We may earn an affiliate commission when you visit our partners.
Vlad Catrinescu

Over a million organizations rely on Microsoft’s identity and access management solutions for cloud and productivity workloads. In this course you will learn about the identity and access management solutions and features in the Microsoft Cloud.

Read more

Over a million organizations rely on Microsoft’s identity and access management solutions for cloud and productivity workloads. In this course you will learn about the identity and access management solutions and features in the Microsoft Cloud.

Microsoft Entra ID is the core identity service of every Azure and Microsoft 365 tenant. In this course, Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions, you will first learn about Entra ID and the identity services it provides. Next up, you will discover the different authentication capabilities of Entra ID. Finally, you will learn about the different identity governance capabilities offered in Entra ID. When you are finished with this course, you will have gained an understanding of the identity and access management solutions in Entra ID and how they can help keep an organization safe. This exam also covers part of the objectives of the SC-900 certification.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Introduction to Microsoft Entra ID
Microsoft Entra ID Authentication Capabilities
Microsoft Entra ID Access Management Capabilities
Read more
Microsoft Entra ID Identity Protection and Governance Capabilities
Course Conclusion

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for individuals managing Microsoft Cloud
Covers Microsoft's latest Identity and Access Management solutions
Instructor Vlad Catrinescu is a recognized expert in Microsoft Security
Provides a strong foundation for understanding Entra ID services

Save this course

Save Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions with these activities:
Review identity governance concepts
Brings to mind proven best practices and techniques for identity governance. This activity can be repeated several times throughout the course.
Show steps
  • Review notes from previous courses or certifications on identity governance.
  • Research and read articles on identity governance best practices.
  • Attend a webinar or watch a video on identity governance.
Connect with identity management professionals
Seek guidance from experts in the field to enhance understanding.
Show steps
  • Attend industry events or join online communities to connect with professionals.
  • Reach out to professionals on LinkedIn or other platforms for advice and insights.
Organize your course notes and materials
Improve your organization and ability to locate information by compiling your course materials.
Show steps
  • Gather all your course notes, assignments, and other materials
  • Organize the materials into a logical structure
  • Store the materials in a central location
Eight other activities
Expand to see all activities and additional details
Show all 11 activities
Review authentication fundamentals
Authenticate the learning journey with a reminder of the basics of authentication.
Browse courses on Authentication
Show steps
  • Review the concepts of authentication, authorization, and identity management.
  • Read articles and blog posts about authentication best practices.
  • Take an online quiz or practice problems on authentication.
Follow Microsoft's tutorial on Azure Identity Overview
Introduces the concepts of Azure Identity and builds a foundation for understanding Entra ID.
Browse courses on Azure Active Directory
Show steps
  • Visit Microsoft's Azure Identity Overview tutorial
  • Follow the step-by-step instructions provided in the tutorial
  • Complete the tutorial and test your understanding with the provided quiz
Explore Microsoft documentation on Azure Active Directory
Understand the concepts of Azure Active Directory (AAD) to reinforce the course material on identity and access management solutions.
Show steps
  • Visit the Azure Active Directory documentation website
  • Review the overview of AAD
  • Explore specific topics related to your interests
Configure Azure AD authentication
Configure the environment for success by setting up the authentication system.
Show steps
  • Follow a tutorial or documentation to set up Azure AD authentication for your application.
  • Test the authentication flow to ensure it's working correctly.
  • Troubleshoot any authentication issues that arise.
Create a presentation on the benefits of using Entra ID
Enhance your communication skills and understanding of Entra ID by creating a presentation on its benefits and applications.
Browse courses on Entra ID
Show steps
  • Gather information on the benefits of Entra ID
  • Organize the information into a logical flow
  • Create visual aids to support your presentation
  • Practice delivering the presentation
Write a blog post on different authentication methods
Solidify your understanding of the authentication capabilities of Entra ID by explaining the different methods to a broader audience.
Browse courses on Authentication
Show steps
  • Research different authentication methods
  • Compare and contrast the methods
  • Write a blog post explaining the methods and their applications
Complete practice questions on identity governance
Reinforce your understanding of identity governance capabilities by solving practice questions.
Show steps
  • Find practice questions on identity governance
  • Attempt to answer the questions
  • Review your answers and identify areas for improvement
Implement an identity and access management solution for a small organization
Apply your knowledge of Entra ID to a real-world scenario by implementing an identity and access management solution for a small organization.
Show steps
  • Identify the organization's requirements
  • Design and implement the solution
  • Test and evaluate the solution

Career center

Learners who complete Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions will develop knowledge and skills that may be useful to these careers:
Cloud Security Engineer
A Cloud Security Engineer is responsible for securing an organization's cloud environment. This includes designing and implementing security controls, monitoring for security threats, and responding to security incidents. Cloud Security Engineers who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of IAM, which is critical to cloud security. This course will help them to understand the processes and technologies involved in securing cloud environments.
Identity and Access Management (IAM) Engineer
An Identity and Access Management (IAM) Engineer is a professional responsible for managing access to resources within an organization. These engineers implement and configure the company's IAM system, which is often cloud-hosted and integrated with the company's Human Resources system. Identity and Access Management Fundamentals learners will gain foundational knowledge of IAM through the study of Microsoft's Entra ID service. This course covers concepts like authentication, authorization, and governance.
Identity Governance Specialist
An Identity Governance Specialist is responsible for managing the identity lifecycle of users within an organization. This includes creating, modifying, and deleting user accounts, as well as managing user access to resources. Identity Governance Specialists who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of IAM, including authentication, authorization, and governance. This course will help them to understand the processes and technologies involved in identity governance.
Cloud Identity Engineer
A Cloud Identity Engineer ensures that enterprise identities, within cloud environments, have secure access to authorized resources. As a Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions learner, you'll learn authentication and authorization processes within Entra ID. These include Single Sign-On, Multi-Factor Authentication, and Conditional Access, all of which are critical to the design and implementation of cloud identity systems.
Infrastructure Security Engineer
An Infrastructure Security Engineer is responsible for securing an organization's IT infrastructure. This includes designing and implementing security controls, monitoring for security threats, and responding to security incidents. Infrastructure Security Engineers who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of IAM, which is critical to infrastructure security. This course will help them to understand the processes and technologies involved in securing IT
Data Security Analyst
A Data Security Analyst is responsible for protecting an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. Data Security Analysts who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of IAM, which is critical to data security. This course will help them to understand the processes and technologies involved in protecting data.
Application Security Engineer
An Application Security Engineer is responsible for securing an organization's applications from vulnerabilities and attacks. Application Security Engineers who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of IAM, which is critical to application security. This course will help them to understand the processes and technologies involved in securing applications.
Security Analyst
A Security Analyst is responsible for monitoring an organization's security systems for threats and vulnerabilities. Security Analysts who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of IAM, which is a critical part of security analytics. This course will help them to understand the processes and technologies involved in security analysis.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. Security Consultants who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of IAM, which is a critical part of security consulting. This course will help them to understand the processes and technologies involved in security consulting.
Security Architect
A Security Architect designs, implements, and manages an organization's security posture. This includes developing and maintaining security policies, procedures, and standards. They may also work with vendors to implement security solutions. Security Architects who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of cloud-based IAM practices, including authentication, authorization, and governance. This will help them design and implement more secure systems.
Privacy Engineer
A Privacy Engineer is responsible for protecting the privacy of an organization's data. They may develop and implement privacy policies, conduct privacy impact assessments, and manage data breaches. Privacy Engineers who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of cloud-based IAM practices, including authentication, authorization, and governance. This will support the work they do to protect sensitive data.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. Software Engineers who take the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will gain foundational knowledge of IAM, which is important for developing secure software applications. This course will help them to understand the processes and technologies involved in implementing IAM in software applications.
Security Engineer
A security engineer works to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can provide a foundation for those new to cloud-based identity and access management (IAM). It will help build a foundation around IAM concepts, like authentication and authorization, and will provide insights into Microsoft's Entra ID service.
Information Security Analyst
Information Security Analysts design, implement, and manage security measures to protect an organization's computer systems and networks. They may specialize in areas such as risk assessment, incident response, or cloud security. Taking the Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions course will introduce you to key identity and access management concepts. This knowledge forms a core part of information security and will serve you well in this role.
Compliance Manager
A Compliance Manager ensures that an organization complies with all applicable laws and regulations. They may specialize in areas such as data protection, privacy, or financial reporting. For Compliance Managers who work in cloud environments, this course is a good introduction to IAM. Its focus on identity governance and protection will serve as a strong foundation for understanding and implementing compliance requirements.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions.
Provides a comprehensive overview of security engineering, including principles, best practices, and case studies. It valuable resource for software engineers, system administrators, and security professionals.
Provides a comprehensive overview of identity and access management (IAM) for cloud computing. IAM is the process of managing the identities of users within a cloud computing environment. It includes tasks such as authentication, authorization, and provisioning.
Provides a comprehensive overview of computer security, including principles, best practices, and case studies. It valuable resource for students, IT professionals, and security practitioners.
Provides a comprehensive overview of cryptography and network security, including principles, best practices, and case studies. It valuable resource for students, IT professionals, and security practitioners.
Provides a comprehensive overview of network security, including principles, best practices, and case studies. It valuable resource for students, IT professionals, and security practitioners.
Provides a comprehensive overview of firewalls and intrusion detection systems, including principles, best practices, and case studies. It valuable resource for IT professionals and security practitioners.
Provides a comprehensive overview of security testing, including penetration testing and risk assessment. It valuable resource for IT professionals and security practitioners.
Provides a comprehensive overview of ISO 27001:2013, the international standard for information security management. It valuable resource for IT professionals and security practitioners.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions.
Azure Identity and Networking Essentials
Most relevant
Microsoft Identity and Access: Implement Identities in...
Most relevant
Microsoft 365 Administration: Implementing and Managing...
Most relevant
Microsoft Entra Fundamentals
Most relevant
Managing Identity Services using AD DS and Microsoft Entra
Most relevant
Active Directory and Entra ID: The Big Picture
Most relevant
Introduction to Microsoft Entra ID
Most relevant
Credential Management and Access Control with Active...
Most relevant
Microsoft 365 Security, Compliance, and Identity Concepts
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser