SC-300 : Microsoft Identity and Access Administrator

Learn everything about identity and security - The right way

   Watch Promo

What you'll learn

  • Implement an identity management solution
  • Implement an authentication and access management solution
  • Implement access management for apps
  • Plan and implement an identity governance strategy
  • Covering the best practices of Identity protection

Requirements

  • Basic knowledge of Azure and its components
  • Basic Knowledge of information security would be helpful
  • Work exposure to Active Directory, its usage and its purpose
  • Most Important : the Zeal to learn
Description

There is no shortcut to learning Azure security. This course teaches you how to learn it the right way with tons of labs excercises and the right volume of labs .

Here is the course content that is covered in this course.

Note 1 : Please note that the course Update is work in progress and Module 3 and Module 4 would be updated by 20th October. Thank You for your patience.
Note 2 : All Modules are now updated - 28th OCT - 2021
Note 3 : New Lab Activites uploaded - 29th Nov - 2021
Note 4 : Azure Sentinel - Last Module updated - 16 - March - 2022

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Implement initial configuration of Azure Active Directory

  • configure and manage Azure AD directory roles
  • configure and manage custom domains
  • configure and manage device registration options
  • configure delegation by using administrative units
  • configure tenant-wide settings

Create, configure, and manage identities

  • create, configure, and manage users
  • create, configure, and manage groups
  • manage licensesImplement and manage external identities
  • manage external collaboration settings in Azure Active Directory
  • invite external users (individually or in bulk)
  • manage external user accounts in Azure Active Directory
  • configure identity providers (social and SAML/WS-fed)

Implement and manage hybrid identityimplement and manage Azure Active Directory Connect (AADC)

  • implement and manage Azure Active Directory Connect (AADC)
  • implement and manage Password Hash Synchronization (PHS)
  • implement and manage Pass-Through Authentication (PTA)
  • implement and manage seamless Single Sign-On (SSO)
  • implement and manage Federation excluding manual ADFS deployments
  • implement and manage Azure Active Directory Connect Health
  • troubleshoot synchronization errors

Plan and implement Azure Multifactor Authentication (MFA)

  • plan Azure MFA deployment (excluding MFA Server)
  • implement and manage Azure MFA settings
  • manage MFA settings for users

Manage user authentication

  • administer authentication methods (FIDO2 and Passwordless)
  • implement an authentication solution based on Windows Hello for Business
  • configure and deploy self-service password reset
  • deploy and manage password protection
  • implement and manage tenant restrictions

Plan, implement, and administer conditional access

  • plan and implement security defaults
  • plan conditional access policies
  • implement conditional access policy controls and assignments (targeting, applications, and conditions)
  • testing and troubleshooting conditional access policies
  • implement application controls
  • implement session management
  • configure smart lockout thresholds

Manage Azure AD Identity Protection

  • implement and manage a user risk policy
  • implement and manage sign-in risk policies
  • implement and manage MFA registration policy
  • monitor, investigate and remediate elevated risky users

Plan, implement, and monitor the integration of Enterprise Apps for Single Sign-On (SSO)

  • implement and configure consent settings
  • discover apps by using MCAS or ADFS app report
  • design and implement access management for apps
  • design and implement app management roles
  • monitor and audit access / Sign-Ons to Azure Active Directory integrated enterprise applications
  • implement token customizations
  • integrate on-premises apps by using Azure AD application proxy
  • integrate custom SaaS apps for SSO
  • configure pre-integrated (gallery) SaaS apps
  • implement application user provisioning
Implement app registrations
  • plan your line of business application registration strategy
  • implement application registrations
  • configure application permissions
  • implement application authorization

Plan and implement entitlement management

  • define catalogs
  • define access packages
  • plan, implement and manage entitlements
  • implement and manage terms of use
  • manage the lifecycle of external users in Azure AD Identity Governance settings

Plan, implement, and manage access reviews

  • plan for access reviews
  • create access reviews for groups and apps
  • monitor access review findings
  • manage licenses for access reviews
  • automate access review management tasks
  • configure recurring access reviews

Plan and implement privileged access

  • define a privileged access strategy for administrative users (resources, roles, approvals, thresholds)
  • configure Privileged Identity Management for Azure AD roles
  • configure Privileged Identity Management for Azure resources
  • assign roles
  • manage PIM requests
  • analyze PIM audit history and reports
  • create and manage break-glass accounts

Monitor and maintain Azure Active Directory

  • analyze and investigate sign-in logs to troubleshoot access issues
  • review and monitor Azure AD audit logs
  • enable and integrate Azure AD diagnostic logs with Log Analytics / Azure Sentinel
  • export sign-in and audit logs to a third-party SIEM
  • review Azure AD activity by using Log Analytics / Azure Sentinel, excluding KQL use
  • analyze Azure Active Directory workbooks / reporting
  • configure notifications


Who this course is for:

  • Security enthusiasts
  • Those who want to complete the SC-300 certification
  • Those who would like to look at security from Identity perspective
  • Those who want to be the identity security defenders of their organization


Your Instructor


Anand Nednur
Anand Nednur

Anand Rao is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure , AWS and GCP) but also well-versed with IAM, security and automation with powershell and python.

In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in the lab examinations and securing certifications.

Anand Rao has delivered instructor led trainings in several states in India as well as several countries like USA, Bahrain, Kenya and UAE. He has worked as a Microsoft Certified Trainer globally for Corporate Major Clients.

Anand is also a Certified seasoned professional holding certifications in following platforms:

Microsoft Certified Trainer ( MCT )
SY0-401 : CompTIA Security +
Scrum Certified master ( SCRUM )
ITIL V3
Certified Network Defender ( CND – EC-Council )

Certified Ethical hacker ( CEH – EC-Council )
70-640 MS Active Directory
70-533 MS Azure Administration
70-534 MS Azure Architecture
AWS certified solutions Architect – Associate
AWS certified sysops administrator – Associate
Google Cloud Platform-Cloud Architect (GCP)
Certified Cloud Security Knowledge ( CCSK )


Join Today & Get Access To This Course & Every Resource You Need Grow Your Cyber Skills & Advance Your Career. Beginner & Expert Training.

Course Curriculum


  Introduction
Available in days
days after you enroll
  Module 1: Implement and Identity Management Solution (25-30%)
Available in days
days after you enroll
  Module 2 - Implement an Authentication and Access Management Solution (25-30%)
Available in days
days after you enroll
  Module 3 - Plan and Design Integration of Enterprise Apps for SSO (25-30%)
Available in days
days after you enroll
  Module 4 - Plan and Implement Identity Governance Strategy (10-15 %)
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Become A Member And Unlock Unlimited Access To This Course Plus Over 1,000+ Top Cyber Security Classes, Virtual Labs, Practice Tests, And Exam Simulations.

Designed To Help You Expand Your Skill Set And Propel Your Career Forward. Whether You're Just Starting Out Or You're An Industry Expert, There's Something Here For Everyone. Let's Grow Together!