Autoplay
Autocomplete
Previous Lesson
Complete and Continue
SC-300 : Microsoft Identity and Access Administrator
Introduction
Introduction (0:30)
SC 300 Course Introduction (2:44)
Module 1: Implement and Identity Management Solution (25-30%)
Module 1 - Introduction (1:32)
Active Directory - Throw Back (2:46)
What is Azure Active Directory (1:15)
Who uses Azure AD (2:23)
Azure AD Roles (2:41)
Differences between Azure Roles and Azure AD Roles (5:44)
Capabilities of Global Admin (1:37)
Azure AD Roles - Lab Activity (3:14)
Azure AD - Custom roles (4:04)
Custom Domains (5:43)
Deleting Custom Domains (5:10)
Bring Your Devices (1:45)
Azure AD registered Devices (3:15)
Azure AD Join (3:54)
Azure AD domain Join - Lab (4:28)
Azure AD - Hybrid Joined (3:05)
Azure AD - Administrative Units (6:21)
Administrative Units - Lab Activity (5:40)
Planning and Delegation - Administrative Units (4:25)
Plan for Delegation (10:05)
Security Defaults (3:28)
Create Configure and Manage Identities - Introduction (1:56)
Azure Active Directory - Users (4:35)
Azure Active Directory - Groups (2:26)
Managing Licenses (2:25)
License Requirements (1:07)
Licensing Features (3:11)
Implement and Manage External Identities - Introduction (1:00)
Azure AD B2B Collaboration (4:33)
Azure AD B2B - Lab Activity (4:28)
Dynamic Groups (1:37)
Dynamic Groups - Lab (4:44)
Azure AD B2B - Google Auth - Demo (10:56)
Implement and Manage Hybrid Identity (2:54)
Plan, Design, and Implement Azure AD Connect (2:06)
Need for AD connect (1:28)
Selecting the Right Authentication Method (1:29)
Azure AD External Collaboration Settings (3:06)
Azure AD Password Hash Synchronization (PHS) (3:18)
Azure AD password Through Authentication (PTA) (4:34)
Federated authentication (3:01)
Architecture diagrams (3:14)
Azure AD Design Considerations (4:43)
Azure AD Connect Components (4:30)
PHS - How does it work? (2:52)
Azure AD connect - Lab (11:01)
Troubleshooting Sync Errors (1:11)
Data mismatch errors - InvalidSoftMatch (5:52)
Data mismatch errors - ObjectTypeMismatch (2:19)
Duplicate attributes - AttributeValueMustBeUnique (1:22)
Data validation failures - IdentityDataValidationFailed (1:13)
FederatedDomainChangeError (1:31)
LargeObjects error (1:01)
Azure AD Connect Health Installation (2:29)
Azure AD Connect Health (9:48)
Self Remediation and Orphaned Objects (2:20)
Lab 1 - Assigning Roles to User Accounts (2:43)
Lab 2 - Tenant Properties (4:10)
Lab 3 - Assigning Licenses to groups (3:12)
Lab 4 - External Collaboration Settings (3:21)
Lab 5 - Restoring Deleted Users (1:16)
Module 1 - Summary (1:29)
Module 2 - Implement an Authentication and Access Management Solution (25-30%)
Module 2 - Introduction (1:15)
Plan and Implement Azure Multifactor Authentication- Introduction (1:31)
What is Azure AD MFA (3:06)
How Multi-Factor Authentication works (3:10)
Planning the MFA (1:21)
Enforcing MFA with Conditional Access (1:32)
Deciding supported authentication methods (1:56)
Azure AD Authentication methods (4:22)
Monitoring and Usage (1:56)
Manage User Authentication- Lesson Introduction (1:50)
Password Less Authentication - Introduction (1:15)
Security Usability Availability of Authentication Methods (1:27)
Configuring Fido Key for a User - Lab (6:20)
Windows Hello for Business (1:29)
Windows Hello for Business works-key points (3:20)
Azure AD Password Protection (1:30)
Azure AD Password Protection - Lab (14:28)
Multiple Forests and RODC - Considerations (1:35)
Plan Implement and Manage Conditional Access (1:00)
What Policies are Enforced and to Whom? (3:09)
Blocking legacy authentication (2:10)
Conditional Access Policies - Planning (2:17)
Conditional Access Policies - Benefits (2:32)
Conditional Access policies - Components (4:13)
Conditional Access Policies - Best Practices (2:38)
Condition Access Policies - Most Common Policies (2:54)
Conditional Access Policies - Build and Test Policies - I (1:08)
Conditional Access Policies - Build and Test Policies - II (2:54)
Sign in Risk and User Risk - Conditional Access Policy (2:31)
Conditional Access Policy - Blocking Locations - Lab (10:35)
Troubleshooting using Sign-in Logs (2:02)
Device Compliance (1:25)
Conditional Access Policy - Device Compliance - Lab (5:44)
User Exclusions (2:01)
Conditional Access Policy - O365 Block MFA Required - Lab (5:59)
Test and Troubleshoot Conditional Access Policies (4:46)
Implement Application Controls and Application (2:09)
Scenario 1 - Microsoft 365 apps require an approved client (7:53)
Scenario 2 - Exchange Online and SharePoint Online (6:22)
App Protection Policies Overview (1:18)
How Can you Protect App Data (1:10)
Manage Azure AD Identity Protection - Introduction (0:54)
Manage Azure AD Identity Protection (1:35)
Risk Detection and Remediation (2:02)
Permissions (1:32)
License Requirements (0:34)
Sign in and User Risk Policy (1:18)
Choosing Acceptable Risk Levels (2:02)
Prerequisites of Self Remediation (1:21)
Navigating through the reports - Lab (9:11)
Remediate Risks and Unblock Users (1:39)
User Risk Remediation Options (3:43)
Unblocking Users (3:06)
Enable Azure AD MFA - EnterpriseWide LAB (9:49)
Deploy SSPR - Setup (8:07)
Security Defaults - Lab (1:19)
Control User Sign in frequency - LAB (2:52)
Smart Lockout Values (2:15)
Configuring User and Sign in Risk Policy (3:36)
Configure Azure AD MFA Registration Policy (2:08)
Module 2 Summary (0:53)
Module 3 - Plan and Design Integration of Enterprise Apps for SSO (25-30%)
Module 3 - Introduction (1:02)
Microsoft Cloud App Security - CASB Solution from Microsoft (2:42)
MCAS Architecture (3:57)
Need to Migrate from ADFS (3:46)
Discover AD FS applications - Lab (2:31)
Design and Implement App Management Roles (5:44)
Restrict Who Can Create Applications (1:21)
Configure Saas Based Applications (5:10)
Implement and Monitor SSO apps - Introduction (0:44)
Token Customizations (1:32)
What is a Consent (3:15)
User Consent Settings (3:14)
What is Azure Application Proxy (3:29)
How Azure App Proxy Works (1:14)
Comparison of Various Protocols Used by IDPs (2:20)
Implement Application User Provisioning (3:19)
Manual Vs Automatic User Provisioning (2:11)
SCIM - System for Common Identity Management (2:39)
SCIM Demonstration (3:44)
SCIM - Attribute Exchange (1:53)
Usage , Insights and Audit Reports for Enterprise Applications (5:47)
Application Registrations (0:45)
The Need to Integrate Applications with Azure AD (2:48)
What are Application Objects (2:55)
What are Service Principals (1:30)
Relation Between Application Objects and Services Principals (3:17)
Roles and permissions required (3:52)
Tenants - Who can sign in to your new app (5:19)
Azure Application Registrations - part 1 (8:58)
Types of Permissions - Delegated and Application (1:31)
Requesting Individual User Consent (1:23)
Manifest File, Token and Claims (3:13)
Integrate Applications with Azure AD - Lab (12:30)
Troubleshooting SAML (6:22)
Module 3 Summary (1:41)
Module 4 - Plan and Implement Identity Governance Strategy (10-15 %)
Module 4 - Introduction (1:21)
Planning and Implementing Entitlement Management - Chapter Introduction (1:03)
What is Entitlement Management (0:54)
Capabilities of Entitlement Management (1:09)
Entitlement Management - Terminology (3:16)
What Resources Can I Manage With Access Packages (1:56)
How Do I Control Who Gets Access (1:04)
When Should I Use Access Packages (2:44)
Plan, Implement, and Manage Access Reviews - Introduction (0:45)
Plan For Access Reviews (1:58)
What is Azure AD Identity Governance (1:32)
Access Reviews - Lab (14:23)
Planning the Ccope (1:03)
Components of an access review (1:00)
Planning Communications (1:26)
Access Reviews Lab Activity - I (8:26)
Access Reviews Lab Activity - II (3:27)
Managing Licenses for Access Reviews (1:30)
Plan and Implement Privileged Access (0:58)
Azure Active Directory Privileged Identity Management (3:07)
PIM - Stakeholders (1:34)
Principle of Least priviledge - Best practices for PIM (6:21)
Decide the Roles That Should Be Protected by PIM (2:02)
Decide What to Protect with PIM (1:53)
Assign Azure AD roles in Privileged Identity Management - Lab (8:51)
Configuring PIM for Azure AD Roles (3:30)
Discovering Resource to Mange (2:01)
Audit History - Lab (2:04)
Create and Manage Emergency Access Accounts - I (3:04)
Create and Manage Emergency Access Accounts - II (2:20)
Exclusions (1:11)
Validating Emergency Accounts (2:22)
Monitor and Maintain Azure AD - Introduction (0:45)
Analyze Sign-in and Troubleshoot Access Issues - Components (1:39)
Access and Licenses (1:23)
Sign In Report - Lab (5:26)
Sign in Data - More Information (3:05)
Audit Log - Users and Groups (5:00)
Exporting Logs to Third Party Security Solutions (2:00)
Integration Recommendations (1:47)
Analyze Azure AD Workbooks and Reporting (3:16)
Module 4 - Summary (1:23)
Azure Sentinel - Chapter 1
What is a SIEM Solution (1:55)
What is Microsoft Sentinel (2:28)
Microsoft Sentinel - Components (0:22)
Data Connectors (0:59)
Log Retention (0:52)
Workbooks (0:49)
Analytics Alerts (0:47)
Threat Hunting (0:43)
Incidents Investigations (0:46)
Automation Playbooks (1:16)
Creating Azure Sentinel Workspace (4:15)
Azure Sentinel - RBAC (8:46)
Data Connectors (5:37)
On boarding Windows host to Sentinel (3:21)
Ingesting Events to Sentinel (2:43)
Sentinel - Watchlists (2:09)
Sentinel - Creating a watchlist for Tor Nodes (6:48)
Sentinel - Create Hunting Query (17:18)
Sentinel - Live Stream (1:52)
21 Sentinel - Capturing traffic from TOR Exit Nodes (7:49)
Sentinel - Create Analytical Rules (7:42)
Analytical Rule Type - Fusion (4:10)
Analytical Rule Types - Security Types (1:36)
Analytical Rule Types - ML based Behavioral Analytics (1:09)
Analytical Ryle Types - Anomaly, Scheduled Alerts and NRT (2:23)
Creating Anayltics Rules based on Template (2:00)
Creating Analytic Rules based on Wizard (7:51)
Managing the Rules (2:53)
Define Threat Intelligence (3:11)
Create TI - Lab Activity (5:40)
Azure Sentinel - Chapter 2
Module 6 Introduction (0:35)
Connect M365 Defender to Sentinel (1:10)
Office 365 Log Connector (2:22)
Azure Activity Log Connector (2:06)
Azure Active Directory Identity Protection Connection (2:25)
Defender for Office 365 Connector (2:32)
Defender for Endpoint Connector (4:21)
Connect Threat Indicators to Microsoft Sentinel (6:09)
Azure Sentinel - Chapter 3
Chapter Introduction (0:33)
Key Concepts of Incident Management - I (1:08)
Key Concepts of Incident Management - II (2:21)
Incident Mangement in Microsoft Sentinel - I (6:12)
Incident Mangement in Microsoft Sentinel - II (5:20)
Brute Force attack against Azure Portal - Simulation (4:06)
Threat Response with Microsoft Sentinel Playbooks - Introduction (2:35)
Step 1 - Creating Analytical Rule to look for Role membership Changes (5:50)
Step 2 - Integrate Log Analytics with Azure AD Audit Logs (3:11)
Step 3 - Verify Log Analytics (2:07)
Incident Creation in Sentinel (3:18)
Create a Logic app to integrate with Microsoft teams (10:07)
Edit Analytical rule to add Logic app Playbook (1:41)
Testing the integration (3:08)
UEBA - Introduction (5:05)
Entity Behavior Lab - I (4:18)
Entity Behavior Lab - II (4:44)
Workbooks - Introduction (1:26)
Create Workbooks Using Template (8:36)
Create Workbook from scratch (7:04)
Conditional Access Policies - Build and Test Policies - II
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock