YoVDO

AZ-500: Manage Identity and Access

Offered By: Microsoft via Microsoft Learn

Tags

AZ-500: Microsoft Azure Security Technologies Courses Azure Active Directory Courses Role-Based Access Control Courses Multi-Factor Authentication Courses Passwordless Authentication Courses Privileged Identity Management Courses Azure Policies Courses Zero Trust Security Courses

Course Description

Overview

  • Module 1: Explore how to securely configure and administer your Azure Active Directory instance.
  • By the end of this module, you will be able to:

    • Configure Azure AD and Azure AD Domain Services for security
    • Create users and groups that enable secure usage of your tenant
    • Use MFA to protect user's identities
    • Configure passwordless security options
  • Module 2: Explore how to deploy and configure Azure AD Connect to create a hybrid identity solution for your company.
  • By the end of this module, you will be able to:

    • Deploy Azure AD Connect
    • Pick and configure that best authentication option for your security needs
    • Configure password writeback
  • Module 3: Protect your identities in Azure AD once they are set up using Conditional Access, MFA, access reviews, and other capabilities.
  • By the end of this module, you will be able to:

    • Deploy and configure Identity Protection
    • Configure MFA for users, groups, and applications
    • Create Conditional Access policies to ensure your security
    • Create and follow an access review process
  • Module 4: Ensure that your privileged identities have extra protection and are accessed only with the least amount of access needed to do the job.
  • By the end of this module, you will be able to:

    • Describe Zero Trust and how it impacts security
    • Configure and deploy roles using Privileged Identity Management (PIM)
    • Evaluate the usefulness of each PIM setting as it relates to your security goals
  • Module 5: Learn to use RBAC and Azure Policy to limit access to your Azure solutions, and determine which method is right for your security goals.
  • By the end of this module, you will be able to:

    • Explain the shared responsibility model and how it impacts your security configuration
    • Create Azure policies to protect your solutions
    • Configure and deploy access to services using RBAC

Syllabus

  • Module 1: Secure Azure solutions with Azure Active Directory
    • Introduction
    • Explore Azure Active Directory features
    • Compare Azure AD vs Active Directory Domain Services
    • Investigate roles in Azure AD
    • Deploy Azure AD Domain Services
    • Create and manage Azure AD users
    • Manage users with Azure AD groups
    • Configure Azure AD administrative units
    • Implement passwordless authentication
    • Explore Try-This exercises
    • Knowledge check
    • Summary
  • Module 2: Implement Hybrid identity
    • Introduction
    • Deploy Azure AD connect
    • Explore authentication options
    • Configure Password Hash Synchronization (PHS)
    • Implement Pass-through Authentication (PTA)
    • Deploy Federation with Azure AD
    • Explore the authentication decision tree
    • Configure password writeback
    • Knowledge check
    • Summary
  • Module 3: Deploy Azure AD identity protection
    • Introduction
    • Explore Azure AD identity protection
    • Configure risk event detections
    • Implement user risk policy
    • Implement sign-in risk policy
    • Deploy multifactor authentication in Azure
    • Explore multifactor authentication settings
    • Enable multifactor authentication
    • Implement Azure AD conditional access
    • Configure conditional access conditions
    • Implement access reviews
    • Explore try-this exercises
    • Knowledge check
    • Summary
  • Module 4: Configure Azure AD privileged identity management
    • Introduction
    • Explore the zero trust model
    • Review the evolution of identity management
    • Deploy Azure AD privileged identity management
    • Configure privileged identity management scope
    • Implement privileged identity management onboarding
    • Explore privileged identity management configuration settings
    • Implement a privileged identity management workflow
    • Explore Try-This exercises
    • Knowledge check
    • Summary
  • Module 5: Design an enterprise governance strategy
    • Introduction
    • Review the shared responsibility model
    • Explore the Azure cloud security advantages
    • Review Azure hierarchy of systems
    • Configure Azure policies
    • Enable Azure role-based access control (RBAC)
    • Compare and contrast Azure RBAC vs Azure policies
    • Configure built-in roles
    • Enable resource locks
    • Deploy Azure blueprints
    • Design an Azure subscription management plan
    • Explore Try-This exercises
    • Knowledge check
    • Summary

Tags

Related Courses

AKS Deep Dive
A Cloud Guru
AZ-303 Part 1 - Implement and Monitor Azure Infrastructure
A Cloud Guru
AZ-500: Microsoft Azure Security Technologies (LA)
A Cloud Guru
Azure Active Directory Deep Dive
A Cloud Guru
Microsoft Azure Architect Technologies - Exam AZ-300
A Cloud Guru