- Module 1: This module introduces students to the various authentication methods used to protect identities.
After this module, you should be able to:
- Describe Windows Hello for Business
- Describe Windows Hello deployment and management
- Describe Microsoft Entra ID Protection
- Describe and manage self-service password reset in Microsoft Entra ID
- Describe and manage multi-factor authentication
- Module 2: This module describes how clients can be configured to access organizational resources using a virtual private network (VPN).
After this module, you should be able to:
- Describe how you can access corporate resources
- Describe VPN types and configuration
- Describe Always On VPN
- Describe how to configure Always On VPN
- Module 3: This module describes how to use compliance and conditional access policies to help protect access to organizational resources.
After this module, you should be able to:
- Describe device compliance policy
- Deploy a device compliance policy
- Describe conditional access
- Create conditional access policies
- Module 4: This module describes how to use Microsoft Endpoint Manager and Power BI to create compliance and custom reports.
After this module, you should be able to:
- Generate inventory reports and Compliance reports using Microsoft Intune
- Report and monitor device compliance
- Create custom reports using the Intune Data Warehouse
- Use the Microsoft Graph API for building custom reports
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Syllabus
- Module 1: Module 1: Protect identities in Microsoft Entra ID
- Introduction
- Explore Windows Hello for Business
- Deploy Windows Hello
- Manage Windows Hello for Business
- Explore Microsoft Entra ID Protection
- Manage self-service password reset in Microsoft Entra ID
- Implement multi-factor authentication
- Knowledge check
- Summary
- Module 2: Module 2: Enable organizational access
- Introduction
- Enable access to organization resources
- Explore VPN types and configuration
- Explore Always On VPN
- Deploy Always On VPN
- Knowledge check
- Summary
- Module 3: Module 3: Implement device compliance
- Introduction
- Protect access to resources using Intune
- Explore device compliance policy
- Deploy a device compliance policy
- Explore conditional access
- Create conditional access policies
- Knowledge check
- Summary
- Module 4: Module 4: Generate inventory and compliance reports
- Introduction
- Report enrolled devices inventory in Intune
- Monitor and report device compliance
- Build custom Intune inventory reports
- Access Intune using Microsoft Graph API
- Knowledge check
- Summary