YoVDO

Azure Identity and Access Fundamentals

Offered By: Pluralsight

Tags

Microsoft Entra ID Courses Azure Active Directory Courses Authorization Courses Cloud Security Courses Role-Based Access Control Courses Multi-Factor Authentication Courses Identity and Access Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
You absolutely need control over who and what can access your valuable Azure cloud resources. This course will teach you how to confidently manage and secure access to your Azure environment using Microsoft Entra ID and role-based access control.



Do you need to manage access to your Azure resources? In this course, Azure Identity and Access Fundamentals, you'll learn to confidently control and secure access to your Azure environment. First, you'll explore the fundamental concepts of identity and access management, understanding the principles of authentication and authorization. Next, you'll discover how to configure Microsoft Entra ID (formerly Azure Active Directory) tenants, create users and groups, and manage their access to resources. Then, you'll investigate the powerful capabilities of role-based access control (RBAC), learning how to assign granular permissions to users and groups. Finally, you'll learn how to enhance security by implementing multi-factor authentication (MFA), adding an extra layer of protection to your Azure environment. When you're finished with this course, you'll have the skills and knowledge of Azure identity and access needed to create a secure, well-managed, and compliant cloud environment.

Syllabus

  • Course Overview 1min
  • Unlock Azure Identity and Access 16mins

Taught by

Joseph Lowery

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera