Use Quick Access Toolbar: 00:01:00 •New Email Options in Outlook: 00:03:00 •Basic Text in New Email: 00:07:00 •Name, Include and Tags in New Email: 00:03:00 •Inserting Table Into New Email: 00:10:00 •Inserting Images Into New Email: 00:10:00 •Inserting Shapes Into New Email: 00:06:00 •Inserting SmartArt Into New Email: 00:04:00 •Inserting New Chart Into New Email: 00:05:00 •Taking Screenshot Into New Email: 00:02:00 •Links, Text and Symbol: 00:03:00 •Themes, Show Fields, Encrypt, Tracking and More Options in New Email: 00:03:00 •Formatting Text in New Emails: 00:03:00 •Reviewing Menu in New Email: 00:03:00 •New Appointment at Home Menu: 00:06:00 •New Meeting at Home Menu: 00:01:00 •New Contact in Home Menu: 00:05:00 •Create New Task: 00:03:00 •Other New Item in Home: 00:02:00 •Email Deletion in Outlook: 00:02:00 •Responding to An Email in Outlook: 00:02:00 •Quick Steps, Tag and Other Functions: 00:03:00 •Complete Guide of Send and Receive: 00:03:00 •Complete Folder Guide: 00:05:00 •View and Help in Outlook: 00:04:00 •Options Intro: 00:03:00 •General Options in Outlook: 00:05:00 •Mail Options in Outlook: 00:06:00 •Calendar Options in Outlook: 00:03:00 •Contact Options in Outlook: 00:01:00 •Task Options in Outlook: 00:01:00 •Search Options in Outlook: 00:02:00 •Language Options in Outlook: 00:02:00 •Ease of Access Options in Outlook: 00:02:00 •Advanced Option in Outlook: 00:04:00 •Ribbon and Quick Access Toolbar Customization: 00:02:00 •Quick Win - Create Unknown Password: 00:01:00 •Security Is Everything: 00:01:00 •Quick Win - Insecurity Is Coming from You and Others: 00:01:00 •Understand Security Type or Category: 00:02:00 •Life Savers - You Should Know These: 00:04:00 •Have Proper Password - Start Securing You Now: 00:03:00 •Don't Use the Same Password Anymore: 00:02:00 •Should You Use Longer Password or Complicated!: 00:03:00 •Last-Pass & Authy Mobile App: 00:02:00 •The Best and Only Solution to Make and Keep Password Un-Crack-Able: 00:08:00 •Last-pass Setup and Configure: 00:10:00 •Last-Pass Options Part 1: 00:03:00 •Last-Pass Options Part 2: 00:04:00 •Last-Pass Option Part 3: 00:04:00 •2FA Makes You Even Stronger in Password: 00:05:00 •Security Is Everything, Keep Secured Your Devices: 00:07:00 •Security on Your Data and Privacy: 00:08:00 •Congratulation: 00:01:00 •Assignment -The Complete Microsoft Outlook Masterclass: 00:00:00

The Complete Microsoft Outlook Masterclass
Delivered Online On Demand4 hours 3 minutes
£12

Concise Cisco switching

5.0(3)

By Systems & Network Training

Concise Cisco switches course description A hands on course covering the product specifics of Cisco switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install Cisco switches. Use the command line interface and the web based interface to manage Cisco switches. Configure and troubleshoot Cisco switches. Perform software upgrades and maintain configurations using TFTP. Concise Cisco switches course details Who will benefit: Anyone working with Cisco switches. Particularly aimed at engineers and technicians supporting Cisco switches. Prerequisites: None. Duration 2 days Concise Cisco switches course content Ethernet review Single segment Ethernet, CSMA/CD, Broadcast domains, collision domains. Hubs, Extending the LAN. Hands on Hub based Ethernet. Cisco switches What are switches, frame forwarding and filtering, the forwarding database. Hands on Switched based Ethernet. Configuring Cisco switches Accessing the switch, installing the switch, The CLI, connecting PCs using the switch. Hands on Configuring Cisco switches. The command line interface User and privilege modes, online help, show, basic troubleshooting. The configuration editor, Global, major and sub commands, enable, secret and other passwords. Hands on Simple troubleshooting using the CLI. Port configuration Speed, duplex, security, trunking. Hands on Port trunking. Spanning Tree Protocol Spanning Tree, Loops, effect, root bridges, bridge port states, STP reconfiguration. RSTP and variants. Hands on STP. VLANS What are VLANs, configuring VLANs, access ports and trunks, 802.1Q, inter VLAN routing. Hands on Access ports, trunks, layer 3 switching. Housekeeping Configuration management, software management, password recovery. Hands on TFTP. Managing interconnection devices SNMP, RMON, RMON II. Troubleshooting LEDs, CDP, logging, Layer 1, layer 2, layer 3. Hands on Fixing things.

Concise Cisco switching
Delivered in Internationally or OnlineFlexible Dates
£1,497

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Create a PHP Login and Registration System from Scratch 2020

By Packt

Learn how to build a login and registration system using PHP, MySQL, and Ajax

Create a PHP Login and Registration System from Scratch 2020
Delivered Online On Demand2 hours 48 minutes
£127.99

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380