Microsoft Identity and Access: Implementing an Identity Governance Strategy
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to manage entitlements, perform access reviews, set up PIM, and monitor your AAD via logs.
Security and governance should be at the forefront of every responsible IT administrator. In this course, Implement an Identity Governance Strategy, you’ll learn to manage and govern your Azure Active Directory or AAD. First, you’ll explore entitlement management where we will understand catalogs, access packages, and user lifecycle management. Next, you’ll discover important concepts such as access reviews and privileged identity management. Finally, you’ll learn how to how to make the best use of the logs that AAD produces. When you’re finished with this course, you’ll have the skills and knowledge of implement an identity governance strategy needed to govern and manage your AAD.
Security and governance should be at the forefront of every responsible IT administrator. In this course, Implement an Identity Governance Strategy, you’ll learn to manage and govern your Azure Active Directory or AAD. First, you’ll explore entitlement management where we will understand catalogs, access packages, and user lifecycle management. Next, you’ll discover important concepts such as access reviews and privileged identity management. Finally, you’ll learn how to how to make the best use of the logs that AAD produces. When you’re finished with this course, you’ll have the skills and knowledge of implement an identity governance strategy needed to govern and manage your AAD.
Taught by
Sahil Malik
Related Courses
Responsabilidad Social Corporativa y su impacto sobre la Gestión de la Tecnología de la InformaciónOpen Education Consortium (OEC) via edX Planning & Developing Governance for Digital Transformation
Microsoft via edX IS/IT Governance
University of Minnesota via Coursera Healthcare Data Quality and Governance
University of California, Davis via Coursera Introduction to Cybersecurity Tools & Cyberattacks
IBM via Coursera