Skip to main content

Managing Identity

Provided by Microsoft
Intermediate
See prerequisites
2–3 hours
per week, for 4 weeks
Free

$99 USD for graded exams and assignments, plus a certificate

As you build a cybersecurity defense plan, learn best practices around Active Directory, Azure Active Directory, and identity management.

Before you start

  • Experience with Windows Client administration, maintenance and troubleshooting.
  • Introductory level knowledge of Active Directory
  • Be good at accessing and using simple Windows PowerShell commands.
Course opens: Jul 1, 2019
Course ends: Oct 1, 2019

What you will learn

  • How identity is the new control plane, the perimeter that is replacing the firewall.
  • The recommended steps to secure Active Directory.
  • Azure Security Architecture and the Identity Federation and access solutions supported by Azure architecture.
  • How Kerberos and Privilege Attribute Certification function.
Module 1: Managing Identity, the new Control Plane
Module 2: Securing Active Directory
Module 3: Azure Active Directory
Module 4: Authentication and Authorization in Active Directory

Overview

This course is part of the Microsoft Professional Program in Cybersecurity.

With identity as the new perimeter in today’s security landscape, it’s important to keep up on the latest ways to manage it. Identity—which defines what protocols you’re allowed to use, who you’re allowed to interact with, and what you’re allowed to do—has evolved significantly in the last few years.

In this security course, go beyond the firewall and ports, and learn practical steps and prescriptive guidance on identity management, based on proven, real-world experience from Microsoft Incident Response teams.

Start with a conceptual look at identity, explore Active Directory best practices, find out how to secure Azure Active Directory, and then get hands-on with a combination of videos, text, and hosted labs.

You will create a protective bastion host for an existing domain, configure Privilege Access Management (PAM) and Just in Time Administration (JIT), install JRE, and set up Microsoft Identity Manager. With successful course completion, you will understand the hows and whys of improving the security posture of your environment, and get started implementing and managing identity as part of your cybersecurity defense plan.

Meet your instructors

Philip E. Helsel
Senior Content Developer, Learning eXperiences Team
Microsoft
Kimberly Rasmusson-Anderson
Senior Content Developer, Learning eXperiences Team
Microsoft
View Courses
Of all edX learners:
73% are employed
Of all edX learners:
45% have children
Based on internal survey results
421,273 people are learning on edX today