Booking options
£2,380
+ VAT£2,380
+ VATDelivered Online
5 days
All levels
Duration
4 Days
24 CPD hours
This course is intended for
This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization.
The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.
Prerequisites
SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals
AZ-104T00 - Microsoft Azure Administrator
Explain the identity landscape
Explore zero trust with identity
Discuss identity as a control plane
Explore why we have identity
Define identity administration
Contrast decentralized identity with central identity systems
Discuss identity management solutions
Explain Microsoft Entra Business to Business
Compare Microsoft identity providers
Define identity licensing
Explore authentication
Discuss authorization
Explain auditing in identity
Configure company brand
Configure and manage Microsoft Entra roles
Configure delegation by using administrative units
Analyze Microsoft Entra role permissions
Configure and manage custom domains
Configure tenant-wide setting
Create, configure, and manage users
Create, configure, and manage groups
Configure and manage device registration
Manage licenses
Create custom security attributes
Explore automatic user creation
Describe guest access and Business to Business accounts
Manage external collaboration
Invite external users - individually and in bulk
Demo - manage guest users in Microsoft Entra ID
Manage external user accounts in Microsoft Entra ID
Manage external users in Microsoft 365 workloads
Implement and manage Microsoft Entra Verified ID
Configure identity providers
Implement cross-tenant access controls
Plan, design, and implement Microsoft Entra Connect
Implement manage password hash synchronization (PHS)
Implement manage pass-through authentication (PTA)
Demo - Manage pass-through authentication and seamless single sign-on (SSO)
Implement and manage federation
Trouble-shoot synchronization errors
Implement Microsoft Entra Connect Health
Manage Microsoft Entra Health
What is Microsoft Entra multifactor authentication?
Plan your multifactor authentication deployment
Configure multi-factor authentication methods
Administer FIDO2 and passwordless authentication methods
Explore Authenticator app and OATH tokens
Implement an authentication solution based on Windows Hello for Business
Deploy and manage password protection
Configure smart lockout thresholds
Implement Kerberos and certificate-based authentication in Microsoft Entra ID
Configure Microsoft Entra user authentication for virtual machines
Plan security defaults
Plan Conditional Access policies
Implement Conditional Access policy controls and assignments
Test and troubleshoot Conditional Access policies
Implement application controls
Implement session management
Implement continuous access evaluation
Review identity protection basics
Implement and manage user risk policy
Monitor, investigate, and remediate elevated risky users
Implement security for workload identities
Explore Microsoft Defender for Identity
Assign Azure roles
Configure custom Azure roles
Create and configure managed identities
Access Azure resources with managed identities
Analyze Azure role permissions
Configure Azure Key Vault RBAC policies
Retrieve objects from Azure Key Vault
Explore Microsoft Entra Permissions Management
Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report
Configure connectors to apps
Design and implement app management roles
Configure preintegrated gallery SaaS apps
Implement and manage policies for OAuth apps
Implement token customizations
Implement and configure consent settings
Integrate on-premises apps with Microsoft Entra application proxy
Integrate custom SaaS apps for single sign-on
Implement application-based user provisioning
Monitor and audit access to Microsoft Entra integrated enterprise applications
Create and manage application collections
Plan your line of business application registration strategy
Implement application registration
Register an application
Configure permission for an application
Grant tenant-wide admin consent to applications
Implement application authorization
Manage and monitor application by using app governance
Define access packages
Configure entitlement management
Configure and manage connected organizations
Review per-user entitlements
Plan for access reviews
Create access reviews for groups and apps
Create and configure access review programs
Monitor access review findings
Automate access review management tasks
Configure recurring access reviews
Define a privileged access strategy for administrative users
Configure Privileged Identity Management for Azure resources
Plan and configure Privileged Access Groups
Analyze Privileged Identity Management audit history and reports
Create and manage emergency access accounts
Analyze and investigate sign-in logs to troubleshoot access issues
Review and monitor Microsoft Entra audit logs
Export logs to third-party security information and event management system
Analyze Microsoft Entra workbooks and reporting
Monitor security posture with Identity Secure Score
Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....