YoVDO

AZ-500: Manage Identity and Access

Offered By: Microsoft via Microsoft Learn

Tags

AZ-500: Microsoft Azure Security Technologies Courses Azure Active Directory Courses Role-Based Access Control Courses Multi-Factor Authentication Courses Passwordless Authentication Courses Privileged Identity Management Courses Azure Policies Courses Zero Trust Security Courses

Course Description

Overview

  • Module 1: Explore how to securely configure and administer your Azure Active Directory instance.
  • By the end of this module, you will be able to:

    • Configure Azure AD and Azure AD Domain Services for security
    • Create users and groups that enable secure usage of your tenant
    • Use MFA to protect user's identities
    • Configure passwordless security options
  • Module 2: Explore how to deploy and configure Azure AD Connect to create a hybrid identity solution for your company.
  • By the end of this module, you will be able to:

    • Deploy Azure AD Connect
    • Pick and configure that best authentication option for your security needs
    • Configure password writeback
  • Module 3: Protect your identities in Azure AD once they are set up using Conditional Access, MFA, access reviews, and other capabilities.
  • By the end of this module, you will be able to:

    • Deploy and configure Identity Protection
    • Configure MFA for users, groups, and applications
    • Create Conditional Access policies to ensure your security
    • Create and follow an access review process
  • Module 4: Ensure that your privileged identities have extra protection and are accessed only with the least amount of access needed to do the job.
  • By the end of this module, you will be able to:

    • Describe Zero Trust and how it impacts security
    • Configure and deploy roles using Privileged Identity Management (PIM)
    • Evaluate the usefulness of each PIM setting as it relates to your security goals
  • Module 5: Learn to use RBAC and Azure Policy to limit access to your Azure solutions, and determine which method is right for your security goals.
  • By the end of this module, you will be able to:

    • Explain the shared responsibility model and how it impacts your security configuration
    • Create Azure policies to protect your solutions
    • Configure and deploy access to services using RBAC

Syllabus

  • Module 1: Secure Azure solutions with Azure Active Directory
    • Introduction
    • Explore Azure Active Directory features
    • Compare Azure AD vs Active Directory Domain Services
    • Investigate roles in Azure AD
    • Deploy Azure AD Domain Services
    • Create and manage Azure AD users
    • Manage users with Azure AD groups
    • Configure Azure AD administrative units
    • Implement passwordless authentication
    • Explore Try-This exercises
    • Knowledge check
    • Summary
  • Module 2: Implement Hybrid identity
    • Introduction
    • Deploy Azure AD connect
    • Explore authentication options
    • Configure Password Hash Synchronization (PHS)
    • Implement Pass-through Authentication (PTA)
    • Deploy Federation with Azure AD
    • Explore the authentication decision tree
    • Configure password writeback
    • Knowledge check
    • Summary
  • Module 3: Deploy Azure AD identity protection
    • Introduction
    • Explore Azure AD identity protection
    • Configure risk event detections
    • Implement user risk policy
    • Implement sign-in risk policy
    • Deploy multifactor authentication in Azure
    • Explore multifactor authentication settings
    • Enable multifactor authentication
    • Implement Azure AD conditional access
    • Configure conditional access conditions
    • Implement access reviews
    • Explore try-this exercises
    • Knowledge check
    • Summary
  • Module 4: Configure Azure AD privileged identity management
    • Introduction
    • Explore the zero trust model
    • Review the evolution of identity management
    • Deploy Azure AD privileged identity management
    • Configure privileged identity management scope
    • Implement privileged identity management onboarding
    • Explore privileged identity management configuration settings
    • Implement a privileged identity management workflow
    • Explore Try-This exercises
    • Knowledge check
    • Summary
  • Module 5: Design an enterprise governance strategy
    • Introduction
    • Review the shared responsibility model
    • Explore the Azure cloud security advantages
    • Review Azure hierarchy of systems
    • Configure Azure policies
    • Enable Azure role-based access control (RBAC)
    • Compare and contrast Azure RBAC vs Azure policies
    • Configure built-in roles
    • Enable resource locks
    • Deploy Azure blueprints
    • Design an Azure subscription management plan
    • Explore Try-This exercises
    • Knowledge check
    • Summary

Tags

Related Courses

Windows Server 2016 Security Features
Microsoft via edX
Managing Privileged Identities in Windows Server 2016
Pluralsight
Configuring Microsoft Azure Active Directory Privileged Identity Management
Pluralsight
Managing Microsoft Azure Active Directory
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 1 Manage Identity and Access
LinkedIn Learning