fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR
  • #course
  • #livevirtualclass

Microsoft Identity Manager

Live Virtual Class - Super Intensive Remote Training with Labs!
October 21, 2024, 9:00 am
Days
Hours
Min.
Sec.

During this 5-day course in 35 hours of super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Microsoft Identity Manager. Moreover, you will be able to:

    • Get the highest quality and unique learning experience – the class is limited to 12 participants by default.
    • Get the opportunity to interact with our world-renowned Experts.
    • Go through CQURE’s custom lab exercises and practice them after the course.
    • Receive a lifelong certification after completing the course!

(9:00am – 4:00pm CEST/CEST Monday to Friday)

Early-bird offer valid till September 16th!

Original price was: €2575.Current price is: €2175.

/Lowest price within 30 days €3000

Why this course?

This is a 5-day deep dive course on Microsoft Identity Manager, it’s ideal for System Engineers, Solution Architects, developers, and IT staff responsible for managing identities in their corporate environment. To attend this training, you should have good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.

This training is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!

This is a 5-day deep dive course on Microsoft Identity Manager, it’s ideal for System Engineers, Solution Architects, developers, and IT staff responsible for managing identities in their corporate environment. To attend this training, you should have good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.

This training is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!

Pricing plan

We offer you pricing plan designed and adjusted to your specific needs and budget. Buy now or book your spot and pay later.

Course timeline

  • 1. Before the course

    You will receive a Student Guide with instruction on how to prepare for the training, information regarding all the technical requirements and your own individual login credentials to the virtual environment.

  • 2. During the course

    You will be able to exercise and review all learned content on an ongoing basis.

  • 3. After the course

    You will receive a Certificate of Completion, all the materials which have been created and presented by the trainer as well as an access to our community on the Discord server.

Course benefits

How our lessons look like

  • Loads of Knowledge
  • Implementation workshop
  • Course materials
  • Unique exercises
  • Social & Network
  • Certification

Loads of Knowledge

Microsoft Identity Manager is a tool that helps you manage identities and automate identity-related business processes that reduce operational cost and improve security.

Implementation workshop

You will learn how to manage users and groups and implement self-service parts. We will present the proper approach to troubleshooting, and implementing best practices. You will see how to use identity management to protect administrative accounts within Active Directory. We will demonstrate how to implement role based access control and create effective reports with Microsoft Identity Manager.

Course materials

During the course you will be provided with a bunch of materials such as lab exercises, presentations, intriguing articles and useful tools to make your tasks a little bit easier!

Unique exercises

All exercises are based on Windows Server, Windows 10 and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions! Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed!

Social & Network

You will be granted access to our closed Discord community server where you will be able to share your thoughts with other IT specialists.

Certification

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

Course syllabus

This Live Virtual Class consists of 13 Modules in terms of Microsoft Identity Manager. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.

  • Module 1: General introduction - The principles of IDM & IAM

    • Overview

      Before we jump in to the Microsoft Identity components, it’s essential to set a command
      knowledge baseline about Identity Management (IDM) and Access Management, usually brought together in IAM (Identity & Access Management) …

      What is security about? Why does IAM matter? How do we connect identity with authentication and authorization.

  • Module 2: The Microsoft IAM landscape

    • Overview

      Microsoft Identity Manager (MIM) is part of a bigger picture. Already for a longtime, MIM (or its predecessors, has played an important role in identity management, not only for company internal IT or infrastructure, but also in the cloud… You’ll find MIM components in many Microsoft tools…

      In this module, we’ll sketch a quick overview on the Microsoft IDM and IAM landscape from data center to cloud. How do we link together different data stores, identity store and cloud with the identity lifecycle of your enterprise…

  • Module 3: Microsoft Identity Manager Architecture

    • Overview

      Detailed discussion about MIM architecture and its components: MIM Portal, MIM Service, MIM Synchronization Service, MIM Reporting.

      We will also provide an answer to the
      question what business needs can be addressed with MIM. Brief presentations of built-in functionality, on which we will expand later in the course, will conclude this module.

      We will also introduce the concepts of role-based access control and privileged
      access management.

  • Module 4: Installation and Deployment

    • Overview

      We will discuss various scenarios of MIM deployment and perform detailed analysis
      of benefits and drawbacks of each solution.

      We will present how to install Microsoft
      Identity Manager and execute recommended post installation tasks.

      Additionally, we will present how to perform capacity planning properly.

  • Module 5: MIM Synchronization Service

    • Overview

      We’ll introduce you to the Synchronization Service and discuss its features. Students will gain hand on experience with main tools used to design, implement and manage synchronization.

      We’ll discuss in detail the configuration of Management Agents and explain
      various task related to schema management. We’ll compare initial loads to schedule runs.

      The last part of this module will be spent on discussing how to move configurations between test and production environments.

  • Module 6: MIM Service Configuration

    • Overview

      We will present and discuss MIM Service features. Trainers will also demonstrate the
      configuration and customization of MIM Portal.

  • Module 7: User Management

    • Overview

      The primary goal of almost all Microsoft Identity Manager installations is user management.

      We will show how to provision accounts through MIM Portal. We will also discuss how to effectively use MIM policies.

  • Module 8: Group Management

    • Overview

      We will discuss different group types and scopes in both Active Directory and Microsoft Identity Manager.

      We will show how to create criteria-based groups.

      To conclude this module, we will discuss the task related to group management.

  • Module 9: Password Management

    • Overview

      We will focus on configuration and deployment of self-service reset password functionality, which allows users to reset their passwords without IT staff help.

      We will describe how password synchronization works and how we can modify its configuration.

  • Module 10: High level overview of Role based access control (RBAC), PAM and Certificate management

    • Overview

      In module 10 we’ll discuss MIM features that are (being) migrated to Azure, still it’s important to know how they work.

      We will present how to deploy RBAC in your environment, which involves defining roles and control access based upon those roles.

      We will discuss BHOLD Suite including designing and managing attestation process. Although this module has migrated to Microsoft Azure,
      it’s quite important to understand RBAC.

      We will also discuss the risks associated with access escalation and privileged accounts and how to manage them with PAM, including some essential process designs.

      We will also introduce you to the concepts of certificate management. We will look at implementing various scenarios based on certificates including cross forest and ADFS scenarios.

      We will take a look at MIM reporting features. Experts will discuss how reporting works under the hood and how you can customize and deploy it in your own infrastructure.

  • Module 11: Problems? Some basic MIM troubleshooting

    • Overview

      We will demonstrate the troubleshooting procedures that will help when you end up in trouble with your MIM installation

  • Module 12: Best Practices

    • Overview

      After this module day to day operations of Microsoft Identity Manager will not be a mystery for you.

      We will also discuss a very important and often forgotten topic of backup and restore.
      To conclude our course the xpert will present best practices for MIM configuration and management.

  • Module 13: The MIM community online

    • Overview

      There is a massive library of MIM information and MIM resources available on the internet.

      Where do you need to look? We’ll dig in to the best online resources and MIM community platforms to help yourself, go get help or to find interesting resources to the best job.

      Where to look for online forums, help articles, Wiki, community, advanced scenarios, free tools and plugins to increase the performance of your MIM environment.

Who is it for?

Audience

This training is intended for system engineers, solution architects, developers and IT staff responsible for managing identities in their corporate environment.

To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.

Good understanding and hands on experience with Microsoft technologies: Active Directory, SQL Server, Exchange Server, Azure Active Directory.

Platform and Technical Requirements

To participate in the course you need a Stable internet connection. For the best learning experience, we also need you to have a webcam, headphones, and a microphone.

Open RDP port 3391 for the connection to the Lab environment is needed as well. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.

Exercises

All exercises are based on Windows Server, Windows 10, and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience, and no mercy for misconfigurations or insecure solutions!

Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed!

How persuade your manager that this course is meaningful?

Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.

Protects the Company

You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.

Improves Employees skills

Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.

Boosts customer confidence

Completed course with personal certification may be the perfect advantage when it comes to business.

Helps comply with regulations

Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.

Saves money in the long run

Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.

Prepares for emerging threats

After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.

Register now and learn from the best!

During this 35-hour super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Microsoft Identity Manager. Moreover, you will be able to:

  • Get the highest quality and unique learning experience.
  • Get the opportunity to interact with our world-renowned Experts.
  • Go through CQURE’s custom lab exercises and practice them after the course.

Your Experts

This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

Peter

Geelen

Security Expert and Trainer, Microsoft MVP

Peter Geelen is the Cybersecurity Expert, Security Architect, Expert Engineer in Identity and Access Management, and trainer holding Microsoft Most Valuable Professional for Enterprise Mobility.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form