We may earn an affiliate commission when you visit our partners.
Neil Morrissey

Modern authentication uses a variety of factors and technologies to verify the identity of a user. This course will teach you how to implement passwordless authentication options, on-premises and in the cloud.

Read more

Modern authentication uses a variety of factors and technologies to verify the identity of a user. This course will teach you how to implement passwordless authentication options, on-premises and in the cloud.

Modern authentication and authorization management goes beyond just managing passwords. In this course, Credential Management and Access Control with Active Directory and Entra ID, you’ll learn how to implement strong, phishing-resistant authentication using a variety of technologies. First, you’ll explore Entra multifactor authentication (MFA). Next, you’ll discover how Active Directory Federation Services can abstract away authentication for applications and how it can be used for integrating with Azure and other organizations. Finally, you’ll learn how to implement passwordless options like Windows Hello for Business and FIDO2 security keys. When you’re finished with this course, you’ll have the skills and knowledge needed to implement passwordless authentication methods in your organization.

Enroll now

What's inside

Syllabus

Course Overview
Microsoft Entra Multifactor Authentication
Active Directory Federation Services
Windows Hello for Business
Read more
Hardware Tokens

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines passwordless authentication options, which is standard in industry
Taught by Neil Morrissey, who are recognized for their work in IT authentication
Emphasizes phishing-resistant authentication, which is highly relevant to cybersecurity
Builds a strong foundation in multi-factor authentication (MFA)
Develops knowledge in Active Directory Federation Services (ADFS)
Provides hands-on labs and interactive materials

Save this course

Save Credential Management and Access Control with Active Directory and Entra ID to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Credential Management and Access Control with Active Directory and Entra ID with these activities:
Review basic cryptography concepts
Strengthen the foundation for understanding authentication by reviewing basic cryptography concepts, enhancing comprehension of encryption and decryption techniques used in authentication.
Browse courses on Cryptography
Show steps
  • Read articles or watch videos on basic cryptography
  • Review notes from previous cryptography courses or tutorials
Configure Azure and Entra MFA
Reinforce your understanding of the configuration process for Azure and Entra MFA by following a guided tutorial.
Show steps
  • Navigate to Azure Portal and create an Active Directory Tenant
  • Configure Entra MFA service in Azure
  • Create and configure authentication methods
  • Test and validate MFA configuration
Attend a workshop on phishing-resistant authentication
Gain practical knowledge in phishing-resistant authentication techniques by attending a workshop, enhancing ability to protect against phishing attacks.
Browse courses on Phishing
Show steps
  • Research phishing-resistant authentication workshops
  • Register for and attend a workshop
  • Participate in hands-on exercises
Six other activities
Expand to see all activities and additional details
Show all nine activities
Discussion forum: Share experiences with implementing passwordless authentication
Gain insights from peers by participating in a discussion forum, sharing experiences and learning from others' implementations of passwordless authentication.
Show steps
  • Join a discussion forum
  • Share your experiences with implementing passwordless authentication
  • Respond to others' posts
Implement two-factor authentication for a web application
Practice implementing multi-factor authentication to secure a web application, improving the security of user accounts.
Show steps
  • Create a new web application
  • Configure the application to use multi-factor authentication
  • Test the multi-factor authentication flow
Tutorial: Configure Active Directory Federation Services for single sign-on
Enhance understanding of single sign-on by following a tutorial to configure Active Directory Federation Services, improving skills in implementing secure authentication.
Show steps
  • Set up a lab environment
  • Install and configure Active Directory Federation Services
  • Configure single sign-on for a web application
Blog post: Explain the best practices for implementing passwordless authentication
Demonstrate understanding of passwordless authentication by creating a blog post that outlines best practices and benefits, enhancing comprehension.
Show steps
  • Research passwordless authentication methods
  • Identify best practices for implementation
  • Write a blog post explaining the best practices
Presentation: Explain the advantages and disadvantages of different authentication methods
Solidify understanding of authentication methods by creating a presentation that compares their advantages and disadvantages, improving decision-making when choosing authentication mechanisms.
Browse courses on Authentication
Show steps
  • Research different authentication methods
  • Identify the advantages and disadvantages of each method
  • Create a presentation summarizing your findings
Hackathon: Implement a secure authentication system for a mobile application
Challenge yourself to implement a secure authentication system in a real-world scenario, applying knowledge of authentication principles and enhancing practical skills.
Browse courses on Authentication
Show steps
  • Form a team or work individually
  • Design and develop an authentication system
  • Submit your solution to the hackathon

Career center

Learners who complete Credential Management and Access Control with Active Directory and Entra ID will develop knowledge and skills that may be useful to these careers:
Identity and Access Management (IAM) Engineer
Credential Management and Access Control with Active Directory and Entra ID is a great course for aspiring Identity and Access Management (IAM) Engineers. It is critical for those in this role to have a strong understanding of how to manage credentials and control access. This course dives deep into these topics.
DevOps Engineer
For a DevOps Engineer, understanding the fundamentals of credential management and access control is important. This course teaches you how to implement various authentication methods, ranging from multi-factor authentication to passwordless options, which is valuable knowledge for DevOps Engineers.
IAM Solutions Architect
IAM Solutions Architects can benefit from this course. You will learn how to implement strong authentication methods, including passwordless options. This is a valuable skill for architects who are tasked with designing and implementing secure authentication systems.
IAM Security Consultant
This course teaches you how to implement strong authentication methods, including passwordless options, which is highly relevant for IAM Security Consultants. They are tasked with securing an organization's infrastructure. This course will provide you with the knowledge and skills you need to do just that.
Security Specialist
Credential Management and Access Control with Active Directory and Entra ID may be useful for Security Specialists. It will teach you how to implement strong authentication options, which is a critical part of developing and maintaining an effective information security system.
Information Systems Administrator
An Information Security Administrator who wishes to gain a deeper understanding of credential management and access control will find this course helpful. It will teach you how to implement multiple authentication methods, which can be vital for securing your organization.
Network Security Engineer
Security Engineers in the networking field will find this course helpful for learning how to implement strong, phishing-resistant authentication. Implementing strong authentication is a critical part of developing and maintaining a secure network.
Security Architect
Credential Management and Access Control with Active Directory and Entra ID may be useful for Security Architects. It will teach you how to implement strong and phishing-resistant authentication options, a valuable tool in securing an organization's data.
IT Security Manager
Technology managers in the security field will find this course helpful as it teaches you how to implement strong authentication methods, including passwordless options. This knowledge can be vital for securing the infrastructure of an organization and protecting sensitive data.
Application Security Engineer
For Application Security Engineers, this course can help you build a foundation in areas such as implementing strong authentication methods. Implementing strong authentication is a critical part of developing and maintaining secure applications.
IT Infrastructure Analyst
This course will prove helpful for those pursuing a career as an IT Infrastructure Analyst. It will teach you how to implement strong authentication methods, which is a critical part of improving and maintaining the security of an organization's infrastructure.
Information Security Analyst
This course may be helpful for Information Security Analysts, as it can teach you how to implement strong authentication methods, including passwordless options. Implementing strong authentication is a critical part of developing and maintaining an effective information security system.
Cybersecurity Specialist
This course may prove helpful to those pursuing a career as a Cybersecurity Specialist. It can help lead to success in this role, since it teaches you how to implement passwordless authentication options, both on-premises and in the cloud. That is valuable knowledge for those seeking to build a strong foundation in cybersecurity.
Security Analyst
Those who wish to transition into the field of Security Analyst may find this course helpful. The course will teach you the skills and knowledge needed to implement strong, phishing-resistant authentication using various technologies. That knowledge can serve as the foundation for a successful career in security analysis.
IT Auditor
This course will prove useful for IT Auditors, since it will teach you how to implement strong authentication methods that can help secure your organization's data. Implementing strong authentication is a critical part of developing and maintaining an effective information security system.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Credential Management and Access Control with Active Directory and Entra ID.
A book that explores the vulnerabilities and weaknesses of multi-factor authentication systems and how to mitigate them.
A comprehensive guide to Active Directory, covering topics such as design, implementation, and management.
Provides an in-depth analysis of advanced security techniques for Active Directory. While it may not directly align with the specific topics covered in the course, it offers valuable insights into securing and hardening Active Directory environments, which fundamental aspect of credential management and access control.
This document provides guidance on the implementation of digital identity systems, including authentication and access control mechanisms.
Provides a comprehensive overview of cryptography and network security, including authentication and access control.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Credential Management and Access Control with Active Directory and Entra ID.
Microsoft 365 Administration: Implementing and Managing...
Most relevant
Active Directory and Entra ID: The Big Picture
Most relevant
Managing Identity Services using AD DS and Microsoft Entra
Most relevant
Administering Active Directory and Entra ID
Most relevant
Implement Windows Server 2019 Identity Federation and...
Most relevant
Microsoft Entra Fundamentals
Most relevant
Windows Server 2022 Administration
Most relevant
Microsoft Azure Solutions Architect: Implement an Azure...
Most relevant
Microsoft Identity and Access: Implement Identities in...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser