Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning. For more queries, reach out to us: info@mangates.com
Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning. For more queries, reach out to us: info@mangates.com
Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning. For more queries, reach out to us: info@mangates.com
Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning. For more queries, reach out to us: info@mangates.com
Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning. For more queries, reach out to us: info@mangates.com
Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning. For more queries, reach out to us: info@mangates.com
Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning. For more queries, reach out to us: info@mangates.com
Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score
Accelerate your Salesforce integration expertise and master SOAP, REST, BULK API, and Streaming. Gain hands-on experience with Postman and SOAP UI and set up your environment with Visual Studio Code. Tailored for developers and Salesforce certification aspirants, this course will elevate your skills technically. Enroll now to advance your career!
Commotion and Vibration Awareness Certification Clamor and vibration are two regular working environment dangers that can have genuine long haul consequences for representative wellbeing. For example, exorbitant commotion can bring about tinnitus and long haul hearing misfortune, while vibration can prompt musculoskeletal wounds and nerve harm. Luckily, with determined defending measures, workers don't need to persevere through unfavorable wellbeing impacts. In this course, you will study the dangers related with commotion and vibration, and how managers and representatives the same can assume a part in making a more secure workspace. You Will Learn: Why significant degrees of work environment clamor are risky The enactment that tends to work environment clamor and how a business should deal with conform to these laws The actions a business should take to secure their laborers' hearing, including estimating commotion levels, giving defensive gear and executing wellbeing observation The two classes of work environment vibration and their belongings How bosses can deal with shield their laborers from injury brought about by unnecessary vibration, and the wellbeing and security enactment that sets out most extreme adequate vibration levels Advantages of Taking This Course: On the off chance that you work in a job that opens you to significant degrees of commotion or vibration, this course will help you find down to earth ways to protect your wellbeing On the off chance that you are a business, this course will help you meet your commitments under wellbeing and security law In the event that you have an interest in word related wellbeing, this course will give a decent prologue to two of the most well-known work environment perils On the off chance that you are in an administrative job, this course will help you watch that your group are sticking to wellbeing and security approaches and give direction if fundamental