In this workshop, we will learn about the concept of Zero Trust security model, as well as the New Microsoft Entra suite of products. We will learn about the features that Microsoft Entra provides for unified identity management and secure collaborative access. We will discuss how to manage access to resources for hybrid identities and external identities. Risks and how they are remediated using Microsoft Entra Identity Protection, we will also learn about Governance areas like Entitlement management, Identity lifecycle management, Internet and Private access. We will also explore the Permissions management features in Microsoft Entra and how to enable and configure permissions management and Workload identities in your organization’s tenant.
Duration - 16 Hours
Level - Advanced
Style - Self paced
Course Type - Project Ready with Labs
Certification - No
Hands on Labs - Yes
Solution Areas - Security, Modern SecOps with Unified Platform
in this module, you will learn about Unfolding Zero Trust, what is Microsoft Entra, Unified identity management with Microsoft Entra, Types of identities, Identity Sync Options, Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync, Microsoft Entra Connect Health, Combined security information registration [MFA + SSPR], Microsoft Entra roles and role-based access control (RBAC)
Learn to detect, investigate, and remediate identity risks using Microsoft Entra ID Protection, along with Identity Risk Management and Conditional Access Optimization agents. Explore roles, licensing, external identity management, and CIAM planning to strengthen secure and scalable identity protection.
Learn Microsoft Entra ID Governance concepts including access reviews, lifecycle management, and entitlement management with automation through Access Review Agent. Explore Microsoft Entra Internet Access and Microsoft Entra Private Access to implement SASE, secure web and AI gateways, and configure modern secure access solutions.
Learn to configure and secure workload identities in Microsoft Entra, including implementing protection strategies for applications and services. Explore Conditional Access for workload identities to enforce secure, policy-driven access across environments.