Course Details
Topic 1 Explore identity in Microsoft Entra ID
- Explain the identity landscape
- Explore zero trust with identity
- Discuss identity as a control plane
- Explore why we have identity
- Define identity administration
- Contrast decentralized identity with central identity systems
- Discuss identity management solutions
- Explain Microsoft Entra Business to Business
- Compare Microsoft identity providers
- Define identity licensing
- Explore authentication
- Discuss authorization
- Explain auditing in identity
Topic 2 Implement initial configuration of Microsoft Entra ID
- Configure company brand
- Configure and manage Microsoft Entra roles
- Exercise manage users roles
- Configure delegation by using administrative units
- Analyze Microsoft Entra role permissions
- Configure and manage custom domains
- Configure tenant-wide setting
Topic 3 Create, configure, and manage identities
- Create, configure, and manage users
- Create, configure, and manage groups
- Configure and manage device registration
- Manage licenses
- Create custom security attributes
- Explore automatic user creation
Topic 4 Implement and manage external identities
- Describe guest access and Business to Business accounts
- Manage external collaboration
- Invite external users - individually and in bulk
- Manage external user accounts in Microsoft Entra ID
- Manage external users in Microsoft 365 workloads
- Implement and manage Microsoft Entra Verified ID
- Configure identity providers
- Implement cross-tenant access controls
Topic 5 Implement and manage hybrid identity
- Plan, design, and implement Microsoft Entra Connect
- Implement manage password hash synchronization (PHS)
- Implement manage pass-through authentication (PTA)
- Implement and manage federation
- Trouble-shoot synchronization errors
- Implement Microsoft Entra Connect Health
- Manage Microsoft Entra Health
Topic 6 Secure Microsoft Entra users with multifactor authentication
- What is Microsoft Entra multifactor authentication?
- Plan your multifactor authentication deployment
- Configure multi-factor authentication methods
Topic 7 Manage user authentication
- Administer FIDO2 and passwordless authentication methods
- Explore Authenticator app and OATH tokens
- Implement an authentication solution based on Windows Hello for Business
- Deploy and manage password protection
- Configure smart lockout thresholds
- Implement Kerberos and certificate-based authentication in Microsoft Entra ID
- Configure Microsoft Entra user authentication for virtual machines
Topic 8 Plan, implement, and administer Conditional Access
- Plan security defaults
- Plan Conditional Access policies
- Implement Conditional Access policy controls and assignments
- Test and troubleshoot Conditional Access policies
- Implement application controls
- Implement session management
- Implement continuous access evaluation
Topic 9 Manage Microsoft Entra Identity Protection
- Review identity protection basics
- Implement and manage user risk policy
- Monitor, investigate, and remediate elevated risky users
- Implement security for workload identities
- Explore Microsoft Defender for Identity
Topic 10 Implement access management for Azure resources
- Assign Azure roles
- Configure custom Azure roles
- Create and configure managed identities
- Access Azure resources with managed identities
- Analyze Azure role permissions
- Configure Azure Key Vault RBAC policies
- Retrieve objects from Azure Key Vault
- Explore Microsoft Entra Permissions Management
Topic 11 Plan and design the integration of enterprise apps for SSO
- Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report
- Configure connectors to apps
- Design and implement app management roles
- Configure preintegrated gallery SaaS apps
- Implement and manage policies for OAuth apps
Topic 12 Implement and monitor the integration of enterprise apps for SSO
- Implement token customizations
- Implement and configure consent settings
- Integrate on-premises apps with Microsoft Entra application proxy
- Integrate custom SaaS apps for single sign-on
- Implement application-based user provisioning
- Monitor and audit access to Microsoft Entra integrated enterprise applications
- Create and manage application collections
Topic 13 Implement app registration
- Plan your line of business application registration strategy
- Implement application registration
- Register an application
- Configure permission for an application
- Grant tenant-wide admin consent to applications
- Implement application authorization
- Manage and monitor application by using app governance
Topic 14 Plan and implement entitlement management
- Define access packages
- Configure entitlement management
- Configure and manage connected organizations
- Review per-user entitlements
Topic 15 Plan, implement, and manage access review
- Plan for access reviews
- Create access reviews for groups and apps
- Create and configure access review programs
- Monitor access review findings
- Automate access review management tasks
- Configure recurring access reviews
Topic 16 Plan and implement privileged access
- Define a privileged access strategy for administrative users
- Configure Privileged Identity Management for Azure resources
- Plan and configure Privileged Access Groups
- Analyze Privileged Identity Management audit history and reports
- Create and manage emergency access accounts
Topic 17 Monitor and maintain Microsoft Entra ID
- Analyze and investigate sign-in logs to troubleshoot access issues
- Review and monitor Microsoft Entra audit logs
- Export logs to third-party security information and event management system
- Analyze Microsoft Entra workbooks and reporting
- Monitor security posture with Identity Secure Score
Course Info
Promotion Code
Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Age Group: 18-65 years old
Minimum Software/Hardware Requirement
Software:
TBD
Hardware: Window or Mac Laptops
Job Roles
- Identity and Access Administrator
- Cybersecurity Analyst
- Systems Administrator
- IT Security Specialist
- Network Administrator
- Cloud Security Engineer
- Compliance and Security Manager
- IT Consultant specializing in Microsoft Technologies
- Azure AD Specialist
- Risk Management Officer
- Security Operations Center (SOC) Analyst
- IT Project Manager
- Technical Support Engineer
- IT Auditor focusing on security and compliance
- Cloud Solutions Architect
- Information Security Officer
- Network Security Engineer
- Data Protection Specialist
- Incident Response Coordinator
- Enterprise Architect focusing on security
Trainers
Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.
Customer Reviews (6)
- might recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - might consider Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will Recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - might consider Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - might consider Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment