During this 5-day course in 35 hours of super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Microsoft Identity Manager. Moreover, you will be able to:
(9:00am – 4:00pm CEST/CEST Monday to Friday)
The next event will be announced soon!
€3500
This is a 5-day deep dive course on Microsoft Identity Manager, it’s ideal for System Engineers, Solution Architects, developers, and IT staff responsible for managing identities in their corporate environment. To attend this training, you should have good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
This training is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!
This is a 5-day deep dive course on Microsoft Identity Manager, it’s ideal for System Engineers, Solution Architects, developers, and IT staff responsible for managing identities in their corporate environment. To attend this training, you should have good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
This training is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!
We offer you pricing plan designed and adjusted to your specific needs and budget. Buy now or book your spot and pay later.
Grab this deal before it’s gone. The lowest price only now!
Join our course at a competitive and fair price. This is the last chance!
Grab this deal before it’s gone. The lowest price only now!
Join our course at a competitive and fair price. This is the last chance!
You will receive a Student Guide with instruction on how to prepare for the training, information regarding all the technical requirements and your own individual login credentials to the virtual environment.
You will be able to exercise and review all learned content on an ongoing basis.
You will receive a Certificate of Completion, all the materials which have been created and presented by the trainer as well as an access to our community on the Discord server.
We are Experts in remote delivery. In the past year, we have organized over 200 days of trainings and we have tested many solutions.
You will be granted a lab access for the duration of the training and a complementary access for additional 3 weeks after the training concludes with new challenging exercise instructions.
What is wonderful about our certification is that it is lifetime valid with no renewal fees – the technology changes, but fundamentals and attitude remain mostly the same.
The course is packed with the newest cybersecurity findings, insights and tools.
We are Experts in remote delivery. In the past year, we have organized over 200 days of trainings and we have tested many solutions.
You will be granted a lab access for the duration of the training and a complementary access for additional 3 weeks after the training concludes with new challenging exercise instructions.
What is wonderful about our certification is that it is lifetime valid with no renewal fees – the technology changes, but fundamentals and attitude remain mostly the same.
The course is packed with the newest cybersecurity findings, insights and tools.
Microsoft Identity Manager is a tool that helps you manage identities and automate identity-related business processes that reduce operational cost and improve security.
You will learn how to manage users and groups and implement self-service parts. We will present the proper approach to troubleshooting, and implementing best practices. You will see how to use identity management to protect administrative accounts within Active Directory. We will demonstrate how to implement role based access control and create effective reports with Microsoft Identity Manager.
During the course you will be provided with a bunch of materials such as lab exercises, presentations, intriguing articles and useful tools to make your tasks a little bit easier!
All exercises are based on Windows Server, Windows 10 and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions! Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed!
You will be granted access to our closed Discord community server where you will be able to share your thoughts with other IT specialists.
After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!
This Live Virtual Class consists of 13 Modules in terms of Microsoft Identity Manager. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.
Before we jump in to the Microsoft Identity components, it’s essential to set a command
knowledge baseline about Identity Management (IDM) and Access Management, usually brought together in IAM (Identity & Access Management) …
What is security about? Why does IAM matter? How do we connect identity with authentication and authorization.
Microsoft Identity Manager (MIM) is part of a bigger picture. Already for a longtime, MIM (or its predecessors, has played an important role in identity management, not only for company internal IT or infrastructure, but also in the cloud… You’ll find MIM components in many Microsoft tools…
In this module, we’ll sketch a quick overview on the Microsoft IDM and IAM landscape from data center to cloud. How do we link together different data stores, identity store and cloud with the identity lifecycle of your enterprise…
Detailed discussion about MIM architecture and its components: MIM Portal, MIM Service, MIM Synchronization Service, MIM Reporting.
We will also provide an answer to the
question what business needs can be addressed with MIM. Brief presentations of built-in functionality, on which we will expand later in the course, will conclude this module.
We will also introduce the concepts of role-based access control and privileged
access management.
We will discuss various scenarios of MIM deployment and perform detailed analysis
of benefits and drawbacks of each solution.
We will present how to install Microsoft
Identity Manager and execute recommended post installation tasks.
Additionally, we will present how to perform capacity planning properly.
We’ll introduce you to the Synchronization Service and discuss its features. Students will gain hand on experience with main tools used to design, implement and manage synchronization.
We’ll discuss in detail the configuration of Management Agents and explain
various task related to schema management. We’ll compare initial loads to schedule runs.
The last part of this module will be spent on discussing how to move configurations between test and production environments.
We will present and discuss MIM Service features. Trainers will also demonstrate the
configuration and customization of MIM Portal.
The primary goal of almost all Microsoft Identity Manager installations is user management.
We will show how to provision accounts through MIM Portal. We will also discuss how to effectively use MIM policies.
We will discuss different group types and scopes in both Active Directory and Microsoft Identity Manager.
We will show how to create criteria-based groups.
To conclude this module, we will discuss the task related to group management.
We will focus on configuration and deployment of self-service reset password functionality, which allows users to reset their passwords without IT staff help.
We will describe how password synchronization works and how we can modify its configuration.
In module 10 we’ll discuss MIM features that are (being) migrated to Azure, still it’s important to know how they work.
We will present how to deploy RBAC in your environment, which involves defining roles and control access based upon those roles.
We will discuss BHOLD Suite including designing and managing attestation process. Although this module has migrated to Microsoft Azure,
it’s quite important to understand RBAC.
We will also discuss the risks associated with access escalation and privileged accounts and how to manage them with PAM, including some essential process designs.
We will also introduce you to the concepts of certificate management. We will look at implementing various scenarios based on certificates including cross forest and ADFS scenarios.
We will take a look at MIM reporting features. Experts will discuss how reporting works under the hood and how you can customize and deploy it in your own infrastructure.
We will demonstrate the troubleshooting procedures that will help when you end up in trouble with your MIM installation
After this module day to day operations of Microsoft Identity Manager will not be a mystery for you.
We will also discuss a very important and often forgotten topic of backup and restore.
To conclude our course the xpert will present best practices for MIM configuration and management.
There is a massive library of MIM information and MIM resources available on the internet.
Where do you need to look? We’ll dig in to the best online resources and MIM community platforms to help yourself, go get help or to find interesting resources to the best job.
Where to look for online forums, help articles, Wiki, community, advanced scenarios, free tools and plugins to increase the performance of your MIM environment.
This training is intended for system engineers, solution architects, developers and IT staff responsible for managing identities in their corporate environment.
To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
Good understanding and hands on experience with Microsoft technologies: Active Directory, SQL Server, Exchange Server, Azure Active Directory.
To participate in the course you need a Stable internet connection. For the best learning experience, we also need you to have a webcam, headphones, and a microphone.
Open RDP port 3391 for the connection to the Lab environment is needed as well. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.
All exercises are based on Windows Server, Windows 10, and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience, and no mercy for misconfigurations or insecure solutions!
Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed!
Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.
You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.
Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.
Completed course with personal certification may be the perfect advantage when it comes to business.
Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.
Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.
After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.
You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.
Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.
Completed course with personal certification may be the perfect advantage when it comes to business.
Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.
Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.
After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.
During this 35-hour super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Microsoft Identity Manager. Moreover, you will be able to:
This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.
Do you want to receive the geekiest cybersecurity solutions, tools, and tricks, straight to your inbox?
Learn more about our offer in terms of Consulting. Our Cybersecurity Experts perform consulting work on a daily basis, hence we are fully prepared for any challenge.
Learn more about our offer in terms of Consulting. Our Cybersecurity Experts perform consulting work on a daily basis, hence we are fully prepared for any challenge.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.