-
Book Overview & Buying
-
Table Of Contents
Microsoft Identity and Access Administrator Exam Guide
By :
Microsoft Identity and Access Administrator Exam Guide
By:
Overview of this book
Cloud technologies have made identity and access the new control plane for securing data. Without proper planning and discipline in deploying, monitoring, and managing identity and access for users, administrators, and guests, you may be compromising your infrastructure and data. This book is a preparation guide that covers all the objectives of the SC-300 exam, while teaching you about the identity and access services that are available from Microsoft and preparing you for real-world challenges.
The book starts with an overview of the SC-300 exam and helps you understand identity and access management. As you progress to the implementation of IAM solutions, you’ll learn to deploy secure identity and access within Microsoft 365 and Azure Active Directory. The book will take you from legacy on-premises identity solutions to modern and password-less authentication solutions that provide high-level security for identity and access. You’ll focus on implementing access and authentication for cloud-only and hybrid infrastructures as well as understand how to protect them using the principles of zero trust. The book also features mock tests toward the end to help you prepare effectively for the exam.
By the end of this book, you’ll have learned how to plan, deploy, and manage identity and access solutions for Microsoft and hybrid infrastructures.
Table of Contents (24 chapters)
Preface
Section 1 – Exam Overview and the Evolution of Identity and Access Management
Chapter 1: Preparing for Your Microsoft Exam
Chapter 2: Defining Identity and Access Management
Section 2 - Implementing an Identity Management Solution
Chapter 3: Implementing and Configuring Azure Active Directory
Chapter 4: Creating, Configuring, and Managing Identities
Chapter 5: Implementing and Managing External Identities and Guests
Chapter 6: Implementing and Managing Hybrid Identities
Section 3 – Implementing an Authentication and Access Management Solution
Chapter 7: Planning and Implementing Azure Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR)
Chapter 8: Planning and Managing Password-Less Authentication Methods
Chapter 9: Planning, Implementing, and Administering Conditional Access and Azure Identity Protection
Section 4 – Implementing Access Management for Applications
Chapter 10: Planning and Implementing Enterprise Apps for Single Sign-On (SSO)
Chapter 11: Monitoring Enterprise Apps with Microsoft Defender for Cloud Apps
Section 5 – Planning and Implementing an Identity Governance Strategy
Chapter 12: Planning and Implementing Entitlement Management
Chapter 13: Planning and Implementing Privileged Access and Access Reviews
Section 6 – Monitoring and Maintaining Azure Active Directory
Chapter 14: Analyzing and Investigating Sign-in Logs and Elevated Risk Users
Chapter 15: Enabling and Integrating Azure AD Logs with SIEM Solutions
Chapter 16: Mock Test
Other Books You May Enjoy