Masterclass: Microsoft Identity Manager

Live Virtual Class – Super Intensive Remote Training with Labs!
(9:00am – 4:00pm CEST Monday to Friday)
3000 EUR 3500 EUR (net)
Early-bird offer valid till 1st April!

Register now

Masterclass: Microsoft Identity Manager

This is an international Live Virtual Class where you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office! The class is taught fully remotely in English by CQURE Cybersecurity Experts. In order to ensure the highest quality and unique learning experience, the course is limited to 12 participants by default, or supported by an assistant instructor if the number of delegates exceeds 12. During this course, you will have the opportunity to go through CQURE’s custom lab exercises, interact with our world-renowned Expert and receive a lifelong certification after completing the course!

See the schedule of our all Live Virtual Classes

Upcoming Live Virtual Classes

Live Virtual Class Length Start Date Instructor
Pay & enroll 5 days-35h 22.04.2024 Peter Geelen

Eligible for group discount? Click here

Loads of Knowledge

Microsoft Identity Manager is a tool that helps you manage identities and automate identity-related business processes that reduce operational cost and improve security. You will learn how to manage users and groups and implement self-service parts. We will present the proper approach to troubleshooting, and implementing best practices. You will see how to use identity management to protect administrative accounts within Active Directory. We will demonstrate how to implement role based access control and create effective reports with Microsoft Identity Manager.

This course is ideal for:

System Engineers, Solution Architects, developers and IT staff responsible for managing identities in their corporate environment.

To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.

Unique exercises:

All exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions! Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed!

Platform and Technical Requirements:

To participate in the course you need a Stable internet connection. For best learning experience we also need you to have a webcam, headphones and a microphone. Open RDP port 3391 for the connection to the Lab environment is needed as well. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.

Certification:

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

COURSE FORMULA

Remote Delivery

We are Experts in remote delivery. In the past year, we have organized over 200 days of trainings and we have tested many solutions. The experience remains the same as in the case of face-to-face trainings – a personalized, lab intense training with a lot of interaction between you and the instructor.

Virtual Labs

You will be granted a lab access for the duration of the training which will let you acquire new skills and practically apply the techniques you have just learned.

Lifelong Certification

What is wonderful about our certification is that it is lifetime valid with no renewal fees – the technology changes, but fundamentals and attitude remain mostly the same. Our Virtual Certificates, which entitle you to collect CPE Points, are issued via Accredible.

COURSE SYLLABUS

Module 1

General introduction – The principles of IDM & IAM

Before we jump in to the Microsoft Identity components, it’s essential to set a command knowledge baseline about Identity Management (IDM) and Access Management, usually brought together in IAM (Identity & Access Management)… What is security about? Why does IAM matter? How do we connect identity with authentication and authorization.

Module 2

The Microsoft IAM landscape

Detailed discussion about MIM architecture and its components: MIM Portal, MIM Service, MIM Synchronization Service, MIM Reporting. We will also provide an answer to the question what business needs can be addressed with MIM. Brief presentations of built-in functionality, on which we will expand later in the course, will conclude this module. We will also introduce the concepts of role-based access control and privileged access management.

Module 3

Installation and Deployment

We will discuss various scenarios of MIM deployment and perform detailed analysis of benefits and drawbacks of each solution. We will present how to install Microsoft Identity Manager and execute recommended post installation tasks. Additionally, we will present how to perform capacity planning properly.

Module 4

MIM Synchronization Service

We introduce you to the Synchronization Service and discuss its features. Students will gain hand on experience with main tools used to design, implement and manage synchronization. We discuss in detail the configuration of Management Agents and explain various task related to schema management. We compare initial loads to schedule runs. The last part of this module will be spent on discussing how to move configurations between test and production environments.

Module 5

MIM Service Configuration

We will present and discuss MIM Service features. Trainers will also demonstrate the configuration and customization of MIM Portal.

Module 6

User Management

The primary goal of almost all Microsoft Identity Manager installations is user management. We will show how to provision accounts through MIM Portal. We will also discuss how to effectively use MIM policies.

Module 7

Group Management

We will discuss different group types and scopes in both Active Directory and Microsoft Identity Manager. We will show how to create criteria-based groups. To conclude this module, we will discuss the task related to group management.

Module 8

Password Management

We will focus on configuration and deployment of self-service reset password functionality, which allows users to reset their passwords without IT staff help. We will describe how password synchronization works and how we can modify its configuration

Module 9

High level overview of Role Based Access Control (RBAC), PAM and Certificate mMnagement

In module 10 we’ll discuss MIM features that are (being) migrated to Azure, still it’ is important to know how they work…

We will present how to deploy RBAC in your environment, which involves defining roles and control access based upon those roles. We will discuss BHOLD Suite including designing and managing attestation process. Although this module has migrated to Microsoft Azure, it’s quite important to understand RBAC.
We will also discuss the risks associated with access escalation and privileged accounts and how to manage them with PAM, including some essential process designs.

We will also introduce you to the concepts of certificate management. We will look at implementing various scenarios based on certificates including cross forest and ADFS scenarios.

We will take a look at MIM reporting features. Trainers will discuss how reporting works under the hood and how you can customize and deploy it in your own infrastructure.

Module 10

Problems? Some basic MIM troubleshooting

We will demonstrate the troubleshooting procedures that will help when you end up in trouble with your MIM installation.

Module 11

Best Practices

After this module day to day operations of Microsoft Identity Manager will not be a mystery for you. We will also discuss very important and often forgotten topic of backup and restore. To conclude our course trainers will present best practices for MIM configuration and management.

Module 12

The MIM community online

There is a massive library of MIM information and MIM resources available on the internet. Where do you need to look? We’ll dig in to the best online resources and MIM community platforms to help yourself, go get help or to find interesting resources to the best job.

Where to look for online forums, help articles, Wiki, community, advanced scenarios, free tools and plugins to increase the performance of your MIM environment.

Register now

Click here to browse the modules:

YOUR TEACHER

Peter Geelen

Security Expert and Trainer, Microsoft MVP

Peter Geelen is the Cybersecurity Expert, Security Architect, Expert Engineer in Identity and Access Management, and trainer holding Microsoft Most Valuable Professional for Enterprise Mobility. He is also the owner and managing consultant at Quest For Security where among others, Peter focuses on helping, guiding & teaching enterprise customers with Enterprise security, IAM, Privacy, GDPR, and Data Protection. Peter has been also working for Microsoft as the Expert engineer in Microsoft Identity and Access Management. During that time he was engaged in large variety of Security and IAM projects in the entire EMEA region, for the clients from miscellaneous fields including Federal Government agencies, National & Federal banks, assurance companies, Military & Defence agencies, hospitals, universities and private organizations.

WHO IS IT FOR?

Audience

This training is intended for system engineers, solution architects, developers and IT staff responsible for managing identities in their corporate environment.

Recommendations

Good understanding and hands on experience with Microsoft technologies: Active Directory, SQL Server, Exchange Server, Azure Active Directory.

Exercises

All the exercises are based on Windows Server and Azure Cloud.

Our students say…

Totally professional, total great stuff, in-depth knowledge and a perfect Learning Atmosphere! I like it! Thanks so much for sharing your experience and knowledge!

Martin Weber

CTO | IT.innovation.4U GmbH

All of their classes are based on their real world experience with the products, not just the typical Official Curriculum style classes that teach you things for an exam, but that you will never use. You’ll find that all of the material you’ll learn in the class will be used, at some point, in your security career.

Jack Perry

Security Principal Consultant

I have attended CQURE’s training as someone who is not a security professional, but just an enthusiast, and I feel like I learned a A LOT. The whole training was loaded with information and nice demos of the latest technologies. On top of that — having an opportunity to ask and talk to professionals was priceless.

Marek Chmel

SQL Server DBA | AT&T

×