Privileged identity management is emerging as one of the hottest topics in cybersecurity. In this course, you’ll learn how to use Microsoft PIM to manage, control, and monitor access within Azure AD, Azure resources, and Microsoft Online Services.
Cybercriminals are relentless when it comes to finding and compromising their targets’ privileged credentials to gain unfettered access to critical assets. In this course, Implementing Microsoft Azure Privileged Identity Management, you will receive the most up-to-date knowledge on how to mitigate these security risks and to achieve compliance by securing, controlling, monitoring, analyzing, and governing privileged access on Azure AD, Azure resources, and Microsoft online services. First, you will learn how to quickly enable Microsoft PIM in your Azure tenant along with the licensing requirements to do so. Next, you will explore the concept of just in time access and just enough administration that will help you configure Microsoft PIM properly. Finally, you will get all the knowledge you need to enable workflow approval and access reviews along with some best practices that will help you properly manage PIM to meet your business needs. When you are finished with this course, you will have the skills and knowledge you need to enhance your overall security and compliance with more efficient administration and governance of privileged access.
Course Overview Hi everyone. My name is Ammar Hasayen, and welcome to my course, Implementing Microsoft Azure Privileged Identity Management. I'm a Microsoft MVP, security expert, have a bunch of certifications, and speak at international conferences about Microsoft 365 and Azure. Most of my work these days is with cloud computing and secure infrastructure. Privileged identity management is emerging as one of the hottest topics in cybersecurity. In this course, you will learn how to use Microsoft Privileged Identity Management solution to manage, control, and monitor access within Azure AD, Azure resources, and Microsoft Online Services. Some of the major topics that we will cover include what is Microsoft Privileged Identity Management and how to enable it in your tenant, when to use just-in-time access to activate a role, how to configure approval workflow before activating that role, and how to use access reviews to mitigate the risk of said admins. By the end of this course, you will know how Microsoft Privileged Identity Management can help you mitigate the risk of compromised privileged identities in your organization. Before beginning this course, you should be familiar with Azure and Azure role-based access control. I hope you will join me on this journey to learn how to protect privileged identities, with the Implementing Azure Privileged Identity Management course, at Pluralsight.