Managing Identity in a Microsoft Enterprise

Udemy Managing Identity in a Microsoft Enterprise

Register & Get access to index
aNH5kgv.jpg


Learn about managing identities, Privileged Access, AD security best practices, PAM, MIM, Kerberos (with Hands-On Lab)

What you'll learn​

  • Identity as a Service (IaaS)
  • Securing Active Directory
  • Authentication and Authorization in Active Directory
  • Implement and verify functionality of PAM users, groups, and roles
  • Securing Privilege Access (SPA) Roadmap
  • Azure Active Directory and Azure Security Architecture
  • Implement PAM infrastructure



Requirements​

  • Experience with Windows Client administration, maintenance, and troubleshooting
  • Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, DNS, DHCP, WiFi, and cloud services concepts
  • Introductory level knowledge of Active Directory, including functions of a domain control, sign on services, and an understanding of group policy
  • Knowledge of and relevant experience in systems administration, using Windows Server 2012 R2 and 2016
  • Good foundation in accessing and using simple Windows PowerShell commands


Description​

In this course, we will examine the concepts of understanding the importance of securing identity and privileged access through combinations of encryption, cloud identity federated with on-premises identity providers (such as Active Directory), implement Privileged Access Management and Just In Time Administration to provide maximum control over privileged access in your domain, and other controls.
After completing this course, you will be able to:
• Understand Identity as a Service (IaaS), the new Control Plane
• Understand and explain Securing Privilege Access (SPA) Roadmap
• Understand Securing Active Directory
• Understand Azure Active Directory and Azure Security Architecture
• Understand Authentication and Authorization in Active Directory
• Implement PAM infrastructure
• Implement and verify functionality of PAM users, groups, and roles

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:
  • Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
  • Review questions (quizz) at the end of each section
  • Hands-on Lab at the end of the course in which you will practice at your own pace. You will have a step by step instruction file available to complete the Lab tasks like: implementing MIM, configuring Sharepoint server, installing SQL Server, configuring PAM and much more.
  • Final Exam at the end of the course - review questions to test your knowledge on the topics and concepts learned in the course
  • Links to official Microsoft resources/blogs/videos for further documentation.
This course is the 4th course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Microsoft Defender Suite, Office 365 security features and services, Microsoft Graph, Azure Active Directory Security and many more.
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.

Who this course is for:​

  • Security Administrators, Security Analysts, System Administrator
  • Any IT enthusiast who wnts to get started in cyber security and be confortable with the Microsoft Security services and capabilities
Author
TUTProfessor
Downloads
20
Views
614
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from TUTProfessor