Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 1: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Configure and manage built-in and custom Microsoft Entra roles
Chapter 2: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Recommend when to use administrative units
Chapter 3: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Configure and manage administrative units
Chapter 4: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Evaluate effective permissions for Microsoft Entra roles
Chapter 5: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Configure and manage domains in Microsoft Entra ID and Microsoft 365
Chapter 6: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Configure Company branding settings
Chapter 7: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Configure tenant properties, user settings, group settings, and device settings
Chapter 8: Implement and manage user identities -Create, configure, and manage Microsoft Entra identities-Create, configure, and manage users
Chapter 9: Implement and manage user identities -Create, configure, and manage Microsoft Entra identities-Create, configure, and manage groups
Chapter 10: Implement and manage user identities -Create, configure, and manage Microsoft Entra identities-Manage custom security attributes
Chapter 11: Implement and manage user identities -Create, configure, and manage Microsoft Entra identities-Automate bulk operations by using the Microsoft Entra admin center and PowerShell
Chapter 12: Implement and manage user identities -Create, configure, and manage Microsoft Entra identities-Manage device join and device registration in Microsoft Entra ID
Chapter 13: Implement and manage user identities -Create, configure, and manage Microsoft Entra identities-Assign, modify, and report on licenses
Chapter 14: Implement and manage user identities -Implement and manage identities for external users and tenants-Manage External collaboration settings in Microsoft Entra ID
Chapter 15: Implement and manage user identities -Implement and manage identities for external users and tenants-Invite external users, individually or in bulk
Chapter 16: Implement and manage user identities -Implement and manage identities for external users and tenants-Manage external user accounts in Microsoft Entra ID
Chapter 17: Implement and manage user identities -Implement and manage identities for external users and tenants-Implement Cross-tenant access settings
Chapter 18: Implement and manage user identities -Implement and manage identities for external users and tenants-Implement and manage cross-tenant synchronization
Chapter 19: Implement and manage user identities -Implement and manage identities for external users and tenants-Configure external identity providers, including protocols such as SAML and WS-Fed
Chapter 20: Implement and manage user identities -Implement and manage hybrid identity-Implement and manage Microsoft Entra Connect Sync
Chapter 21: Implement and manage user identities -Implement and manage hybrid identity-Implement and manage Microsoft Entra Cloud Sync
Chapter 22: Implement and manage user identities -Implement and manage hybrid identity-Implement and manage password hash synchronization
Chapter 23: Implement and manage user identities -Implement and manage hybrid identity-Implement and manage pass-through authentication
Chapter 24: Implement and manage user identities -Implement and manage hybrid identity-Implement and manage seamless single sign-on (SSO)
Chapter 25: Implement and manage user identities -Implement and manage hybrid identity-Migrate from AD FS to other authentication and authorization mechanisms
Chapter 26: Implement and manage user identities -Implement and manage hybrid identity-Implement and manage Microsoft Entra Connect Health
Chapter 27: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Plan for authentication
Chapter 28: Implement and manage authentication methods, including certificate-based, temporary access pass, OAUTH tokens, Microsoft Authenticator, and FIDO2
Chapter 29: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Implement and manage tenant-wide Multi-factor Authentication (MFA) settings
Chapter 30: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Configure and deploy self-service password reset (SSPR)
Chapter 31: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Implement and manage Windows Hello for Business
Chapter 32: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Disable accounts and revoke user sessions
Chapter 33: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Implement and manage Microsoft Entra password protection
Chapter 34: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Enable Microsoft Entra Kerberos authentication for hybrid identities
Chapter 35: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Plan Conditional Access policies
Chapter 36: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Implement Conditional Access policy assignments
Chapter 37: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Implement Conditional Access policy controls
Chapter 38: -Plan, implement, and manage Microsoft Entra Conditional Access-Test and troubleshoot Conditional Access policies
Chapter 39: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Implement session management
Chapter 40: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Implement device-enforced restrictions
Chapter 41: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Implement continuous access evaluation
Chapter 42: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Configure authentication context
Chapter 43: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Implement protected actions
Chapter 44: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Create a Conditional Access policy from a template
Chapter 45: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Implement and manage user risk by using Identity Protection or Conditional Access policies
Chapter 46: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Implement and manage sign-in risk by using Identity Protection or Conditional Access policies
Chapter 47: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Implement and manage Multifactor authentication registration policies
Chapter 48: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Monitor, investigate and remediate risky users and risky sign-ins
Chapter 49: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Monitor, investigate, and remediate risky workload identities
Chapter 50: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Create custom Azure roles, including both control plane and data plane permissions
Chapter 51: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Assign built-in and custom Azure roles
Chapter 52: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Evaluate effective permissions for a set of Azure roles
Chapter 53: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Assign Azure roles to enable Microsoft Entra ID login to Azure virtual machines
Chapter 54: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Configure Azure Key Vault role-based access control (RBAC) and access policies
Chapter 55: Implement authentication and access management -Implement Global Secure Access-Deploy Global Secure Access clients
Chapter 56: Implement authentication and access management -Implement Global Secure Access-Deploy Private Access
Chapter 57: Implement authentication and access management -Implement Global Secure Access-Deploy Internet Access
Chapter 58: Implement authentication and access management -Implement Global Secure Access-Deploy Internet Access for Microsoft 365
Chapter 59: Select appropriate identities for applications and Azure workloads, including managed identities, service principals, user accounts, and managed service accounts
Chapter 61: Assign a managed identity to an Azure resource
Chapter 62: Use a managed identity assigned to an Azure resource to access other Azure resources
Chapter 63: Plan, implement, and monitor the integration of enterprise applications-Plan and implement settings for enterprise applications, including application-level and tenant-level settings
Chapter 64: Plan, implement, and monitor the integration of enterprise applications-Assign appropriate Microsoft Entra roles to users to manage enterprise applications
Chapter 65: Plan, implement, and monitor the integration of enterprise applications-Design and implement integration for on-premises apps by using Microsoft Entra Application Proxy
Chapter 66: Plan, implement, and monitor the integration of enterprise applications-Design and implement integration for software as a service (SaaS) apps
Chapter 67: Plan, implement, and monitor the integration of enterprise applications-Assign, classify, and manage users, groups, and app roles for enterprise applications
Chapter 68: Plan, implement, and monitor the integration of enterprise applications-Configure and manage user and admin consent
Chapter 69: Plan, implement, and monitor the integration of enterprise applications-Create and manage application collections
Chapter 70: Plan and implement app registrations-Plan for app registrations
Chapter 71: Plan and implement app registrations-Create app registrations
Chapter 72: Plan and implement app registrations-Configure app authentication
Chapter 73: Plan and implement app registrations-Configure API permissions
Chapter 74: Plan and implement app registrations-Create app roles
Chapter 75: Manage and monitor app access by using Microsoft Defender for Cloud Apps-Configure and analyze cloud discovery results by using Defender for Cloud Apps
Chapter 76: Manage and monitor app access by using Microsoft Defender for Cloud Apps-Configure connected apps
Chapter 77: Manage and monitor app access by using Microsoft Defender for Cloud Apps-Implement application-enforced restrictions
Chapter 78: Manage and monitor app access by using Microsoft Defender for Cloud Apps-Configure Conditional Access app control
Chapter 79: Manage and monitor app access by using Microsoft Defender for Cloud Apps-Create access and session policies in Defender for Cloud Apps
Chapter 80: Manage and monitor app access by using Microsoft Defender for Cloud Apps-Implement and manage policies for OAuth apps
Chapter 81: Manage and monitor app access by using Microsoft Defender for Cloud Apps-Manage the Cloud app catalog
Chapter 82: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Plan entitlements
Chapter 83: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Create and configure catalogs
Chapter 84: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Create and configure access packages
Chapter 85: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Manage access requests
Chapter 86: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Implement and manage terms of use (ToU)
Chapter 87: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Manage the lifecycle of external users
Chapter 88: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Configure and manage connected organizations
Chapter 89: Plan and automate identity governance -Plan, implement, and manage access reviews in Microsoft Entra-Plan for access reviews
Chapter 90: Plan and automate identity governance -Plan, implement, and manage access reviews in Microsoft Entra-Create and configure access reviews
Chapter 91: Plan and automate identity governance -Plan, implement, and manage access reviews in Microsoft Entra-Monitor access review activity
Chapter 92: Plan and automate identity governance -Plan, implement, and manage access reviews in Microsoft Entra-Manually respond to access review activity
Chapter 93: Plan and automate identity governance -Plan and implement privileged access-Plan and manage Microsoft Entra roles in Microsoft Entra Privileged Identity Management (PIM), including settings and assignments
Chapter 94: Plan and automate identity governance -Plan and implement privileged access-Plan and manage Azure resources in PIM, including settings and assignments
Chapter 95: Plan and automate identity governance -Plan and implement privileged access-Plan and configure groups managed by PIM
Chapter 96: Plan and automate identity governance -Plan and implement privileged access-Manage the PIM request and approval process
Chapter 98: Plan and automate identity governance -Plan and implement privileged access-Create and manage break-glass accounts
Chapter 99: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Review and analyze sign-in, audit, and provisioning logs by using the Microsoft Entra admin center
Chapter 100: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Configure diagnostic settings, including configuring destinations such as Log Analytics workspaces, storage accounts, and event hubs
Chapter 101: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Monitor Microsoft Entra ID by using KQL queries in Log Analytics
Chapter 102: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Analyze Microsoft Entra ID by using workbooks and reporting
Chapter 103: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Monitor and improve the security posture by using Identity Secure Score
Chapter 104: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Onboard Azure subscriptions to Permissions Management
Chapter 105: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Evaluate and remediate risks relating to Azure identities, resources, and tasks
Chapter 106: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Evaluate and remediate risks relating to Azure highly privileged roles
Chapter 107: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Evaluate and remediate risks relating to Permissions Creep Index (PCI) in Azure
Chapter 108: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Configure activity alerts and triggers for Azure subscriptions

Combo Packages at a Discount: Get one that best fits your learning needs.