________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Course description. Smart Cybersecurity with Microsoft: Top Solutions
This course is taught in online mode and consists of 7 units. The duration of the course is 70 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.
Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
The course is taught in teletraining modality (100% bonus option). In-person and remote training actions can also be carried out on demand.
Introduction
In this course you will learn how to design and implement identity security strategies . You will learn how different elements work, such as: conditional and privileged access, role assignment and delegation, security authentication and authorization, access reviews and rights management, etc.
Addressed to
This course is aimed at cybersecurity professionals who want to implement authentication and authorization best practices in their Azure environments.
Course content
- Identity Store Recommendations for Security
- Recommend secure security authentication and authorization strategies
- Conditional access protection
- Design of a strategy for assigning and delegating roles
- Defining identity governance for access reviews and rights management
- Design of a security strategy for privileged role access to the infrastructure
- Design of a security strategy for privileged access
Previous requirements
Participants should have a basic understanding of Azure concepts and services related to identity, access, and governance. Previous experience designing and implementing cloud-based security solutions is also recommended.
Other modalities