Microsoft Identity and Access Administrator Training (SC-300)

Course 8592

  • Duration: 4 days
  • Language: English
  • Level: Intermediate

The Microsoft Identity and Access Administrator course explores using Azure AD to design, implement, and operate an organization’s identity and access management systems. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions, ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with other organizational roles to drive strategic identity projects. The goal is to provide you with the knowledge to modernize identity solutions, implement hybrid identity solutions, and implement identity governance.

SC-300 Delivery Methods

  • In-Person

  • Online

SC-300 Course Information

In this Identity and Access Administrator course, you will learn how to:

  • Implement an identity management solution.
  • Implement authentication and access management solutions.
  • Implement access management for apps.
  • Plan and implement an identity governance strategy.
  • Continue learning and face new challenges with after-course one-on-one instructor coaching.

SC-300 Training Course Prerequisites

Successful learners will have prior knowledge and understanding of:

  • Security best practices and industry security requirements such as defense in depth, least privileged access, shared responsibility, and zero trust model.
  • Be familiar with identity concepts such as authentication, authorization, and active directory.
  • Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration. Instead, the course content builds on that knowledge by adding security-specific information.
  • Some experience with Windows and Linux operating systems and scripting languages is helpful but not required. Course labs may use PowerShell and the CLI.
  • Microsoft Security, Compliance, and Identity Fundamentals Training (SC-900) and Microsoft Azure Administrator Training (AZ-104)

SC-300 Certification Information

This course helps you prepare for Exam SC-300: Microsoft Identity and Access Administrator.

SC-300 Training Outline

This module covers definitions and available services for identity provided in Azure AD to Microsoft 365. You start with authentication, authorization, and access tokens, then build into total identity solutions.

By the end of this module, you'll be able to:

  • Define standard identity terms and explain how they're used in the Microsoft Cloud
  • Explore the standard management tools and needs of an identity solution
  • Review the goal of Zero Trust and how it's applied in the Microsoft Cloud
  • Explore the available identity services in the Microsoft Cloud

    Learn to create an initial Azure Active Directory configuration to ensure all the identity solutions available in Azure are ready to use. This module explores how to build and configure an Azure AD system.

    By the end of this module, you will be able to:

    • Implement initial configuration of Azure Active Directory
    • Create, configure, and manage identities
    • Implement and manage external identities (excluding B2C scenarios)
    • Implement and manage hybrid identity

      Access to cloud-based workloads must be controlled centrally by providing a definitive identity for each user and resource. You can ensure employees and vendors have enough access to do their job.

      At the end of this module, you'll be able to:

      • Create, configure, and manage users
      • Create, configure, and manage groups
      • Manage licenses
      • Explain custom security attributes and automatic user provisioning

        Inviting external users to use company Azure resources is a great benefit, but you want to do it securely. Explore how to enable secure external collaboration.

        By the end of this module, you will be able to:

        • Manage external collaboration settings in Azure Active Directory
        • Invite external users (individually or in bulk)
        • Manage external user accounts in Azure Active Directory
        • Configure identity providers (social and SAML/WS-fed)

          Creating a hybrid-identity solution to use your on-premises active directory can be challenging. Explore how to implement a secure hybrid-identity solution.

          By the end of this module, you will be able to:

          • Plan, design, and implement Azure Active Directory Connect (AADC)
          • Manage Azure Active Directory Connect (AADC)
          • Manage password hash synchronization (PHS)
          • Manage pass-through authentication (PTA)
          • Manage seamless single sign-on (seamless SSO)
          • Manage federation, excluding manual ADFS deployments
          • Troubleshoot synchronization errors
          • Implement and manage Azure Active Directory Connect Health

            Learn how to use multi-factor authentication with Azure AD to harden your user accounts.

            In this module, you will:

            • Learn about Azure AD Multi-Factor Authentication (Azure AD MFA)
            • Create a plan to deploy Azure AD MFA
            • Turn on Azure AD MFA for users and specific apps

              There are multiple options for authentication in Azure AD. Learn how to implement and manage user authentications based on business needs.

              By the end of this module, you will be able to:

              • Administer authentication methods (FIDO2 / Passwordless)
              • Implement an authentication solution based on Windows Hello for Business
              • Configure and deploy self-service password reset
              • Deploy and manage password protection
              • Implement and manage tenant restrictions

                Conditional Access gives a fine granularity of control over which users can do specific activities, access to which resources, and how to ensure data and systems are safe.

                By the end of this module, you will be able to:

                • Plan and implement security defaults.
                • Plan conditional access policies.
                • Implement conditional access policy controls and assignments (targeting, applications, and conditions).
                • Test and troubleshoot conditional access policies.
                • Implement application controls.
                • Implement session management.
                • Configure bright lockout thresholds.

                  Protecting users' identity by monitoring their usage and sign-in patterns will ensure a secure cloud solution. Explore how to design and implement Azure AD Identity protection.

                  By the end of this module, you will be able to:

                  • Implement and manage a user risk policy
                  • Implement and manage sign-in risk policies
                  • Implement and manage the MFA registration policy
                  • Monitor, investigate, and remediate elevated risky users

                    Explore using built-in Azure roles, managed identities, and RBAC policy to control access to Azure resources. Identity is the key to secure solutions.

                    By the end of this module, you will be able to:

                    • Configure and use Azure roles within Azure AD
                    • Configure and manage identity and assign it to Azure resources
                    • Analyze the role permissions granted to or inherited by a user
                    • Configure access to data in Azure Key Vault using RBAC-policy

                      Enterprise app deployment enables control over which users can access the apps, easily log into apps with single sign-on, and provide integrated usage reports.

                      By the end of this module, you'll be able to:

                      • Discover apps by using the MCAS or ADFS app report.
                      • Design and implement access management for apps.
                      • Design and implement app management roles.
                      • Configure pre-integrated (gallery) SaaS apps.

                        Deploying and monitoring enterprise applications to Azure solutions can ensure security. Explore how to deploy on-premises and cloud-based apps to users.

                        By the end of this module, you will be able to:

                        • Implement token customizations
                        • Implement and configure consent settings
                        • Integrate on-premises apps by using Azure AD application proxy
                        • Integrate custom SaaS apps for SSO
                        • Implement application user provisioning
                        • Monitor and audit access/Sign-On to Azure Active Directory-integrated enterprise applications

                          Line of business developed in-house needs registration in Azure AD and assigned to users for a secure Azure solution. Explore how to implement app registration.

                          By the end of this module, you will be able to:

                          • Plan your line of business application registration strategy
                          • Implement application registrations
                          • Configure application permissions
                          • Plan and configure multi-tier application permissions

                            When new or external users join your site, quickly assigning them Access to Azure solutions is necessary. Explore how to entitle users to access your site and resources.

                            By the end of this module, you will be able to:

                            • Define catalogs.
                            • Define access packages.
                            • Plan, implement and manage entitlements.
                            • Implement and manage terms of use.
                            • Manage the lifecycle of external users in Azure AD Identity Governance settings.

                              Once identity is deployed, proper governance using access reviews is necessary for a secure solution. Explore how to plan for and implement access reviews.

                              By the end of this module, you will be able to:

                              • Plan for access reviews
                              • Create access reviews for groups and apps
                              • Monitor the access review findings
                              • Manage licenses for access reviews
                              • Automate management tasks for access review
                              • Configure recurring access reviews

                                Ensuring administrative roles are protected and managed to increase your Azure solution security is necessary. Explore how to use PIM to protect your data and resources.

                                By the end of this module, you will be able to:

                                • Define a privileged access strategy for administrative users (resources, roles, approvals, and thresholds).
                                • Configure Privileged Identity Management for Azure AD roles
                                • Configure Privileged Identity Management for Azure resources
                                • Assign roles
                                • Manage PIM requests
                                • Analyze PIM audit history and reports
                                • Create and manage emergency access accounts

                                  Azure AD audit and diagnostic logs provide a rich view of how users access our Azure solution. Learn to monitor, troubleshoot, and analyze sign-in data.

                                  By the end of this module, you'll be able to:

                                  • Analyze and investigate sign-in logs to troubleshoot access issues
                                  • Review and monitor Azure AD audit logs
                                  • Enable and integrate Azure AD diagnostic logs with Log Analytics / Azure Sentinel
                                  • Export sign-in and audit logs to a third-party SIEM (security information and event management)
                                  • Review Azure AD activity by using Log Analytics / Azure Sentinel, excluding KQL (Kusto Query Language) use
                                  • Analyze Azure Active Directory workbooks/reporting
                                  • Configure notifications

                                  Need Help Finding The Right Training Solution?

                                  Our training advisors are here for you.

                                  SC-300 Course FAQs

                                  Yes! This class prepares an attendee for the Microsoft Exam SC-300: Microsoft Identity and Access Administrator.

                                  The Microsoft identity and access administrator designs, implements, and operates an organization’s identity and access management systems using Azure Active Directory (Azure AD). They configure and manage authentication and authorization of identities for users, devices, Azure resources, and applications.

                                  The identity and access administrator provides seamless experiences and self-service management capabilities for all users. They ensure that identity is verified explicitly to support Zero Trust principles. They automate the management of Azure AD by using PowerShell and analyze events using Kusto Query Language (KQL). They are also responsible for troubleshooting, monitoring, and reporting for the identity and access environment.

                                  The identity and access administrator collaborates with many other roles in the organization to drive strategic identity projects, modernize identity solutions, implement hybrid identity solutions, and implement identity governance. Therefore, they should be familiar with Azure and Microsoft 365 services and workloads.

                                  This course is for the Identity and Access Administrators planning to take the associated certification exam or performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions, playing an integral role in protecting an organization.

                                  Chat With Us