Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft Identity and Access Administrator SC-300 Exam Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
Microsoft Identity and Access Administrator SC-300 Exam Guide

Microsoft Identity and Access Administrator SC-300 Exam Guide

By : Aaron Guilmette, James Hardiman, Doug Haven, Dwayne Natwick
close
close
Microsoft Identity and Access Administrator SC-300 Exam Guide

Microsoft Identity and Access Administrator SC-300 Exam Guide

By: Aaron Guilmette, James Hardiman, Doug Haven, Dwayne Natwick

Overview of this book

In today’s cloud-driven environment, achieving SC-300 certification is essential for professionals looking to tackle real-world identity and access management (IAM) scenarios. SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation. You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks. By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.
Table of Contents (21 chapters)
close
close

What This Book Covers

Chapter 1, Implementing and Configuring a Microsoft Entra Tenant, introduces the concepts of provisioning and administering a Microsoft 365 tenant.

Chapter 2, Creating, Configuring, and Managing Microsoft Entra Identities, walks through the steps necessary to create and modify users and groups, as well as assigning licenses.

Chapter 3, Implementing and Managing Identities for External Users and Tenants, introduces the concepts of external or guest users.

Chapter 4, Implementing and Managing Hybrid Identity, introduces hybrid identity models, managed through Entra Connect and Entra Connect Cloud Sync.

Chapter 5, Planning, Implementing, and Managing Microsoft Entra User Authentication, focuses on configuring authentication methods and capabilities such as multi-factor authentication and Windows Hello for Business.

Chapter 6, Planning, Implementing, and Managing Microsoft Entra Conditional Access, explores one of the core security technologies of Microsoft Entra—Conditional Access policies.

Chapter 7, Managing Risk by Using Microsoft Entra ID Protection, describes how to use risk-based policies with Microsoft Entra to protect user and workload identities.

Chapter 8, Implementing Access Management for Azure Resources by Using Azure Roles, demonstrates concepts such as role-based access controls and technologies such as Azure Key Vault.

Chapter 9, Implementing Global Secure Access, introduces the new Global Secure Access service for securing connectivity between endpoints and the Microsoft cloud.

Chapter 10, Planning and Implementing Identity for Applications and Azure Workloads, explains how to configure and secure identity for Azure services, applications, and workloads.

Chapter 11, Planning, Implementing, and Monitoring the Integration of Enterprise Applications, instructs on designing strategies for connecting and securing enterprise software-as-a-service apps, as well as using Microsoft Entra application proxy to publish on-premises applications.

Chapter 12, Planning and Implementing App Registrations, presents information on configuring app registrations, app roles, and API permissions.

Chapter 13, Managing and Monitoring App Access Using Microsoft Defender for Cloud Apps, explores using Defender for Cloud Apps to discover shadow IT and create policies to restrict access to apps and resources.

Chapter 14, Planning and Implementing Entitlement Management, leverages access packages for granting access to sites and applications, as well as managing the life cycle of external user accounts.

Chapter 15, Planning, Implementing, and Managing Access Reviews in Microsoft Entra, demonstrates how to use access reviews to manage the life cycle of access to resources in the Microsoft 365 tenant.

Chapter 16, Planning and Implementing Privileged Access, walks through deploying Privileged Identity Management to remove standing permissions to resources.

Chapter 17, Monitoring Identity Activity Using Logs, Workbooks, and Reports, outlines how to use the Kusto Query Language (KQL) to interpret logs and discover insights about identity and access in the Microsoft 365 environment.

Chapter 18, Planning and Implementing Microsoft Entra Permissions Management, introduces the new Entra Permissions Management product, allowing identity and access administrators to monitor permissions assignments and discover the over-granting of permissions in a Microsoft Entra environment.

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY