Booking options
£41.99
£41.99
On-Demand course
10 hours 56 minutes
All levels
Learn all about Microsoft identity and Azure security the right way with tons of lab exercises. A course that aims to prepare students for the prestigious SC-300: Microsoft Identity and Access administrator exam. The course adheres to the new curriculum and objectives.
The Microsoft Identity and Access Administrator designs, implements, and operates an organization's identity and access management systems by using Azure Active Directory (Azure AD). They manage tasks such as providing secure authentication and authorization access to enterprise applications. The administrator provides seamless experiences and self-service management capabilities for all users. Adaptive access and governance are core elements to the role. This role is also responsible for troubleshooting, monitoring, and reporting for the identity and access environment. This course starts from implementing the initial configuration of Azure Active Directory. Then, create, configure, and manage identities. Followed by, implementing, and managing external identities. You will implement and manage hybrid identity, then plan and implement Azure multifactor authentication. Then manage user authentication, and plan, implement and administer conditional access. After that, you will manage Azure AD identity protection. Plan, implement and monitor the integration of enterprise apps for SSO and app registrations. Moving ahead, you will plan, implement, and manage entitlement and access reviews. Finally, you will see privileged access along with monitoring and maintaining Azure Active Directory. By the end of this course, you will gain the requisite knowledge and confidence to pass the SC-300: Microsoft Identity and Access administrator exam.
Implement initial configuration of Azure Active Directory (ADD)
Implement and manage external identities along with hybrid identity
Plan and implement Azure multifactor authentication and administer conditional access
Manage user authentication and Azure AD identity protection
Plan, implement and monitor the integration of enterprise apps for SSO
Plan, implement and manage entitlement along with access reviews
This course is for security enthusiasts who want to complete the SC-300 certification.
This is designed for those who would like to look at security from the identity perspective and want to be the identity security defenders of their organization.
Basic knowledge of Azure and its components along with information security will be helpful. Work exposure to Active Directory, its usage, and its purpose is required but not mandatory.
This is an end-to-end and comprehensive guide for those who opt to appear for the SC 300: Microsoft Identity and Access Administrator exam. The course has beautiful and well-crafted presentations and great usage of graphical material to make the understanding easier and engaging.
The course is designed and mapped exactly to the latest pattern and structure of the exam.
Implement an identity management solution, authentication, and access management solution * Implement access management for apps, plan and implement an identity governance strategy * A reference or end-to-end guide to pass your SC 300 exam from a Microsoft certified trainer
Anand Rao Nednur is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure, AWS, and GCP) but is also well-versed with IAM, security, and automation with PowerShell and Python.
In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in lab examinations and securing certifications.
Anand is also a certified seasoned professional holding several certifications and has delivered instructor-led training in several states in India as well as several countries such as the USA, Bahrain, Kenya, and UAE. He has worked as a Microsoft-certified trainer globally for major corporate clients.
1. Introduction to the Course
1. SC 300 - Course Introduction This video provides an overview of the tutor and about the SC 300 exam along with what can be expected. |
2. Module 1 - Implement an Identify Management Solution (25-30%)
1. Module 1 - Introduction This video provides an introduction to this section. |
2. Active Directory - Throw Back This video talks about Active Directory - throw back. |
3. What is Azure Active Directory This video explains about the Azure Active Directory (ADD). |
4. Who Uses Azure AD This video explains who the ones in need of Azure Active Directory are. |
5. Azure AD Roles This video explains role of Azure AD. |
6. Differences Between Azure Roles and Azure AD Roles This video explains what the differences between Azure roles and Azure AD roles are. |
7. Capabilities of Global Admin This video demonstrates the capabilities of global admin. |
8. Azure AD Roles - Lab Activity This video is a lab activity on Azure AD roles. |
9. Azure AD - Custom Roles This video explains the custom roles in Azure AD. |
10. Custom Domains This video talks about custom domains. |
11. Deleting Custom Domains This video shows how to delete custom domains. |
12. Bring Your Devices This video explains today's buzz word 'bring your devices'. |
13. Azure AD Registered Devices This video focuses on the Azure AD registered devices. |
14. Azure AD Join This video demonstrates the Azure AD join. |
15. Azure AD Domain Join - Lab This video is a lab activity on Azure AD domain join. |
16. Azure AD - Hybrid Joined This video helps hybrid joined in Azure AD. |
17. Azure AD - Administrative Units This video talks about administrative units in Azure AD. |
18. Administrative Units - Lab Activity This video is a lab activity on administrative units. |
19. Planning and Delegation - Administrative Units This video shows planning and delegation in administrative units. |
20. Plan for Delegation This video explains how to plan for delegation. |
21. Security Defaults This video explains what the security defaults are. |
22. Create Configure and Manage Identities - Introduction This video provides an introduction to create configure and manage identities. |
23. Azure Active Directory - Users This video talks about the users of Azure Active Directory. |
24. Azure Active Directory - Groups This video demonstrates the groups in Azure Active Directory. |
25. Managing Licenses This video explains how to manage licenses. |
26. License Requirements This video explains about the license requirements. |
27. Licensing Features This video explains the licensing features of Azure AD. |
28. Implement and Manage External Identities - Introduction This video provides an introduction to implement and manage external identities. |
29. Azure AD B2B Collaboration This video explains the Azure AD B2B collaboration. |
30. Azure AD B2B - Lab Activity This video is a lab activity on Azure AD B2B. |
31. Azure AD External Collaboration Settings This video demonstrates the settings of Azure AD external collaboration. |
32. Dynamic Groups This video demonstrates about the dynamic groups. |
33. Dynamic Groups - Lab This video is a lab activity on dynamic groups |
34. Azure AD B2B - Google Auth - Demo This is a demo video on Azure AD B2B - Google auth. |
35. Implement and Manage Hybrid Identity This video talks about how to implement and manage hybrid identity. |
36. Plan, Design, and Implement Azure AD Connect This video talks about how to plan, design, and implement Azure AD connect. |
37. Need for AD Connect This video explains the need for AD connect. |
38. Selecting the Right Authentication Method This video explains selecting the right authentication method. |
39. Azure AD Password Hash Synchronization (PHS) This video explains the Azure AD Password Hash Synchronization (PHS). |
40. Azure AD Pass Through Authentication (PTA) This video talks about Azure AD Pass Through Authentication (PTA). |
41. Federated Authentication This video explains the federated authentication in detail. |
42. Architecture diagrams This video explains the architecture diagrams. |
43. Azure AD Design Considerations This video focuses on the Azure AD design considerations. |
44. Azure AD Connect Components This video talks about the Azure AD connects components. |
45. PHS - How Does it Work? This video explains how PHS works. |
46. Azure AD Connect - Lab This is a lab video on Azure AD connect. |
47. Troubleshooting Sync Errors This video explains how to troubleshoot sync errors. |
48. Data Mismatch Errors - InvalidSoftMatch This video demonstrates the data mismatch errors - InvalidSoftMatch. |
49. Data Mismatch Errors - ObjectTypeMismatch This video demonstrates data mismatch errors - ObjectTypeMismatch. |
50. Duplicate Attributes - AttributeValueMustBeUnique This video focuses on duplicate attributes - AttributeValueMustBeUnique. |
51. Data Validation Failures - IdentityDataValidationFailed This video focuses on the data validation failures - IdentityDataValidationFailed. |
52. FederatedDomainChangeError This video demonstrates about the FederatedDomainChangeError. |
53. LargeObjects Error This video talks about LargeObjects Error. |
54. Azure AD Connect Health - Installation This video helps in installation of Azure AD connect health. |
55. Azure AD Connect Health This video explains about the Azure AD connect health. |
56. Self Remediation and Orphaned Objects This video explains the self-remediation and orphaned objects. |
57. Lab 1 - Assigning Roles to User Accounts This video is a lab activity on assigning roles to user accounts. |
58. Lab 2 - Tenant Properties This video is a lab activity on tenant properties. |
59. Lab 3 - Assigning Licenses to Groups This video is a lab activity on assigning licenses to groups. |
60. Lab 4 - External Collaboration Settings This video is a lab activity on the settings of external collaboration. |
61. Lab 5 - Restoring Deleted Users This video is a lab activity on restoring deleted users. |
62. Module 1 - Summary This is a summary video for this module. |
3. Module 2 - Implement an Authentication and Access Management Solution (25-30%)
1. Module 2 - Introduction This video provides an introduction to this section. |
2. Plan and Implement Azure Multifactor Authentication - Introduction This video provides an introduction to plan and implement Azure multifactor authentication. |
3. What is Azure AD MFA? This video explains the Azure AD MFA (Multi-Factor Authentication). |
4. How Multi-Factor Authentication works This video explains how multi-factor authentication works. |
5. Planning the MFA This video explains the planning of the MFA. |
6. Enforcing MFA with Conditional Access This video explains enforcing MFA with conditional access. |
7. Deciding Supported Authentication Methods This video demonstrates deciding supported authentication methods. |
8. Azure AD Authentication Methods This video explains the methods of Azure AD authentication. |
9. Monitoring and Usage This video talks about monitoring and usage of Azure AD. |
10. Manage User Authentication - Introduction This video provides an introduction on managing user authentication. |
11. Password Less Authentication - Introduction This video provides an introduction to password less authentication. |
12. Security Usability Availability of Authentication - Methods This video explains the methods of security usability availability of authentication. |
13. Configuring Fido Key for a User - Lab This video is a lab activity on configuring Fido key for a User. |
14. Windows Hello for Business This video demonstrates the Windows Hello program for Business. |
15. Windows Hello for Business Works - Key Points This video demonstrates the key points of Windows Hello for Business works. |
16. Azure AD Password - Protection This video shows how to do the protection of Azure AD password. |
17. Azure AD Password Protection - Lab Activity This video is a lab activity on Azure AD password protection. |
18. Multiple Forests and RODC - Considerations This video demonstrates what are the considerations for multiple forests and RODC (Read-Only Domain Controller). |
19. Plan, Implement, and Manage Conditional Access This video shows how to plan, implement, and manage conditional access. |
20. Security Defaults This video explains the security defaults. |
21. What Policies are Enforced and to Whom? This video shows what policies are enforced and to whom. |
22. Blocking legacy - Authentication This video talks about the authentication of blocking legacy. |
23. Conditional Access Policies - Planning This video helps you with planning conditional access policies. |
24. Conditional Access policies - Benefits This video demonstrates benefits of conditional access policies. |
25. Conditional Access policies - Components This video explains the components of conditional access policies. |
26. Conditional Access Policies - Best Practices This video explains the best practices of conditional access policies. |
27. Condition Access Policies - Most Common Policies This video explains the most common policies of conditional access policies. |
28. Conditional Access Policies - Build and Test Policies This video talks about the build and test practices of conditional access policies. |
29. Conditional Access Policies - Build and Test Policies - II This video continues with the build and test practices of conditional access policies |
30. Sign-in Risk and User Risk - Conditional Access Policy This video talks about the conditional access policy of sign-in risk and user risk. |
31. Conditional Access Policy - Blocking Locations - Lab This video is a lab activity on conditional access policy - blocking locations. |
32. Troubleshooting Using Sign-in Logs This video demonstrates Troubleshooting using sign-in logs. |
33. Device Compliance This video explains about the device compliance. |
34. Conditional Access Policy - Device Compliance - Lab This video is a lab activity on conditional access policy - device compliance. |
35. User Exclusions This video focuses on the user exclusions. |
36. Conditional Access Policy - O365 Block MFA Required - Lab This video is a lab activity on the conditional access policy - O365 block MFA required. |
37. Test and Troubleshoot Conditional Access Policies This video talks about testing and troubleshooting conditional access policies. |
38. Implement Application Controls and Application This video helps you implement application controls and application. |
39. Scenario 1 - Microsoft 365 Apps Require an Approved Client This video helps you work on the 1st scenario on Microsoft 365 apps require an approved client. |
40. Scenario 2 - Exchange Online and SharePoint Online This video helps you work on the 2nd scenario on Exchange online and SharePoint online. |
41. App Protection Policies Overview This video is an overview on app protection policies. |
42. How Can you Protect App Data-Edited This video explains how you can protect app data-edited. |
43. Manage Azure AD Identity Protection - Introduction This video provides an introduction to manage Azure AD identity protection. |
44. Manage Azure AD Identity Protection This video helps you manage Azure AD identity protection. |
45. Risk Detection And Remediation This video explains about the risk detection and remediation. |
46. Permissions This video explains about the permissions given to Azure AD. |
47. License Requirements This video explains the license requirements of Azure AD. |
48. Sign-in and User Risk Policy This video demonstrates the sign-in and user risk policy. |
49. Choosing Acceptable Risk Policy This video focuses on choosing acceptable risk policy. |
50. Prerequisites of Self Remediation This video talks about the prerequisites of self-remediation. |
51. Navigating Through the Reports - Lab This video is a lab activity on navigating through the reports. |
52. Remediate Risks and Unblock Users This video talks about remediate risks and unblock users. |
53. User Risk Remediation Options This video focuses on the user risk remediation options. |
54. Unblocking Users This video shows how to unblock users. |
55. Enable Azure AD MFA - EnterpriseWide - Lab This video is a lab activity on enabling Azure AD MFA - EnterpriseWide. |
56. Deploy SSPR - Setup This video demonstrates the setup for deploying SSPR (Self-Service Password Reset). |
57. Security Defaults - Lab This video is a lab activity on security defaults. |
58. Control User Sign-in Frequency - Lab This video is a lab activity on control user sign-in frequency. |
59. Smart Lockout Values This video explains about the smart lockout values. |
60. Configuring User and Sign-in Risk Policy This video demonstrates the configuring user and sign-in risk policy. |
61. Configure Azure AD MFA Registration Policy This video helps you configure Azure AD MFA registration policy. |
62. Module 2 Summary This is a summary video for this module. |
4. Module 3 - Implement Access Management for Apps (10-15%)
1. Module 3 - Introduction and Objectives This video provides an introduction to this section. |
2. Microsoft Cloud App Security - CASB (Cloud Access Security Broker) Solution from Microsoft This video is about Microsoft cloud app security - CASB (Cloud Access Security Broker) solution from Microsoft. |
3. MCAS Architecture This video explains about the MCAS (Microsoft loud App Security) architecture. |
4. Need to Migrate to ADFS (Active Directory Federation Services) This video explains the need to migrate to ADFS (Active Directory Federation Services). |
5. Discover ADFS Applications - Lab This video is a lab activity on discovering ADFS applications. |
6. Design and Implement App Management Roles This video demonstrates how to design and implement app management roles. |
7. Restrict Who Can Create Applications This video demonstrates how to restrict who can create applications. |
8. Configure SaaS Based Applications This video explains how to configure SaaS based applications. |
9. Implement and Monitor SSO Apps - Introduction This video provides an introduction to implement and monitor SSO (Single Sign-On) apps. |
10. Token Customizations This video talks about the token customizations. |
11. What is a consent This video explains in detail about the consent. |
12. User Consent Settings This video shows the settings of user consent. |
13. What is Azure Application Proxy This video explains about the Azure application proxy. |
14. How does Azure Application Proxy Work This video demonstrates how Azure application proxy work. |
15. Comparison of Various Protocols Used by IDPs This video shows the comparison of various protocols used by IDPs. |
16. Implement Application User Provisioning This video helps you implement application user provisioning. |
17. Manual Versus Automatic Provisioning This video talks about the manual versus automatic provisioning. |
18. SCIM (System for Common Identity Management) This video explains about the SCIM (System for Common Identity Management). |
19. SCIM Demonstration This video demonstrates about the SCIM. |
20. SCIM - Attribute Exchange This video explains the attribute exchange of SCIM. |
21. Usage, Insights and Audit Reports for Enterprise Applications This video explains the usage, insights, and audit reports for enterprise applications. |
22. Application Registrations This video focuses on the application registrations. |
23. The Need to Integrate Applications with Azure AD This video explains the need to integrate applications with Azure AD. |
24. What are Application Objects This video demonstrates about the application objects. |
25. What are Service Principals This video explains about the service principals. |
26. Relation Between Application Objects and Services Principals This video explains the relation between application objects and services principals. |
27. Roles and Permissions Required This video explains the roles and permissions required for Azure AD. |
28. Tenants - Who Can Sign-in to Your New App This video explains about the tenants - who can sign into your new app. |
29. Azure Application Registrations This video explains the Azure application registrations. |
30. Types of Permissions - Delegated and Application This video focuses on the types of permissions - delegated and application. |
31. Requesting Individual User Consent This video focuses on requesting individual user consent. |
32. Manifest File, Token, and Claims This video demonstrates about the manifest file, token, and claims. |
33. Integrate Applications with Azure AD - Lab Activity This video is a lab activity to integrate applications with Azure AD. |
34. Troubleshooting SAML This video focuses on troubleshooting SAML. |
35. Module 3 - Summary This is a summary video for this module. |
5. Module 4 - Plan and Implement an Identity Governance Strategy (25-30%)
1. Module 4 - Introduction This video provides an introduction to this section. |
2. Planning and Implementing Entitlement Management - Introduction This video provides an introduction to planning and implementing entitlement management. |
3. What is Entitlement Management This video explains entitlement management in detail. |
4. Capabilities of Entitlement Management This video explains the capabilities of entitlement management. |
5. Entitlement Management - Terminology This video explains the terminologies of entitlement management. |
6. What Resources can I Manage with Access Packages This video explains what resources you can manage with access packages. |
7. How do I Control Who Gets Access This video demonstrates how to control the given access. |
8. When Should I Use Access Packages This video explains when one should use access packages. |
9. Plan, Implement, and Manage Access Reviews - Introduction This video provides an introduction to plan, implement, and manage access reviews. |
10. Plan for Access Reviews This video explains how to plan for access reviews. |
11. What is Azure AD Identity Governance This video explains the Azure AD identity governance. |
12. Access Reviews - Lab Activity This video is a lab activity on access reviews. |
13. Planning the Scope This video discusses the planning the scope. |
14. Components of an Access Review This video talks about the Components of an access review. |
15. Planning Communications This video demonstrates about the planning communications. |
16. Access Reviews Lab Activity - I This is a first of the two-part video lab activity on access reviews. |
17. Access Reviews Lab Activity - II This is a second of the two-part video lab activity on access reviews. |
18. Managing Licenses for Access Reviews This video focuses on managing licenses for access reviews. |
19. Plan and Implement Privileged Access This video shows how to plan and implement privileged access. |
20. Azure Active Directory Privileged Identity Management This video explains the Azure Active Directory privileged identity management in detail. |
21. PIM - Stakeholders This video explains stakeholders of PIM (Privileged Identity Management). |
22. Principle of Least Privilege - Best Practices for PIM This video explains the principle of least privilege and best practices for PIM. |
23. Decide the Roles that Should be Protected by PIM This video helps to decide the roles that should be protected by PIM. |
24. Decide What to Protect with PIM This video helps to decide what to protect with PIM. |
25. Assign Azure AD Roles in Privileged Identity Management - Lab Activity This video is a lab activity on assigning Azure AD roles in privileged identity management. |
26. Configure PIM for Azure Resources This video helps configure PIM for Azure resources. |
27. Discovering Resources to Manage This video focusses on discovering resources to manage. |
28. Audit History - Lab Activity This video is a lab activity on audit history. |
29. Creating and Managing Emergency Access Accounts - I This is first of the two-part video that focuses on creating and managing emergency access accounts. |
30. Creating and Managing Emergency Access Accounts - II This is second of the two-part video that focuses on creating and managing emergency access accounts. |
31. Exclusions This video demonstrates the exclusions feature. |
32. Validating Emergency Accounts This video demonstrates how to validate emergency accounts. |
33. Monitor and Maintain Azure AD - Introduction This video provides an introduction to monitor and maintain Azure AD. |
34. Analyze Sign-in and Troubleshoot Access Issues - Components This video talks about the components to analyze sign-in and troubleshoot access issues. |
35. Access and Licenses This video talks about the access and licenses. |
36. Sign-in Report - Lab Activity This video is a lab activity on sign in report. |
37. Sign in Data - More Information This video explains sign-in data in detail. |
38. Audit Log - Users and Groups This video talks about the users and groups in audit log. |
39. Exporting Logs to Third Party Security Solutions This video explains exporting logs to third party security solutions. |
40. Integration Recommendations This video talks about integration recommendations. |
41. Analyze Azure AD Workbooks and Reporting This video focuses on analyzing Azure AD workbooks and reporting. |
42. Module 4 - Summary This is a summary video for this module. |