We may earn an affiliate commission when you visit our partners.
Neil Morrissey

Identity, authentication, and authorization are fundamental to managing your organization’s users and networked resources. This course will teach you how Active Directory and Entra ID can be used independently and together.

Read more

Identity, authentication, and authorization are fundamental to managing your organization’s users and networked resources. This course will teach you how Active Directory and Entra ID can be used independently and together.

Managing identity, authentication, and access control is necessary for every organization. Microsoft provides extensive capabilities in these areas through Active Directory and Azure Active Directory. Understanding the differences between the two platforms, and how they can be used together will provide options and opportunities for your organization. In this course, Active Directory and Entra ID: The Big Picture, you’ll learn the features of AD and Azure AD, and how they can be used together. First, you’ll explore capabilities of the two tools, their similarities and differences. Next, you’ll discover ways to identify and authenticate users on-premises and in the cloud. Finally, you’ll learn how to handle users outside your organization. When you’re finished with this course, you’ll have the skills and knowledge of Active Directory and Azure Active Directory needed to make decisions on how to leverage the tools best for your organization.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Understanding Active Directory and Azure Active Directory
Authentication and Authorization with AD and AAD
Extending Your on-premises Infrastructure to Azure
Read more
Handling External Users

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops authentication and authorization skills required for managing users and resources
Helps administrators understand the capabilities and similarities of Active Directory and Azure Active Directory
Taught by Neil Morrissey, an experienced instructor in identity management
Provides a comprehensive overview of Active Directory and Azure Active Directory, suitable for beginners
Requires prior knowledge of identity management concepts and tools
Focuses primarily on Microsoft technologies, limiting its applicability to organizations using other platforms

Save this course

Save Active Directory and Entra ID: The Big Picture to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Active Directory and Entra ID: The Big Picture with these activities:
Compile a list of resources for learning about Active Directory and Azure Active Directory
A compilation of resources can help you to stay up-to-date on the latest developments in Active Directory and Azure Active Directory.
Browse courses on Active Directory
Show steps
  • Search for resources on the internet.
  • Evaluate the resources and select the most relevant ones.
  • Organize the resources into a list.
Participate in a study group with other students taking this course
Study groups can provide you with support and motivation.
Browse courses on Active Directory
Show steps
  • Find a group of students to participate in a study group with.
  • Schedule regular meeting times.
  • Discuss the course material and work together to complete assignments.
Practice creating and managing user accounts in Active Directory
User account management is a fundamental skill for any Active Directory administrator.
Browse courses on Active Directory
Show steps
  • Add users to Active Directory and assign them to groups.
  • Manage user permissions and access to resources.
Six other activities
Expand to see all activities and additional details
Show all nine activities
Create a sandbox environment for Active Directory
Creating a sandbox environment will allow you to test Active Directory features without affecting your production environment.
Browse courses on Active Directory
Show steps
  • Set up an isolated network for your sandbox environment.
  • Install Active Directory on a server in the sandbox environment.
  • Configure Active Directory with your desired settings.
Create a presentation on the benefits of using Active Directory and Azure Active Directory together
A presentation is a great way to share your knowledge and experience with others.
Browse courses on Active Directory
Show steps
  • Gather information on the benefits of using Active Directory and Azure Active Directory together.
  • Outline your presentation.
  • Create your presentation slides.
Configure single sign-on (SSO) between Active Directory and Azure Active Directory
SSO will allow your users to access both on-premises and cloud resources with a single set of credentials.
Browse courses on Active Directory
Show steps
  • Set up Azure Active Directory and configure your tenant.
  • Install and configure the Azure Active Directory Connect tool.
  • Configure single sign-on settings in Active Directory and Azure Active Directory.
Set up and manage Azure Active Directory (Azure AD) Conditional Access
Conditional Access allows you to enforce additional security measures, such as multi-factor authentication or device restrictions, for specific users or scenarios.
Browse courses on Active Directory
Show steps
  • Create and configure Conditional Access policies.
  • Assign Conditional Access policies to users or groups.
  • Monitor Conditional Access events and reports.
Create and manage Azure AD B2C tenants for external user access
Azure AD B2C allows you to securely provide access to your applications and resources to users who are not part of your organization.
Browse courses on Azure Active Directory
Show steps
  • Create an Azure AD B2C tenant.
  • Configure your Azure AD B2C tenant with your desired settings.
  • Integrate your Azure AD B2C tenant with your applications.
Develop a comprehensive security plan for your Active Directory and Azure Active Directory environments
A well-developed security plan will help you to protect your Active Directory and Azure Active Directory environments from threats.
Browse courses on Active Directory
Show steps
  • Identify potential threats to your Active Directory and Azure Active Directory environments.
  • Develop strategies to mitigate these threats.
  • Implement your security plan and monitor its effectiveness.

Career center

Learners who complete Active Directory and Entra ID: The Big Picture will develop knowledge and skills that may be useful to these careers:
Identity Management Engineer
The Identity Management Engineer plans, deploys, operates, and maintains identity and access management systems. Those working in this role manage user identities, roles, and permissions. They also oversee the security and compliance of identity-related systems and processes. This course is an excellent resource for those aspiring to this career path, as it provides a comprehensive overview of identity management concepts and best practices.
IT Security Analyst
IT Security Analysts plan, implement, and manage security measures to protect an organization's computer networks and systems. They also monitor and analyze security systems to identify and respond to potential threats. This course complements the skills needed for this role by providing a deep dive into identity management and authentication, which are critical aspects of cybersecurity.
Systems Administrator
Systems administrators plan, implement, and maintain computer systems. They also monitor and troubleshoot system issues. This course can be useful for systems administrators who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for managing and securing systems.
Network Administrator
Network administrators plan, implement, and maintain computer networks. They also monitor and troubleshoot network issues. This course can be useful for network administrators who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for managing and securing networks.
IT Auditor
IT Auditors assess the security of an organization's computer systems and networks. They also make recommendations for improving security. This course can be useful for IT Auditors who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for assessing the security of IT systems.
IT Manager
IT Managers plan, implement, and manage IT systems and services for an organization. They also oversee the security and compliance of IT-related systems and processes. This course can be useful for IT managers who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for managing and securing IT systems.
Cloud Architect
Cloud Architects design and implement cloud-based solutions for an organization. They also oversee the security and compliance of cloud-related systems and processes. This course can be useful for Cloud Architects who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for managing and securing cloud-based systems.
Security Architect
Security Architects design and implement security measures to protect an organization's computer networks and systems. They also oversee the security and compliance of security-related systems and processes. This course is an excellent resource for those aspiring to this career path, as it provides a comprehensive overview of identity management concepts and best practices.
Software Developer
Software Developers design, develop, and test computer software. They also maintain and update existing software. This course can be useful for Software Developers who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for developing secure software applications.
Data Analyst
Data Analysts collect, analyze, and interpret data to help organizations make informed decisions. They also develop and implement data-driven solutions. This course can be useful for Data Analysts who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for protecting data and ensuring the integrity of data-driven systems.
Data Scientist
Data Scientists collect, analyze, and interpret data to help organizations make informed decisions. They also develop and implement data-driven solutions. This course can be useful for Data Scientists who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for protecting data and ensuring the integrity of data-driven systems.
Compliance Manager
Compliance Managers help organizations comply with laws and regulations. They also develop and implement compliance policies and procedures. This course can be useful for Compliance Managers who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for ensuring compliance with data protection and privacy regulations.
Security Consultant
Security Consultants assess the security of an organization's computer systems and networks. They also make recommendations for improving security. This course can be useful for Security Consultants who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for assessing the security of IT systems.
Privacy Analyst
Privacy Analysts help organizations comply with privacy laws and regulations. They also develop and implement privacy policies and procedures. This course can be useful for Privacy Analysts who want to gain a deeper understanding of identity management and authentication, as these concepts are essential for protecting personal data.
Identity and Access Management (IAM) Architect
IAM Architects design and implement identity and access management solutions for an organization. They also oversee the security and compliance of IAM-related systems and processes. This course is an excellent resource for IAM Architects, as it provides a comprehensive overview of identity management concepts and best practices.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Active Directory and Entra ID: The Big Picture.
Provides a comprehensive overview of identity management. It covers the concepts of identity, authentication, authorization, and access control, and it provides detailed instructions on how to implement these concepts in a variety of environments.
Provides a comprehensive guide to cloud computing. It covers the concepts of cloud computing, and it provides detailed instructions on how to implement these concepts in the cloud.
Provides a comprehensive overview of cloud security, including topics related to identity management and access control. It valuable resource for those looking to enhance their understanding of cloud security.
Provides a comprehensive guide to secure cloud computing. It covers a wide range of topics, including identity and access management, data protection, and threat protection.
Provides a comprehensive overview of Active Directory, covering a wide range of topics from design and deployment to management and troubleshooting. It valuable resource for both beginners and experienced administrators.
Provides a comprehensive overview of network security, including topics related to authentication and authorization. It offers a solid foundation for those seeking to establish secure network environments.
Offers a broad overview of Windows Server 2019 administration, including topics related to identity management and Active Directory. It provides foundational knowledge for those who want to manage Windows Server environments.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Active Directory and Entra ID: The Big Picture.
Administering Active Directory and Entra ID
Most relevant
Credential Management and Access Control with Active...
Most relevant
Developing Mobile Applications Protected by Azure Active...
Most relevant
Microsoft 365 Administration: Implementing and Managing...
Most relevant
Microsoft Entra Fundamentals
Most relevant
Windows Server 2022 Administration
Most relevant
Microsoft Azure Solutions Architect: Implement an Azure...
Most relevant
Implementing Microsoft Azure Privileged Identity...
Most relevant
Secure Access with Azure Active Directory
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser