Managing Microsoft Azure Identity and Security

Authors: Ned Bellavance, Gary Grudzinskas, Ammar Hasayen, Daniel Lachance, Neil Morrissey

No cloud solution can be complete without a strong focus on security, and on managing the identities of the individuals who will use and manage your cloud resources. This path... Read more


The courses in this section will teach you the fundamentals for identity and security, which focus on resource groups.

Using Microsoft Azure Resource Groups

by Gary Grudzinskas

Aug 27, 2018 / 1h 26m

1h 26m

Start Course

Microsoft Azure offers numerous helpful resources. However, managing all these resources can be daunting. In this course, Using Microsoft Azure Resource Groups, you will gain the ability to manage and secure your resources. First, you will learn how to set up resource groups. Next, you will discover the tools available for you to safeguard and fully utilize your resources. Finally, you will explore how to move, monitor, and control your resource groups. When you are finished with this course, you will have the skills and knowledge of resource groups that will help you properly utilize your Azure resources.

Table of contents
  1. Course Overview1m
  2. Configuring Resource Groups23m
  3. Securing and Controlling for Resource Groups30m
  4. Maintaining Resource Groups30m


These intermediate courses will take you through some of the more intricate elements within identity and security, focusing on identity management and information protection.

Managing Microsoft Azure Subscriptions

by Daniel Lachance

Aug 10, 2018 / 1h 58m

1h 58m

Start Course

Managing Microsoft Azure costs and resource management delegation can save companies money. In this course, Managing Microsoft Azure Subscriptions, you'll gain the knowledge required to control cloud resource creation and management while minimizing costs. First, you'll learn about resource tagging and how Microsoft Azure policies provide granular resource management control. Next, you'll learn how to budget, track, and reduce Microsoft Azure expenditures using a variety of methods. Finally, you'll gain insight as to how role-based access control facilitates delegated administration and how Microsoft Azure resource providers add new cloud features. By the end of this course, you’ll know which tools you can use to effectively manage Azure resources and costs.

Table of contents
  1. Course Overview1m
  2. Configuring Microsoft Azure Policies53m
  3. Configure Resource Tagging and Cost Center Spending Limits30m
  4. Assign Role-based Access Control18m
  5. Manage Microsoft Azure Resource Providers15m

Implementing and Managing Azure Multi-factor Authentication

by Neil Morrissey

Jan 4, 2017 / 5h 47m

5h 47m

Start Course

Username and password authentication is susceptible to many forms of attacks, and multi-factor authentication offers a way to mitigate this threat. Azure multi-factor authentication is a global service that allows you to add a second factor of authentication to your on-premises and cloud based systems using a hardware device already in the hands of your users and customers - their mobile phone. In this course, Implementing and Managing Azure Multi-factor Authentication, you'll learn how to configure Azure MFA in the cloud and on-premises. First you'll learn the self-service options available to users and business administrators, and how to integrate Azure MFA with a variety of technologies and applications. Next, you'll explore the configuration options to integrate Azure MFA with your existing systems. Finally, you'll learn how developers can code against the APIs for even deeper integration. By the end of this course, you’ll know how to deploy, configure, and monitor Azure MFA, in the cloud and on-premises.

Table of contents
  1. Course Overview1m
  2. Understanding Azure Multi-factor Authentication39m
  3. Configuring Azure MFA in the Cloud32m
  4. Implementing Azure MFA Server On-premises31m
  5. Integrating Azure MFA with On-premises Systems52m
  6. The MFA User Portal for Self-service and Administration42m
  7. Configuring the Microsoft Authenticator and OATH Clients33m
  8. Custom App Integration with the Azure SDKs46m
  9. Protecting Cloud-based Applications39m
  10. Monitoring and Reporting with Azure MFA28m

Managing Identities in Microsoft Azure Active Directory

by Ned Bellavance

Aug 6, 2018 / 2h 7m

2h 7m

Start Course

Securing access and authorization to your applications, data, and resources is critical to protecting your enterprise assets. You must provide proper access to users and devices when they need it, without being overly permissive. Microsoft Azure Active Directory can be leveraged to achieve those goals. In this course, Managing Identities in Microsoft Azure Active Directory, you will learn the fundamentals of managing an Azure Active Directory environment. First, you will learn the basics of an Azure Active Directory tenant. Next, you will explore how to manage users, groups, devices, and applications. Finally, you will examine how to leverage special features like Conditional Access and Self-service Password Reset to give your users a modern, protected experience. By the end of this course, you will be able to manage your Azure Active Directory environment effectively, use advanced features to improve the end-user experience, and provide higher security to your organization.

Table of contents
  1. Course Overview1m
  2. Configuring Directories in Azure AD25m
  3. Managing Azure Active Directory Users and Groups39m
  4. Managing Azure AD Devices and Applications29m
  5. Managing Access in Azure AD31m

Managing Microsoft Azure Information Protection

by Ned Bellavance

Oct 11, 2018 / 1h 39m

1h 39m

Start Course

Enforcing and applying data protection and classification are key components of a data governance strategy. Organizations are under increased pressure to ensure that sensitive information is labeled and secured properly, meeting stringent compliance regulations and protecting the privacy of customers and the organization itself. In this course, Managing Microsoft Azure Information Protection, you'll learn how to properly leverage the Azure Information Protection Service from Microsoft to meet these new requirements. First, you'll create and manage classifications using labels. Next, you’ll grant users access to labels and enforce settings. Finally, you'll delegate access and monitor the Azure Information Protection solution. By the end of this course, you'll be able to manage your Azure Information Protection environment effectively to make your organization more secure and protect your most valuable asset, information.

Table of contents
  1. Course Overview1m
  2. Introducing Azure Information Protection16m
  3. Creating Azure Information Protection Classifications and Labels23m
  4. Creating Azure Information Protection Policies17m
  5. Managing Azure Information Protection Keys15m
  6. Controlling Azure Information Protection Access11m
  7. Monitoring Azure Information Protection13m


In this section, you’ll get the opportunity to explore the more complicated areas in identity and security, focused on advanced and hybrid identity and information protection.

Implementing Microsoft Azure Privileged Identity Management

by Ammar Hasayen

Sep 10, 2018 / 1h 30m

1h 30m

Start Course

Cybercriminals are relentless when it comes to finding and compromising their targets’ privileged credentials to gain unfettered access to critical assets. In this course, Implementing Microsoft Azure Privileged Identity Management, you will receive the most up-to-date knowledge on how to mitigate these security risks and to achieve compliance by securing, controlling, monitoring, analyzing, and governing privileged access on Azure AD, Azure resources, and Microsoft online services. First, you will learn how to quickly enable Microsoft PIM in your Azure tenant along with the licensing requirements to do so. Next, you will explore the concept of just in time access and just enough administration that will help you configure Microsoft PIM properly. Finally, you will get all the knowledge you need to enable workflow approval and access reviews along with some best practices that will help you properly manage PIM to meet your business needs. When you are finished with this course, you will have the skills and knowledge you need to enhance your overall security and compliance with more efficient administration and governance of privileged access.

Table of contents
  1. Course Overview1m
  2. Introducing Azure Privileged Identity Management14m
  3. Enabling Azure Privileged Identity Management7m
  4. Configuring Just in Time Access12m
  5. Configuring Time-bound Access7m
  6. Configuring Permanent Access7m
  7. Implementing Approval Workflows10m
  8. Exploring Privileged Identity Management Roles8m
  9. Configuring PIM Management Access5m
  10. Configuring PIM Access Review and Auditing13m

Microsoft Hybrid Identity - Overview

by Gary Grudzinskas

Jun 20, 2017 / 2h 56m

2h 56m

Start Course

Today’s working environment is changing. It's moving to the cloud. In this course, Microsoft Hybrid Identity - Overview, you’ll gain the ability to embrace cloud computing while keeping your current on-premises environment. First, you'll learn how the Hybrid environment works and how to join your user directory to the Azure Active Directory. Next, you’ll explore how to safely offer cloud apps to your users and on-premises apps to cloud users. Finally, you’ll learn how to manage your new hybrid environment. When you’re finished with this course, you'll be able to extend your on-premises network to the cloud in a safe and consistent way. Software required: Azure subscription or trial, and a Windows server DC.

Table of contents
  1. Course Overview0m
  2. Benefiting from Azure Hybrid Identity34m
  3. Planning Your Hybrid Identity Solution34m
  4. Deploying Your Hybrid Identity39m
  5. Utilizing Your Hybrid Identity42m
  6. Managing Your Hybrid Identity25m

What you will learn

  • How to manage access to your MS Azure subscription
  • How to manage identity in MS Azure Active Directory
  • How to implement advanced MS Azure security services


This path is intended for novice learners, and prior knowledge of virtual machines, cloud computing fundamentals, and server administration is required.