- Module 1: This module introduces students to the various authentication methods used to protect identities.
After this module, you should be able to:
- Describe Windows Hello for Business
- Describe Windows Hello deployment and management
- Describe Azure AD Identity Protection
- Describe and manage self-service password reset in Azure AD
- Describe and manage multi-factor authentication
- Module 2: This module describes how clients can be configured to access organizational resources using a virtual private network (VPN).
- Describe how you can access corporate resources
- Describe VPN types and configuration
- Describe Always On VPN
- Describe how to configure Always On VPN
- Module 3: This module describes how to use compliance and conditional access policies to help protect access to organizational resources.
After this module, you should be able to:
- Describe device compliance policy
- Deploy a device compliance policy
- Describe conditional access
- Create conditional access policies
- Module 4: This module describes how to use Microsoft Endpoint Manager and Power BI to create compliance and custom reports.
After this module, you should be able to:
- Generate inventory reports and Compliance reports using Microsoft Intune
- Report and monitor device compliance
- Create custom reports using the Intune Data Warehouse
- Use the Microsoft Graph API for building custom reports
Overview
Syllabus
- Module 1: Module 1: Protect identities in Azure AD
- Introduction
- Explore Windows Hello for Business
- Deploy Windows Hello
- Manage Windows Hello for Business
- Explore Azure AD identity protection
- Manage self-service password reset in Azure AD
- Implement Azure Active Directory Multi-Factor Authentication
- Knowledge check
- Summary
- Module 2: Module 2: Enable organizational access
- Introduction
- Enable access to organization resources
- Explore VPN types and configuration
- Explore Always On VPN
- Deploy Always On VPN
- Knowledge check
- Summary
- Module 3: Module 3: Implement device compliance policies
- Introduction
- Protect access to resources using Intune
- Explore device compliance policy
- Deploy a device compliance policy
- Explore conditional access
- Create conditional access policies
- Knowledge check
- Summary
- Module 4: Module 4: Generate inventory and compliance reports
- Introduction
- Report enrolled devices inventory in Intune
- Monitor and report device compliance
- Build custom Intune inventory reports
- Access Intune using Microsoft Graph API
- Knowledge check
- Summary