Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Azure Active Directory Privileged Identity Management simplifies monitoring, controlling, and management of users' access on different Azure resources. In this course, you will learn how to enforce security governance using PIM.
Cybercriminals are relentless when it comes to finding and compromising their targets’ privileged credentials to gain unfettered access to critical assets. In this course, Implementing Microsoft Azure Privileged Identity Management, you will receive the most up-to-date knowledge on how to mitigate these security risks and to achieve compliance by securing, controlling, monitoring, analyzing, and governing privileged access on Azure AD, Azure resources, and Microsoft online services. First, you will learn how to quickly enable Microsoft PIM in your Azure tenant along with the licensing requirements to do so. Next, you will explore the concept of just in time access and just enough administration that will help you configure Microsoft PIM properly. Finally, you will get all the knowledge you need to enable workflow approval and access reviews along with some best practices that will help you properly manage PIM to meet your business needs. When you are finished with this course, you will have the skills and knowledge you need to enhance your overall security and compliance with more efficient administration and governance of privileged access.
Cybercriminals are relentless when it comes to finding and compromising their targets’ privileged credentials to gain unfettered access to critical assets. In this course, Implementing Microsoft Azure Privileged Identity Management, you will receive the most up-to-date knowledge on how to mitigate these security risks and to achieve compliance by securing, controlling, monitoring, analyzing, and governing privileged access on Azure AD, Azure resources, and Microsoft online services. First, you will learn how to quickly enable Microsoft PIM in your Azure tenant along with the licensing requirements to do so. Next, you will explore the concept of just in time access and just enough administration that will help you configure Microsoft PIM properly. Finally, you will get all the knowledge you need to enable workflow approval and access reviews along with some best practices that will help you properly manage PIM to meet your business needs. When you are finished with this course, you will have the skills and knowledge you need to enhance your overall security and compliance with more efficient administration and governance of privileged access.