We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Microsoft Certified: Identity and Access Administrator Associate (SC300)

Online Training by  ECCENTRIX
Inquire Now
Online / Training

Details

This four-day Microsoft certified course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it connected identity technologies. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.

This training is a comprehensive preparation for the SC-300: Microsoft Identity and Access Administrator exam to earn the Microsoft Certified: Identity and Access Administrator Associate certification.

Outline

Module 1: Explore identity in Microsoft Entra ID

  • Explain the identity landscape
  • Explore zero trust with identity
  • Discuss identity as a control plane
  • Explore why we have identity
  • Define identity administration
  • Contrast decentralized identity with central identity systems
  • Discuss identity management solutions
  • Explain Microsoft Entra ID Business to Business
  • Compare Microsoft identity providers
  • Define identity licensing
  • Explore authentication
  • Discuss authorization
  • Explain auditing in identity

Module 2: Implement initial configuration of Microsoft Entra ID

  • Configure company brand
  • Configure and manage Microsoft Entra ID roles
  • Configure delegation by using administrative units
  • Analyze Microsoft Entra ID role permissions
  • Configure and manage custom domains
  • Configure tenant-wide setting

Module 3: Create, configure, and manage identities

  • Create, configure, and manage users
  • Create, configure, and manage groups
  • Configure and manage device registration
  • Manage licenses
  • Create custom security attributes
  • Explore automatic user creation

Module 4: Implement and manage external identities

  • Describe guest access and Business to Business accounts
  • Manage external collaboration
  • Invite external users - individually and in bulk
  • Manage external user accounts in Microsoft Entra ID
  • Manage external users in Microsoft 365 workloads
  • Implement cross-tenant access controls
  • Configure identity providers
  • Implement and manage Entra Verified ID

Module 5: Implement and manage hybrid identity

  • Plan, design, and implement Microsoft Entra ID Connect
  • Implement manage password hash synchronization (PHS)
  • Implement manage pass-through authentication (PTA)
  • Implement and manage federation
  • Trouble-shoot synchronization errors
  • Implement Microsoft Entra ID Connect Health
  • Manage Microsoft Entra ID Connect Health

Module 6: Secure Microsoft Entra users with multifactor authentication

  • What is Microsoft Entra multifactor authentication?
  • Plan your multifactor authentication deployment
  • Exercise - Enable Microsoft Entra multifactor authentication
  • Configure multi-factor authentication methods

Module 7: Manage user authentication

  • Administer FIDO2 and passwordless authentication methods
  • Explore Authenticator app and OATH tokens
  • Implement an authentication solution based on Windows Hello for Business
  • Deploy and manage password protection
  • Configure smart lockout thresholds
  • Implement Kerberos and certificate-based authentication in Microsoft Entra ID
  • Configure Microsoft Entra ID user authentication for virtual machines

Module 8: Plan, implement, and administer Conditional Access

  • Plan security defaults
  • Plan Conditional Access policies
  • Implement Conditional Access policy controls and assignments
  • Implement application controls
  • Implement session management
  • Implement continuous access evaluation

Module 9: Manage Microsoft Entra Identity Protection

  • Review identity protection basics
  • Implement and manage user risk policy
  • Monitor, investigate, and remediate elevated risky users
  • Implement security for workload identities
  • Explore Microsoft Defender for Identity

Module 10: Implement access management for Azure resources

  • Assign Azure roles
  • Configure custom Azure roles
  • Create and configure managed identities
  • Access Azure resources with managed identities
  • Analyze Azure role permissions
  • Configure Azure Key Vault RBAC policies
  • Retrieve objects from Azure Key Vault
  • Explore Entra Permissions Management (CloudKnox)

Module 11: Plan and design the integration of enterprise apps for SSO

  • Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report
  • Configure connectors to apps
  • Design and implement app management roles
  • Configure pre-integrated gallery SaaS apps
  • Implement and manage policies for OAuth apps

Module 12: Implement and monitor the integration of enterprise apps for SSO

  • Implement token customizations
  • Implement and configure consent settings
  • Integrate on-premises apps by using Microsoft Entra ID application proxy
  • Integrate custom SaaS apps for single-sign-on
  • Implement application user provisioning
  • Monitor and audit access to Microsoft Entra ID integrated applications
  • Create and manage application collections

Module 13: Implement app registration

  • Plan your line of business application registration strategy
  • Implement application registration
  • Configure application permission
  • Implement application authorization
  • Manage and monitor application with App governance

Module 14: Plan and implement entitlement management

  • Define access packages
  • Configure entitlement management
  • Configure and manage connected organizations
  • Review per-user entitlements

Module 15: Plan, implement, and manage access review

  • Plan for access reviews
  • Create access reviews for groups and apps
  • Create and configure access review programs
  • Monitor access review findings
  • Automate access review management tasks
  • Configure recurring access reviews

Module 16: Plan and implement privileged access

  • Define a privileged access strategy for administrative users
  • Configure Privileged Identity Management for Azure resources
  • Plan and configure Privileged Access Groups
  • Analyze Privileged Identity Management audit history and reports
  • Create and manage emergency access accounts

Module 17: Monitor and maintain Microsoft Entra ID

  • Analyze and investigate sign-in logs to troubleshoot access issues
  • Review and monitor Microsoft Entra ID audit logs
  • Export logs to third-party security information and event management system
  • Analyze Microsoft Entra ID workbooks and reporting
  • Monitor security posture with Identity Secure Score
Reviews
Be the first to write a review about this course.
Write a Review
Since 2011, Eccentrix has been providing technology skills enhancement solutions for businesses. Our mission is to promote the importance of continuing education to computer users and professionals through many programs that we have implemented and improved over the years.

Our goal is to offer quality and up-to-date training courses, while following the latest trends in technology and applications. These are courses that target the real and concrete needs of our customers, ensuring that the knowledge acquired is put into practice. Additionally, many prepare our participants for certification exams with the brands we are accredited with - Microsoft, EC-Council, CompTIA, and PeopleCert.

Microsoft

Eccentrix has the most comprehensive offer in terms of Microsoft accredited trainings. In addition, a complete set of benefits comes with each enrollment to our trainings. Since the very beginning of our operations, Eccentrix has been a Microsoft Partner in learning following the numerous changes in the learning paths and programs, notably for certification-based courses.

EC-Council

Eccentrix has the highest level of EC-Council partnership, delivering the complete portfolio of EC-Council cybersecurity courses since 2017. With an EC-Council course comes a set of benefits that greatly help our participants get certified. EC-Council is a key vendor for Eccentrix, since we have a strong focus on cybersecurity courses and that relationships just gets better over the years. ...

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.