- Course
Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID
This course teaches you how to implement and manage Active Directory synchronization with Entra ID, implement and manage different authentication methods, and secure access to M365 by understanding identity protection and policies.
- Course
Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID
This course teaches you how to implement and manage Active Directory synchronization with Entra ID, implement and manage different authentication methods, and secure access to M365 by understanding identity protection and policies.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Core Tech
What you'll learn
In today's digitally connected world, managing identity and access within the Microsoft 365 ecosystem is paramount for organizations of all sizes. In this course, Microsoft 365 Administration: Implementing and Managing Identity and Access in Entra ID, you’ll learn how to effectively implement and manage Active Directory synchronization, manage authentication methods, and how to implement and manage secure access to M365. First, you’ll explore how to plan, manage, implement, monitor, and troubleshoot identity synchronization. Next, you’ll discover how to implement, manage, and troubleshoot authentication methods, including Windows Hello for Business, self-service password reset (SSPR), multi-factor authentication (MFA), and Microsoft Authenticator. Finally, you’ll learn how to plan, implement, and manage identity protection, as well as Conditional Access policies as methods for securing access to M365. When you’re finished with this course, you’ll have the skills and knowledge to successfully perform an Active Directory synchronization to Entra ID, implement and manage M365 authentication methods, and provide secure access by using both identity protection and Conditional Access policies.