Wir beraten Sie gerne!
+43 1 6000 880-0     Kontakt

Microsoft Security Workshop: Managing Identity (40552)

Detaillierter Kursinhalt

Module 1: Managing Identity

In recent years, the range of features provided by identity solutions has been evolving in a dramatic pace in order to address continuously increasing levels of cyber threats. While facilitating authentication and authorization remain to be part of the core functionality of these solutions, modern identity management places additional emphasis on security and form one of the primary lines of defense against internal and external cyberattacks. In this module, you will learn about some generic principles of identity management that clearly demonstrate that focus.

  • Identity Management, the new Control Plane
  • Securing Privileged Access (SPA)

After completing this module, students will be able to:

  • Explain the concept of Identity as a control plane
  • Describe the basic characteristics of Identity Management.
  • Explain the premise of Securing Privileged Access (SPA)
  • Identify three stages of the SPA roadmap.
Module 2: Securing Active Directory

Most IT security breaches start with the compromise of a single computer. Once these entry points are compromised, the scope of the breach can expand in a rapid pace. Most commonly, exploits leverage existing vulnerabilities that have been overlooked or neglected. By identifying and eliminating the vulnerabilities that hackers leverage to propagate their exploits, organizations can minimize the impact of an initial compromise and impede lateral movement across the entire infrastructure. This approach play significant role in protecting the ultimate goal of most attacks – Active Directory domain controllers, which, once compromised, provide complete control of the organization’s Active Directory Domain Services (AD DS) forests. This module presents the most common attacks against Active Directory and countermeasures reducing the attack surface. It also contains recommendations for recovery in the event of a complete compromise.

  • Introduction to Active Directory Domain Services (AD DS)
  • Protecting AD DS

After completing this module, students will be able to:

  • Identify primary reasons for using up-to-date operating system and antimalware software
  • Recommend approach to fixing misconfigured infrastructure components
  • Describe factors that contribute to reducing attack surface of Active Directory
  • Advise the proper approach to auditing and monitoring Active Directory
  • Explain the premise of planning for compromise
  • List the best practices for maintaining a more secure environment.
Module 3: Active Directory and Privileged Access Management

This module explores in more details the functionality of Active Directory, focusing in particular on Kerberos-based authentication, including the Windows components that play the essential role in the authentication process. Understanding the underlying technology will help you with identifying the most effective approach to protecting your Active Directory environment. In addition, the module provides an overview of Privileged Access Management, which sample implementation is the subject of the lab of this course.

  • Authentication and authorization in Active Directory Domain Services (AD DS)
  • Privileged Access Management

After completing this module, you will be able to:

  • Describe Kerberos-based authentication and authorization
  • Explain the architecture and the role of Security Support Provider Interface
  • Describe the sign on sequence for domain joined clients
  • Identify user logon steps
  • Provide characteristics of local and domain logons
  • Provide characteristics of smart card logons
  • Provide characteristics of biometrics logons
  • Describe ESEA characteristics
  • Provide an overview of MIM
  • Explain the benefits of JIT administration and PAM
Module 4: Azure Active Directory

This module provides an overview of Azure Active Directory (Azure AD) and illustrates how to leverage its capabilities in order to enhance identity protection and to consolidate identity management in hybrid scenarios.

  • Introduction to Azure AD
  • Microsoft cloud security components
Lab: AD Privileged Access Management (PAM) and Just In Time Administration (JIT)
  • Implement PAM infrastructure
  • Implement and verify functionality of PAM users, groups, and roles

After completing this module, students will be able to:

  • Describe features of Azure AD editions
  • List the benefits of Azure AD Identity Protection
  • Describe core Microsoft cloud security features
  • Explain the primary characteristics of SSO
  • Explain the SSO mechanism when authenticating to cloud-based applications
  • Explain the SSO mechanism when authenticating to on-premises applications
  • Describe the features of Azure MFA
  • Provide use cases for Azure Key Vault
  • Describe the principles of RBAC
  • Describe the role and components of Azure AD Connect
  • Choose an Azure AD integration option most suitable in a given scenario.
Additional Reading

This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with the first course in the series, Microsoft Security Workshop: Enterprise Security Fundamentals (40551).