Implementing Microsoft Azure Privileged Identity Management
Offered By: Pluralsight
Course Description
Overview
Azure Active Directory Privileged Identity Management simplifies monitoring, controlling, and management of users' access on different Azure resources. In this course, you will learn how to enforce security governance using PIM.
Azure AD Privileged Identity Management allows you to monitor, analyze, and govern privileged access to meet organizational compliance and security needs. In this course, Implementing Microsoft Azure Privileged Identity Management, you will first learn how to implement Microsoft Azure AD Privileged Identity Management (Azure AD PIM). Then, you will discover how to manage and mitigate the threats resulting from unmanaged and vulnerable high privileged identities. Finally, you’ll explore how to configure the elevated privilege request and approval workflows for Azure AD PIM. By the end of this course, you will be equipped with the knowledge necessary to efficiently manage and govern Azure AD PIM to meet the security and compliance requirements of your organization as per Microsoft’s recommended best practices.
Azure AD Privileged Identity Management allows you to monitor, analyze, and govern privileged access to meet organizational compliance and security needs. In this course, Implementing Microsoft Azure Privileged Identity Management, you will first learn how to implement Microsoft Azure AD Privileged Identity Management (Azure AD PIM). Then, you will discover how to manage and mitigate the threats resulting from unmanaged and vulnerable high privileged identities. Finally, you’ll explore how to configure the elevated privilege request and approval workflows for Azure AD PIM. By the end of this course, you will be equipped with the knowledge necessary to efficiently manage and govern Azure AD PIM to meet the security and compliance requirements of your organization as per Microsoft’s recommended best practices.
Syllabus
- Course Overview 1min
- Understanding Azure AD Privileged Identity Management 33mins
- Activating and Configuring Privileged Identity Management 61mins
- Configuring Privileged Access for Users 30mins
- Configuring Workflows for Privileged Access Requests 17mins
Taught by
Neeraj Kumar
Related Courses
AWS Lambda Function Security & Defense in Depth (Korean)Amazon Web Services via AWS Skill Builder Cybersecurity for Business
University of Colorado System via Coursera Cisco Network Security: Core Security Concepts
LinkedIn Learning Threat Modeling: Spoofing In Depth
LinkedIn Learning SC-200: Mitigate threats using Microsoft Defender for Cloud
Microsoft via Microsoft Learn