Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who are responsible for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to have a fairly broad understanding of several on-premises technologies such as Domain Name System (DNS) and Active Directory Domain Services (AD DS). In addition, they should have a general understanding of Microsoft Exchange Server, Microsoft Teams, and Microsoft SharePoint. Overview Plan and provision Office 365 Manage Users and Groups in Office 365 Deploy and Configure Tools and Applications for Office 365 Plan and Manage Exchange Online Plan and Manage SharePoint Online Plan and Manage Microsoft Teams Plan and Manage other Office 365 Services Implement Security and Compliance in Office 365 Report, Monitor and Troubleshoot Office 365 This five-day course describes how to set up, configure and manage an Office 365 tenant including identities, and the core services of Microsoft 365. In this five-day course, you will learn how to plan the configuration of an Office 365 tenant including integration with existing user identities; plan, configure and manage core services; and report on key metrics. Although this course and the associated labs are written for Office 365 with Windows 11, the skills taught will also be backwards compatible with Windows 10. This course is based on the features available in the Office 365 E3 license as these are the core features in Office 365 and Microsoft 365 plans. 1 - Planning and Provisioning Office 365 Overview of Office 365 Core Services of Office 365 Requirements for an Office 365 Tenant Planning a Pilot and Deployment Creating an Office 365 Tenant Adding Custom Domains and Managing DNS Settings Lab: Provisioning Office 365 2 - Managing Users and Groups in Office 365 Managing User Accounts and Licences Managing Passwords and Authentication Create and Managing the Different Types of Groups in Office 365 Managing Users and Groups with PowerShell Managing Users and Groups in the Azure AD Admin Center Role Based Access and Administrative Roles Planning and Configuring Directory Synchronization Lab: Managing Users and Groups in Office 365 Lab: Planning and Configuring Directory Synchronisation 3 - Deploying and Configuring Tools and Applications for Office 365 Planning Network Configuration for Office 365 Tools and Applications Using the Office Configuration Tool Click to Run Installation Use and Control Managing Centralized Deployment of Tools, Applications and Add-ins Reporting Lab: Deploying and Configuring Tools and Applications for Office 365 4 - Planning and Managing Exchange Online What is Exchange Online Managing Exchange Online Mailboxes Managing Office 365 Groups in Exchange Online Configuring Exchange Online Permissions Managing Exchange Online using PowerShell Plan and Configure Mail Flow Plan and Configure Email Protection Lab: Planning and Managing Exchange Online 5 - Planning and Managing SharePoint Online What is SharePoint Online Understanding the relationship between SharePoint, OneDrive, Teams, and Office 365 Groups SharePoint Online Architecture Configure SharePoint Online Configure and Control External Sharing Managing SharePoint Online Site Collections Managing SharePoint Online using PowerShell Lab: Planning and Managing SharePoint Online 6 - Planning and Managing Microsoft Teams What is Microsoft Teams How Microsoft Teams integrates with other Office 365 Services Create and Manage Organization Wide Settings Create, Manage and Assign Microsoft Teams Policies Plan and Configure External and Guest Access Managing Microsoft Teams using PowerShell Lab: Planning and Managing Microsoft Teams 7 - Planning and Managing Other Office 365 Services Yammer Planner Visio Bookings Delve Forms Power Platform Stream Sway Viva Scheduler Add-ins, including Find Time and Junk Reporter Lab: Planning and Managing Office 365 Services 8 - Security and Compliance in Office 365 Overview of Security and Compliance Features in Office 365 Extending Security and compliance Features with Additional Licences Using the Microsoft Defender Portal and Secure Score Using the Office 365 Compliance Portal and Compliance Score Plan and Configure Retention Labels and Policies Plan and Configure Data Loss Prevention Policies Create and Assign Sensitivity Labels Configure Safe Attachments and Safe Links Policies Plan and Configure Multi Factor Authentication Lab: Configure Security and Compliance in Office 365 9 - Reporting, Monitoring and Troubleshooting Office 365 Monitoring Office 365 Service Health Troubleshooting Administrative Access in Office 365 Troubleshoot Directory Synchronization Troubleshooting Exchange Online Troubleshooting SharePoint Online Troubleshooting Microsoft Teams Troubleshooting Office 365 Security and Compliance Lab: Reporting, Monitoring and Troubleshooting in Office 365
Developing Leadership and Emotional Intelligence Skills course is designed to empower participants with the essential leadership competencies and emotional intelligence skills needed to excel in today's dynamic workplace. Through a blend of theoretical frameworks, interactive exercises, and practical applications, this course aims to enhance participants' self-awareness, interpersonal relationships, and leadership capabilities, ultimately enabling them to inspire and motivate others towards achieving organizational goals.
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site 2 - Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot 3 - Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections 4 - Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations 5 - Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence 6 - Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points 7 - Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying and managing Windows apps 8 - Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates 9 - Implementing Defender Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies 10 - Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access 11 - Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service 12 - Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance and Management Insights Backing up and recovering a Configuration Manager site Updating the Configuration Manager infrastructure 13 - What?s new in Microsoft Endpoint Configuration Manager Whats new in Microsoft Endpoint Manager covering each semi annual release Additional course details: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for professional web developers who use Microsoft Visual Studio in an individual-based or team-based, small-sized to large development environment. Candidates for this course are interested in developing advanced web applications and want to manage the rendered HTML comprehensively. They want to create websites that separate the user interface, data access, and application logic. Overview Describe the Microsoft Web Technologies stack and select an appropriate technology to use to develop any given application. Design the architecture and implementation of a web application that will meet a set of functional requirements, user interface requirements, and address business models. Configure the pipeline of ASP.NET Core web applications using middleware, and leverage dependency injection across applications. Develop a web application that uses the ASP.NET Core routing engine to present friendly URLs and a logical navigation hierarchy to users. Create Views in an application that display and edit data and interact with Models and Controllers. Connect an ASP.NET Core application to a database using Entity Framework Core. Implement a consistent look and feel across an entire web application. Write JavaScript code that runs on the client-side and utilizes the jQuery script library to optimize the responsiveness of an web application. Add client side packages and configure Task Runners. Run unit tests and debugging tools against a web application in Visual Studio 2022. Write an application that authenticates and authorizes users to access content securely using Identity. Build an application that resists malicious attacks. Use caching to accelerate responses to user requests. Use SignalR to enable two-way communication between client and server. Describe what a Web API is and why developers might add a Web API to an application. Describe how to package and deploy an ASP.NET Core web application from a development computer to a web server. In this 5-day course, professional web developers will learn to develop advanced ASP.NET Core applications using .NET tools and technologies. The focus will be on coding activities that enhance the performance and scalability of the Web site application. Module 1: Exploring ASP.NET Core Introducing of Microsoft Web Technologies Getting Started with Razor Pages in ASP.NET Core Introducing ASP.NET Core MVC Module 2: Designing ASP.NET Core MVC Web Applications Planning in the Project Design Phase Designing Models, Controllers and Views Module 3: Configure Middleware and Services in ASP.NET Core Configuring Middlewares Configuring Services Module 4: Developing Controllers Writing Controllers and Actions Configuring Routes Writing Action Filters Module 5: Developing Views Creating Views with Razor Syntax Using HTML Helpers and Tag Helpers Reusing Code in Views Module 6: Developing Models Creating MVC Models Working with Forms Validating User Input Module 7: Using Entity Framework Core in ASP.NET Core Introduction to Entity Framework Core Working with Entity Framework Core Use Entity Framework Core to connect to Microsoft SQL Server Module 8: Using Layouts, CSS and JavaScript in ASP.NET Core Using Layouts Using CSS and JavaScript Using JavaScript Libraries Module 9: Client-Side Development Applying Styles and Responsive Design Using Task Runners Looking at ASP.NET Core Blazor Module 10: Testing and Troubleshooting Testing ASP.NET Core Applications Implementing an Exception Handling Strategy Logging ASP.NET Core Applications Module 11: Managing Security Authentication in ASP.NET Core Authorization in ASP.NET Core Defending from Common Attack Module 12: Performance and Communication Implementing a Caching Strategy Managing State Supporting Two-way Communication Module 13: Implementing Web APIs Introducing Web APIs Developing a Web API Calling a Web API Module 14: Hosting and Deployment Hosting and Deploying On-premises Deploying to Microsoft Azure Looking at Microsoft Azure Fundamentals
Usually once a month, the 2024 dates are:- 2024 Saturday Classes: May 11th June 8th July 6th & 27th Sept. 7th Oct. 12th Nov. 9th Dec. 7th * Notes on 2-Person Classes Both the Tuesday 8.05pm class in Euston, and the Saturday courses in Westminster will focus on: Learning how to relax The use of the movements in Tai Chi Form (applications) Applying the movements so that you maintain your own integrity (centre of balance) Finding & working from the centre/core/Dantian Developing the sense of ‘feel’ when working with someone else Connecting your centre to your hands Turning a partner’s energy around so as to unbalance him/her We will also work on a 2-Person Tai Chi Form in order to understand applications of moves Posture, Balance, and Intention. By far the most important part of these classes is developing the ability to sense and be aware not only of one's own posture, balance, and intention, but also that of another person. Relaxation. Many of the exercises are ultimately about the ability to act from a very relaxed body and mind, so that (for example) if someone pushes towards you, you don't 'lock up' (the instinctive reaction), but instead you sense the push, and divert it. Initially it is this 'locking up' (which in effect makes you unable to move), that we are working on undoing. This is about getting more control of your sympathetic nervous system (fight & flight), the 'stress' system, so that in difficult situations, you 'roll with the punches' better.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites AWS Cloud Practitioner Essentials classroom or digital training, or Working knowledge of distributed systems Familiarity with general networking concepts Familiarity with IP addressing Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 0 - Introductions & Course Map review Welcome and course outcomes 1 - Architecting Fundamentals Review AWS Services and Infrastructure Infrastructure Models AWS API Tools Securing your infrastructure The Well-Architected Framework Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - Account Security Security Principals Identity and Resource-Based Policies Account Federation Introduction to Managing Multiple Accounts 3 - Networking, Part 1 IP Addressing Amazon Virtual Private Cloud (VPC), Patterns and Quotas Routing Internet Access Network Access Control Lists (NACLs) Security Groups 4 - Compute Amazon Elastic Cloud Compute (EC2) EC2 Instances and Instance Selection High Performance Computing on AWS Lambda and EC2, When to Use Which Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - Storage Amazon S3, Security, Versioning and Storage Classes Shared File Systems Data Migration Tools 6 - Database Services AWS Database Solutions Amazon Relational Database Services (RDS) DynamoDB, Features and Use Cases Redshift, Features, Use Cases and Comparison with RDS Caching and Migrating Data Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - Monitoring and Scaling Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs Invoking Events 8 - Automation CloudFormation AWS Systems Manager 9 - Containers Microservices Monitoring Microservices with X-Ray Containers 10 - Networking Part 2 VPC Peering & Endpoints Transit Gateway Hybrid Networking Route 53 11 - Serverless Architecture Amazon API Gateway Amazon SQS, Amazon SNS Amazon Kinesis Data Streams & Kinesis Firehose Step Functions Hands-on Lab: Build a Serverless Architecture 12 - Edge Services Edge Fundamentals Amazon CloudFront AWS Global Accelerator AWS Web Application Firewall (WAF), DDoS and Firewall Manager AWS Outposts Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - Backup and Recovery Planning for Disaster Recovery AWS Backup Recovery Strategie Additional course details: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This half day course is designed for voluntary and community organisations and those involved in community development who need to write funding applications and want to ensure that their bids are clear, focussed and meet the funders’ criteria.
Get started with creating JavaFX applications using TornadoFX - A lightweight JavaFX framework for Kotlin
Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score