Duration - 16 hours
|
Level -
Last Updated Jun 2025
Target Audience
Suggested Certification
Hands on Labs
Course Code
In this workshop, we will learn about the concept of Zero Trust security model, as well as the New Microsoft Entra suite of products. We will learn about the features that Microsoft Entra provides for unified identity management and secure collaborative access. We will discuss how to manage access to resources for hybrid identities and external identities. Risks and how they are remediated using Microsoft Entra Identity Protection, we will also learn about Governance areas like Entitlement management, Identity lifecycle management, Internet and Private access. We will also explore the Permissions management features in Microsoft Entra and how to enable and configure permissions management and Workload identities in your organization’s tenant.
Unfolding Zero Trust
What is Microsoft Entra
Unified identity management with Microsoft Entra
Types of identities
Identity Sync Options
Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync
Microsoft Entra Connect Health
Combined security information registration [MFA + SSPR]
Microsoft Entra roles and role-based access control (RBAC)
Setting up your Microsoft Entra tenant
Detect Identity risks
Investigate Identity risks
Remediate Identity risks
Roles and License requirements
Conditional Access Overview
Microsoft Entra ID Protection
Plan an Identity Protection deployment
Managing External identities
Architecture of CIAM
Planning for customer identity and access management
Implementing Microsoft Entra Identity Protection
Microsoft Entra ID Governance Overview
Identity lifecycle management
Entitlement management
What is Global Secure Access
Configuring Microsoft Entra Internet Access Preview
Configuring Microsoft Entra Private Access
Microsoft Entra Identity Governance
Global Secure Access
Microsoft Entra Permissions Management
Enabling Permissions Management
Configure settings for data collection
Viewing risk metrics in your authorization system
Remediating and monitoring permissions
Configuring Workload Identities
Securing Workload Identities
Conditional Access for Workload Identities
Permissions Management with Microsoft Entra
Workload Identities