We may earn an affiliate commission when you visit our partners.
Brian Alderman

This course teaches you how to implement and manage Active Directory synchronization with Entra ID, implement and manage different authentication methods, and secure access to M365 by understanding identity protection and policies.

Read more

This course teaches you how to implement and manage Active Directory synchronization with Entra ID, implement and manage different authentication methods, and secure access to M365 by understanding identity protection and policies.

In today's digitally connected world, managing identity and access within the Microsoft 365 ecosystem is paramount for organizations of all sizes. In this course, Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID, you’ll learn how to effectively implement and manage Active Directory synchronization, manage authentication methods, and how to implement and manage secure access to M365. First, you’ll explore how to plan, manage, implement, monitor, and troubleshoot identity synchronization. Next, you’ll discover how to implement, manage, and troubleshoot authentication methods, including Windows Hello for Business, self-service password reset (SSPR), multi-factor authentication (MFA), and Microsoft Authenticator. Finally, you’ll learn how to plan, implement, and manage identity protection, as well as Conditional Access policies as methods for securing access to M365. When you’re finished with this course, you’ll have the skills and knowledge to successfully perform an Active Directory synchronization to Entra ID, implement and manage M365 authentication methods, and provide secure access by using both identity protection and Conditional Access policies.

Enroll now

What's inside

Syllabus

Course Overview
Implementing and Managing Identity Synchronization with Entra ID
Implementing and Managing Authentication
Implementing and Managing Secure Access
Read more
Course Review

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores Microsoft 365 Administration identity and access management, which is standard in industry
Taught by Brian Alderman, who are recognized for their work in identity management
Develops identity management and secure access policies in Microsoft 365, which are core skills for system administrators
Examines cloud authentication methods, which is highly relevant in providing access to SaaS applications

Save this course

Save Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID with these activities:
Attend a Microsoft Identity User Group Meeting
Connect with other M365 professionals and learn about the latest trends and best practices in identity and access management.
Show steps
  • Find a Microsoft Identity User Group meeting near you.
  • Attend the meeting and participate in the discussions.
Volunteer at a Non-Profit Organization to Support Identity Management
Gain practical experience in identity management while contributing to a meaningful cause.
Show steps
  • Find a non-profit organization that needs help with identity management.
  • Contact the organization and offer your services.
  • Work with the organization to identify their identity management needs.
  • Develop and implement solutions to meet those needs.
Configure Azure Active Directory Connect
Gain hands-on experience configuring Azure Active Directory Connect to synchronize on-premises Active Directory with Azure AD.
Browse courses on Hybrid Identity
Show steps
  • Set up a lab environment with an on-premises Active Directory domain.
  • Download and install Azure Active Directory Connect.
  • Configure Azure Active Directory Connect to synchronize your on-premises Active Directory domain with Azure AD.
  • Verify that synchronization is working correctly.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Organize a Study Group with Classmates
Collaborate with classmates to review course materials, discuss concepts, and prepare for assessments.
Show steps
  • Reach out to classmates and find a group of people who are interested in studying together.
  • Decide on a meeting time and location.
  • Create a study schedule and stick to it.
Practice Password Reset Scenarios
Improve your understanding and ability to troubleshoot password reset scenarios in M365.
Browse courses on Password Reset
Show steps
  • Create a user account in Azure AD.
  • Lock the user account.
  • Reset the user's password using the self-service password reset portal.
Attend a Workshop on Azure Active Directory Identity and Access Management
Learn from experts and gain hands-on experience with Azure Active Directory identity and access management tools and technologies.
Browse courses on Azure AD
Show steps
  • Find a workshop on Azure AD identity and access management.
  • Attend the workshop and participate in the exercises.
Follow Microsoft's Tutorial on Conditional Access Policies
Deepen your understanding of Conditional Access policies and their implementation in M365.
Show steps
  • Go to the Microsoft Docs website and find the tutorial on Conditional Access policies.
  • Follow the steps in the tutorial to create and configure a Conditional Access policy.
  • Test your Conditional Access policy to make sure it is working correctly.

Career center

Learners who complete Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID will develop knowledge and skills that may be useful to these careers:
Cloud Identity Engineer
A Cloud Identity Engineer plans, implements, and manages cloud-based identity and access management (IAM) systems. They ensure that users have the appropriate access to cloud resources and applications, while also protecting the organization from security breaches and data leaks. This course can help you prepare for this role by providing you with the skills and knowledge you need to manage user access, configure authentication methods, and implement security measures in the cloud.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They develop and implement security policies and procedures, monitor security systems, and investigate security breaches. This course can help you prepare for this role by providing you with the skills and knowledge you need to implement and manage identity and access management systems, as well as to identify and respond to security threats.
Systems Administrator
A Systems Administrator plans, implements, and manages computer systems and networks for organizations. They install and configure hardware and software, monitor system performance, and troubleshoot problems. This course can help you prepare for this role by providing you with the skills and knowledge you need to manage user access, configure authentication methods, and implement security measures in a Windows environment.
Network Administrator
A Network Administrator plans, implements, and manages computer networks for organizations. They install and configure network hardware and software, monitor network performance, and troubleshoot problems. This course can help you prepare for this role by providing you with the skills and knowledge you need to manage user access, configure authentication methods, and implement security measures in a network environment.
Security Architect
A Security Architect designs and implements security measures to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor security systems and investigate security breaches. This course can help you prepare for this role by providing you with the skills and knowledge you need to implement and manage identity and access management systems, as well as to identify and respond to security threats.
Cybersecurity Analyst
A Cybersecurity Analyst monitors and analyzes computer systems and networks for security breaches. They investigate security incidents, respond to security alerts, and develop and implement security measures to protect organizations from cyberattacks. This course can help you prepare for this role by providing you with the skills and knowledge you need to manage user access, configure authentication methods, and implement security measures in a cybersecurity environment.
Cloud Architect
A Cloud Architect designs and implements cloud computing solutions for organizations. They work with other IT professionals to develop and implement cloud strategies, and they manage cloud infrastructure and services. This course can help you prepare for this role by providing you with the skills and knowledge you need to manage user access, configure authentication methods, and implement security measures in the cloud.
Security Engineer
A Security Engineer designs and implements security measures to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor security systems and investigate security breaches. This course can help you prepare for this role by providing you with the skills and knowledge you need to implement and manage identity and access management systems, as well as to identify and respond to security threats.
Identity and Access Management Engineer
An Identity and Access Management Engineer plans, implements, and manages identity and access management systems for organizations. They ensure that users have the appropriate access to resources and applications, while also protecting the organization from security breaches and data leaks. This course can help you prepare for this role by providing you with the skills and knowledge you need to manage user access, configure authentication methods, and implement security measures in a cloud environment.
Security Administrator
A Security Administrator plans, implements, and manages security measures to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor security systems and investigate security breaches. This course can help you prepare for this role by providing you with the skills and knowledge you need to implement and manage identity and access management systems, as well as to identify and respond to security threats.
Cloud Security Engineer
A Cloud Security Engineer designs and implements security measures to protect an organization's cloud computing resources and applications from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement cloud security policies and procedures, and they monitor security systems and investigate security breaches. This course can help you prepare for this role by providing you with the skills and knowledge you need to manage user access, configure authentication methods, and implement security measures in the cloud.
IT Auditor
An IT Auditor evaluates an organization's computer systems and networks to ensure that they are secure and compliant with applicable laws and regulations. They review security policies and procedures, test security controls, and investigate security incidents. This course can help you prepare for this role by providing you with the skills and knowledge you need to assess the security of an organization's identity and access management systems.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to protect their computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with organizations to develop and implement security policies and procedures, and they conduct security assessments and audits. This course can help you prepare for this role by providing you with the skills and knowledge you need to assess the security of an organization's identity and access management systems.
Database Administrator
A Database Administrator plans, implements, and manages databases for organizations. They ensure that databases are secure, reliable, and performant. This course may be useful if you are interested in learning how to manage user access and configure authentication methods for databases.
Software Engineer
A Software Engineer designs, develops, and tests software applications. They work with other IT professionals to develop software solutions for organizations. This course may be useful if you are interested in learning how to implement and manage identity and access management systems in software applications.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID.
Provides a comprehensive overview of identity and access management in Microsoft 365, covering topics such as planning, implementing, and managing identity synchronization, authentication methods, and secure access.
Provides a detailed overview of Microsoft 365 identity management and access control features. It covers topics such as Active Directory, Azure Active Directory, and multi-factor authentication.
This cookbook provides practical recipes for managing Active Directory in Windows Server 2012. It useful reference tool for administrators who want to quickly find solutions to common problems.
Provides a comprehensive overview of identity and access management in cloud computing. It covers topics such as identity federation, single sign-on, and access control.
Provides a practical guide to implementing and managing cloud identity management solutions. It covers topics such as cloud directory services, identity federation, and access control.
Provides a comprehensive overview of implementing identity and access management, covering topics such as planning, implementing, and managing identity and access management, as well as troubleshooting common issues.
Provides a comprehensive overview of Windows Server 2016 security, covering topics such as planning, implementing, and managing security, as well as troubleshooting common issues.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID.
Credential Management and Access Control with Active...
Most relevant
Active Directory and Entra ID: The Big Picture
Most relevant
Microsoft Identity and Access: Implement Identities in...
Most relevant
Microsoft Entra Fundamentals
Most relevant
Administering Active Directory and Entra ID
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Azure Identity and Networking Essentials
Most relevant
Microsoft Azure Solutions Architect: Implement an Azure...
Most relevant
Windows Server 2022 Administration
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser