Configuring Azure Active Directory for Microsoft Azure Workloads
Offered By: Pluralsight
Course Description
Overview
In this course, Configuring Azure AD for Microsoft Azure Workloads, you learn how to secure Azure Active Directory for use as an identity store for your Azure-based cloud applications. This course's audience is the Microsoft Azure security engineer.
You are a Microsoft Azure security engineer tasked with managing Azure Active Directory. In this course, Configuring Azure Active Directory for Microsoft Azure Workloads, you learn how to secure Azure AD for use as an identity store for your Azure-based cloud applications. First, you will discover how to create and configure Azure AD user and group accounts. Next, you will learn how to configure authentication methods, including deploying a hybrid cloud with Azure AD Connect. Finally, you will explore how to create and manage Azure AD application registrations. When you are finished with this course, you will have the skills and knowledge needed to provide security oversight of Azure AD.
You are a Microsoft Azure security engineer tasked with managing Azure Active Directory. In this course, Configuring Azure Active Directory for Microsoft Azure Workloads, you learn how to secure Azure AD for use as an identity store for your Azure-based cloud applications. First, you will discover how to create and configure Azure AD user and group accounts. Next, you will learn how to configure authentication methods, including deploying a hybrid cloud with Azure AD Connect. Finally, you will explore how to create and manage Azure AD application registrations. When you are finished with this course, you will have the skills and knowledge needed to provide security oversight of Azure AD.
Taught by
Tim Warner
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera