
{"id":8831,"date":"2022-10-20T12:46:19","date_gmt":"2022-10-20T12:46:19","guid":{"rendered":"https:\/\/stage.cloudthat.com\/training\/?post_type=stm-courses&#038;p=8831"},"modified":"2025-10-28T12:34:49","modified_gmt":"2025-10-28T12:34:49","slug":"exam-sc-300-microsoft-identity-and-access-administrator-2","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/microsoft-security\/sc-300-microsoft-identity-and-access-administrator-2","title":{"rendered":"SC-300: Microsoft Identity and Access Administrator"},"content":{"rendered":"<p>This Microsoft Identity and Access Administrator certification training course from CloudThat teaches candidates how to design, implement, and operate an organization\u2019s identity and access management systems using Azure Active Directory (Azure AD). Candidates taking up this Azure SC-300 course also learn how to secure authentication and authorization access to enterprise applications and provide seamless experiences and self-service management capabilities to all users. An Identity and Access Administrator Associate is also responsible for monitoring, troubleshooting, and reporting on the identity and access environment.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Microsoft Identity and Access Administrator certification training course from CloudThat teaches candidates how to design, implement, and operate an organization\u2019s identity and access management systems using Azure Active Directory (Azure AD). Candidates taking up this Azure SC-300 course also learn how to secure authentication and authorization access to enterprise applications and provide seamless experiences [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":12638,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[64],"metadata":{"permalink_customizer_regenerate_status":["1"],"stm_lms_product_id":["13529"],"_edit_last":["5091"],"_thumbnail_id":["12638"],"_wp_page_template":["default"],"apss_content_flag":["0"],"lsq_tracking":["a:2:{s:8:\"tracking\";s:0:\"\";s:5:\"score\";s:0:\"\";}"],"duration":[""],"_duration":["field_5fa0f3f0c86eb"],"day_1":[""],"_day_1":["field_5fce082f42f1e"],"time":[""],"_time":["field_5fce084742f1f"],"day_2":[""],"_day_2":["field_5fce085142f20"],"time_2":[""],"_time_2":["field_5fce089942f21"],"day_3":[""],"_day_3":["field_5fce08df42f22"],"time_3":[""],"_time_3":["field_5fce08f842f23"],"banner_description":["This Microsoft SC-300 certification training equips the aspirants with the desired skills and knowledge to rigorously prepare for Microsoft Identity and Access Administrator exam and earn certification."],"_banner_description":["field_612c733ed3564"],"after_completing_course_0_desciption":["Implement an identity management solution"],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Implement an authentication and access management solutions"],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Implement access management for apps"],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Plan and implement an identity governance strategy"],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"after_completing_course":["4"],"_after_completing_course":["field_6103aae828228"],"key_features_0_lists":["Our Microsoft SC-300 training modules have 50% -60% hands-on lab sessions to encourage Thinking-Based Learning (TBL)."],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["Interactive-rich virtual and face-to-face classroom teaching to inculcate Problem-Based Learning (PBL)."],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["Microsoft certified instructor-led training and mentoring sessions to develop Competency-Based Learning (CBL)."],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["Well-structured use-cases to simulate challenges encountered in a Real-World environment."],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["Integrated teaching assistance and support through experts designed Learning Management System (LMS) and ExamReady platform."],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["Being a Microsoft Learning Partner provides us with the edge over competition."],"_key_features_5_lists":["field_6103ad559f5b3"],"key_features":["6"],"_key_features":["field_6103aaff28229"],"who_should_attend_0_attend_lists":["The SC-300: Microsoft Identity and Access Administrator certification training is designed for individuals responsible for designing, implementing, and operating identity and access management systems using Azure AD. This training is suitable for professionals who manage tasks such as providing secure authentication and authorization access to enterprise applications, ensuring seamless user experiences, and implementing self-service management capabilities. Adaptive access and governance are key components of this role, making it ideal for individuals who oversee troubleshooting, monitoring, and reporting for identity and access environments. Whether working independently or as part of a larger team, attendees of this certification training collaborate with various roles within the organization to drive strategic identity projects, modernize identity solutions, implement hybrid identity solutions, and enforce identity governance."],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"who_should_attend":["1"],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_text":["<ul>\r\n<li>Security best practices and industry security requirements such as defense in depth, least privileged access, shared responsibility, and zero trust model.<\/li>\r\n<li>Be familiar with identity concepts such as authentication, authorization, and active directory.<\/li>\r\n<li>Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.<\/li>\r\n<li>Some experience with Windows and Linux operating systems and scripting languages is helpful but not required. Course labs may use PowerShell and the CLI.<\/li>\r\n<\/ul>"],"_prerequisites_text":["field_612c7498c4b84"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":["<ul>\r\n<li>By earning SC300 Azure certification, you can design, implement, and operate an organization\u2019s identity and access management systems by using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra. <\/li>\r\n<li>You will be able to implement identities in Azure AD, implement authentication and access management, implement access management for applications, and plan and implement identity governance in Azure AD.<\/li>\r\n<li>On successful completion of\u00a0Microsoft SC-300 exam training, aspirants receive a Course Completion Certificate from us.<\/li>\r\n<li>By successfully clearing the\u00a0SC-300 exam, aspirants earn Microsoft Certification.<\/li>\r\n<\/ul>"],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":["17714"],"_certification_0_image":["field_6103ab5b2822e"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":[""],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_section_0_module_title":["Implement and manage user identities (20\u201325%)"],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":["Configure and manage a Microsoft Entra tenant"],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Configure and manage built-in and custom Microsoft Entra roles"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Recommend when to use administrative units"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Configure and manage administrative units"],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_3_lession_title":["Evaluate effective permissions for Microsoft Entra roles"],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_4_lession_title":["Configure and manage custom domains"],"_course_section_0_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["7"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section_1_title":["Create, configure, and manage Microsoft Entra identities"],"_course_section_0_section_1_title":["field_612f5233b0278"],"course_section_0_section_1_lesson_list_0_lession_title":["Create, configure, and manage users"],"_course_section_0_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_1_lession_title":["Create, configure, and manage groups"],"_course_section_0_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_2_lession_title":["Manage custom security attributes"],"_course_section_0_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list":["5"],"_course_section_0_section_1_lesson_list":["field_612f530a0ac40"],"course_section_0_section_2_title":["Implement and manage identities for external users and tenants"],"_course_section_0_section_2_title":["field_612f5233b0278"],"course_section_0_section_2_lesson_list_0_lession_title":["Manage External collaboration settings in Microsoft Entra ID"],"_course_section_0_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_2_lesson_list_1_lession_title":["Invite external users, individually or in bulk"],"_course_section_0_section_2_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_2_lesson_list_2_lession_title":["Manage external user accounts in Microsoft Entra ID"],"_course_section_0_section_2_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_2_lesson_list_3_lession_title":["Implement Cross-tenant access settings"],"_course_section_0_section_2_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_2_lesson_list":["7"],"_course_section_0_section_2_lesson_list":["field_612f530a0ac40"],"course_section_0_section_3_title":["Implement and manage hybrid identity"],"_course_section_0_section_3_title":["field_612f5233b0278"],"course_section_0_section_3_lesson_list_0_lession_title":["Implement and manage Microsoft Entra Connect"],"_course_section_0_section_3_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_3_lesson_list_1_lession_title":["Implement and manage Microsoft Entra Connect cloud sync"],"_course_section_0_section_3_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_3_lesson_list_2_lession_title":["Implement and manage password hash synchronization"],"_course_section_0_section_3_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_3_lesson_list_3_lession_title":["Implement and manage pass-through authentication"],"_course_section_0_section_3_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_3_lesson_list_4_lession_title":["Implement and manage seamless single sign-on (SSO)"],"_course_section_0_section_3_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_3_lesson_list_5_lession_title":["Implement and manage federation, excluding manual Active Directory Federation Services (AD FS) deployments"],"_course_section_0_section_3_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_0_section_3_lesson_list_6_lession_title":["Implement and manage Microsoft Entra Connect Health"],"_course_section_0_section_3_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_0_section_3_lesson_list_7_lession_title":["Troubleshoot synchronization errors"],"_course_section_0_section_3_lesson_list_7_lession_title":["field_612f533b0ac41"],"course_section_0_section_3_lesson_list":["8"],"_course_section_0_section_3_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["4"],"_course_section_0_section":["field_612f51e6b0277"],"course_section":["4"],"_course_section":["field_612f4f27b0276"],"note_section":[""],"_note_section":["field_616d3ed46bbd2"],"scorm_package":[""],"curriculum":[""],"shareware":[""],"featured":[""],"views":["870"],"level":["associate"],"current_students":["3"],"duration_info":["4 Days"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"price":["29900"],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":[""],"course_files_pack":[""],"course_certificate":[""],"type":[""],"preview":[""],"lesson_excerpt":[""],"lesson_video_poster":[""],"lesson_video_url":[""],"lesson_video":[""],"lesson_files_pack":[""],"stream_start_date":[""],"stream_start_time":[""],"stream_end_date":[""],"stream_end_time":[""],"timezone":[""],"stm_password":[""],"join_before_host":[""],"option_host_video":[""],"option_participants_video":[""],"option_mute_participants":[""],"option_enforce_login":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"assignment_tries":[""],"assignment_files":[""],"editor_comment":[""],"try_num":[""],"start_time":[""],"assignment_id":[""],"student_id":[""],"course_id":[""],"custom_permalink":["microsoft-security\/exam-sc-300-microsoft-identity-and-access-administrator\/"],"sale_price_dates_start":[""],"sale_price_dates_end":[""],"popular_sort":["9"],"_popular_sort":["field_6172496402af3"],"related_courses":["a:4:{i:0;s:4:\"8829\";i:1;s:4:\"8141\";i:2;s:4:\"8831\";i:3;s:4:\"8142\";}"],"_related_courses":["field_61c453ca6b2dd"],"banner_image":[""],"_banner_image":["field_621873548f922"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":["2625"],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":["5"],"_average_review_count":["field_62b00367d2de6"],"_edit_lock":["1761654765:5091"],"_wpb_vc_js_status":["false"],"_yoast_wpseo_wordproof_timestamp":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"question_view_type":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"_wp_old_date":["2021-10-20"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"wpdocs-meta-bdt":["29900"],"wpdocs-meta-gbp":["1399"],"wpdocs-meta-usd":["1599"],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"overview_section_heading":["SC-300: Microsoft Identity and Access Administrator Course Overview:"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After completing SC-300 Training, students will be able to"],"_after_completing_course_heading":["field_645c78ade3f50"],"key_features_heading":["SC-300 Certification Key Features:"],"_key_features_heading":["field_645388ceffdd1"],"who_should_attend_heading":["Who should attend this SC-300 Certification Training?"],"_who_should_attend_heading":["field_645388faffdd2"],"prerequisites_heading":["What are the prerequisites for the training?"],"_prerequisites_heading":["field_64538a51ffdd3"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":[""],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list":[""],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":[""],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features":["1"],"_course_features":["field_644a0fa10e67d"],"certification_heading":["Certification"],"_certification_heading":["field_64538bffffdd5"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_outline_heading":["SC-300 Training Course Oultine:"],"_course_outline_heading":["field_64538a8effdd4"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"faq_heading":[""],"_faq_heading":["field_64538c59ffdd8"],"permalink_customizer":["microsoft-security\/sc-300-microsoft-identity-and-access-administrator-2"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"course_section_0_section_1_lesson_list_3_lession_title":["Automate the management of users and groups by using PowerShell"],"_course_section_0_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_module_title":["Implement authentication and access management (25\u201330%)"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":["Plan, implement, and manage Microsoft Entra user authentication"],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Plan for authentication"],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Implement and manage authentication methods"],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Implement and manage tenant-wide Multi-factor Authentication (MFA) settings"],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Manage per-user MFA settings"],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_4_lession_title":["Configure and deploy self-service password reset (SSPR)"],"_course_section_1_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_5_lession_title":["Implement and manage Windows Hello for Business"],"_course_section_1_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["10"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section_1_title":["Plan, implement, and manage Microsoft Entra Conditional Access"],"_course_section_1_section_1_title":["field_612f5233b0278"],"course_section_1_section_1_lesson_list_0_lession_title":["Plan Conditional Access policies"],"_course_section_1_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_1_lession_title":["Implement Conditional Access policy assignments"],"_course_section_1_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_2_lession_title":["Implement Conditional Access policy controls"],"_course_section_1_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_3_lession_title":["Test and troubleshoot Conditional Access policies"],"_course_section_1_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_4_lession_title":["Implement session management"],"_course_section_1_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_5_lession_title":["Implement device-enforced restrictions"],"_course_section_1_section_1_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list":["8"],"_course_section_1_section_1_lesson_list":["field_612f530a0ac40"],"course_section_1_section_2_title":["Manage risk by using Microsoft Entra ID Protection"],"_course_section_1_section_2_title":["field_612f5233b0278"],"course_section_1_section_2_lesson_list_0_lession_title":["Implement and manage user risk policies"],"_course_section_1_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_2_lesson_list_1_lession_title":["Implement and manage sign-in risk policies"],"_course_section_1_section_2_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_2_lesson_list_2_lession_title":["Implement and manage MFA registration policies"],"_course_section_1_section_2_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_2_lesson_list_3_lession_title":["Monitor, investigate and remediate risky users"],"_course_section_1_section_2_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_2_lesson_list_4_lession_title":["Monitor, investigate, and remediate risky workload identities"],"_course_section_1_section_2_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_2_lesson_list":["5"],"_course_section_1_section_2_lesson_list":["field_612f530a0ac40"],"course_section_1_section_3_title":["Implement access management for Azure resources by using Azure roles"],"_course_section_1_section_3_title":["field_612f5233b0278"],"course_section_1_section_3_lesson_list_0_lession_title":["Create custom Azure roles, including both control plane and data plane permissions"],"_course_section_1_section_3_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list_1_lession_title":["Assign built-in and custom Azure roles"],"_course_section_1_section_3_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list_2_lession_title":["Evaluate effective permissions for a set of Azure roles"],"_course_section_1_section_3_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list_3_lession_title":["Assign Azure roles to enable Microsoft Entra ID login to Azure virtual machines"],"_course_section_1_section_3_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list_4_lession_title":["Configure Azure Key Vault role-based access control (RBAC) and access policies"],"_course_section_1_section_3_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list":["5"],"_course_section_1_section_3_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["4"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Plan and implement workload identities (20\u201325%)"],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":["Plan and implement identities for applications and Azure workloads"],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Select appropriate identities for applications and Azure workloads, including managed identities, service principals, user accounts, and managed service accounts"],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Create managed identities"],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Assign a managed identity to an Azure resource"],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Use a managed identity assigned to an Azure resource to access other Azure resources"],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["4"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section_1_title":["Plan, implement, and monitor the integration of enterprise applications"],"_course_section_2_section_1_title":["field_612f5233b0278"],"course_section_2_section_1_lesson_list_0_lession_title":["Configure and manage user and admin consent"],"_course_section_2_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_1_lession_title":["Discover apps by using AD FS application activity reports"],"_course_section_2_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_2_lession_title":["Plan and implement settings for enterprise applications, including application-level and tenant-level settings"],"_course_section_2_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_3_lession_title":["Assign appropriate Microsoft Entra roles to users to manage enterprise applications"],"_course_section_2_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_4_lession_title":["Monitor and audit activity in enterprise applications"],"_course_section_2_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_5_lession_title":["Design and implement integration for on-premises apps by using Microsoft Entra Application Proxy"],"_course_section_2_section_1_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_6_lession_title":["Design and implement integration for software as a service (SaaS) apps"],"_course_section_2_section_1_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_7_lession_title":["Assign, classify, and manage users, groups, and app roles for enterprise applications"],"_course_section_2_section_1_lesson_list_7_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_8_lession_title":["Create and manage application collections"],"_course_section_2_section_1_lesson_list_8_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list":["9"],"_course_section_2_section_1_lesson_list":["field_612f530a0ac40"],"course_section_2_section_2_title":["Plan and implement app registrations"],"_course_section_2_section_2_title":["field_612f5233b0278"],"course_section_2_section_2_lesson_list_0_lession_title":["Plan for app registrations"],"_course_section_2_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_2_lesson_list_1_lession_title":["Create app registrations"],"_course_section_2_section_2_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_2_lesson_list_2_lession_title":["Configure app authentication"],"_course_section_2_section_2_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_2_lesson_list_3_lession_title":["Configure API permissions"],"_course_section_2_section_2_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_2_lesson_list_4_lession_title":["Create app roles"],"_course_section_2_section_2_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_2_lesson_list":["5"],"_course_section_2_section_2_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["4"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":["Plan and implement identity governance (20\u201325%)"],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":["Plan and implement entitlement management in Microsoft Entra"],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Plan entitlements"],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["Create and configure catalogs"],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Create and configure access packages"],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Manage access requests"],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_4_lession_title":["Implement and manage terms of use (ToU)"],"_course_section_3_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_5_lession_title":["Manage the lifecycle of external users"],"_course_section_3_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_6_lession_title":["Configure and manage connected organizations"],"_course_section_3_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["7"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section_1_title":["Plan, implement, and manage access reviews in Microsoft Entra"],"_course_section_3_section_1_title":["field_612f5233b0278"],"course_section_3_section_1_lesson_list_0_lession_title":["Plan for access reviews"],"_course_section_3_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_1_lession_title":["Create and configure access reviews"],"_course_section_3_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_2_lession_title":["Monitor access review activity"],"_course_section_3_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_3_lession_title":["Manually respond to access review activity"],"_course_section_3_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list":["4"],"_course_section_3_section_1_lesson_list":["field_612f530a0ac40"],"course_section_3_section_2_title":["Plan and implement privileged access"],"_course_section_3_section_2_title":["field_612f5233b0278"],"course_section_3_section_2_lesson_list_0_lession_title":["Plan and manage Azure roles in Microsoft Entra Privileged Identity Management (PIM), including settings and assignments"],"_course_section_3_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_1_lession_title":["Plan and manage Azure resources in PIM, including settings and assignments"],"_course_section_3_section_2_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_2_lession_title":["Plan and configure privileged access groups"],"_course_section_3_section_2_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_3_lession_title":["Manage the PIM request and approval process"],"_course_section_3_section_2_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_4_lession_title":["Analyze PIM audit history and reports"],"_course_section_3_section_2_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_5_lession_title":["Create and manage break-glass accounts"],"_course_section_3_section_2_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list":["6"],"_course_section_3_section_2_lesson_list":["field_612f530a0ac40"],"course_section_3_section_3_title":["Monitor identity activity by using logs, workbooks, and reports"],"_course_section_3_section_3_title":["field_612f5233b0278"],"course_section_3_section_3_lesson_list_0_lession_title":["Design a strategy for monitoring Microsoft Entra"],"_course_section_3_section_3_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list_1_lession_title":["Review and analyze sign-in, audit, and provisioning logs by using the Microsoft Entra admin center"],"_course_section_3_section_3_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list_2_lession_title":["Configure diagnostic settings, including configuring destinations such as Log Analytics workspaces, storage accounts, and event hubs"],"_course_section_3_section_3_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list_3_lession_title":["Monitor Microsoft Entra by using KQL queries in Log Analytics"],"_course_section_3_section_3_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list_4_lession_title":["Analyze Microsoft Entra by using workbooks and reporting"],"_course_section_3_section_3_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list_5_lession_title":["Monitor and improve the security posture by using Identity Secure Score"],"_course_section_3_section_3_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list":["6"],"_course_section_3_section_3_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["5"],"_course_section_3_section":["field_612f51e6b0277"],"_yoast_wpseo_title":["SC-300: Microsoft Identity and Access Administrator - CloudThat Training"],"_yoast_wpseo_metadesc":["Take your knowledge to the next level with CloudThat's SC-300 training in Microsoft Identity and Access Administration. Enhance your expertise in managing identities and access."],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"course_section_0_section_0_lesson_list_5_lession_title":["Configure Company branding settings"],"_course_section_0_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_6_lession_title":["Configure tenant properties, user settings, group settings, and device settings"],"_course_section_0_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_4_lession_title":["Assign, modify, and report on licenses"],"_course_section_0_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_2_lesson_list_4_lession_title":["Implement and manage cross-tenant synchronization"],"_course_section_0_section_2_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_2_lesson_list_5_lession_title":["Configure identity providers, including SAML and WS-Fed"],"_course_section_0_section_2_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_0_section_2_lesson_list_6_lession_title":["Create and manage a Microsoft Entra B2C tenant (Microsoft Entra External ID)"],"_course_section_0_section_2_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_6_lession_title":["Disable accounts and revoke user sessions"],"_course_section_1_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_7_lession_title":["Implement and manage password protection and smart lockout"],"_course_section_1_section_0_lesson_list_7_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_8_lession_title":["Enable Microsoft Entra Kerberos authentication for hybrid identities"],"_course_section_1_section_0_lesson_list_8_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_9_lession_title":["Implement certificate-based authentication in Microsoft Entra"],"_course_section_1_section_0_lesson_list_9_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_6_lession_title":["Implement continuous access evaluation"],"_course_section_1_section_1_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_7_lession_title":["Create a Conditional Access policy from a template"],"_course_section_1_section_1_lesson_list_7_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_title":["Manage and monitor app access by using Microsoft Defender for Cloud Apps"],"_course_section_2_section_3_title":["field_612f5233b0278"],"course_section_2_section_3_lesson_list_0_lession_title":["Configure and analyze cloud discovery results by using Defender for Cloud Apps"],"_course_section_2_section_3_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_1_lession_title":["Configure connected apps"],"_course_section_2_section_3_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_2_lession_title":["Implement application-enforced restrictions"],"_course_section_2_section_3_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_3_lession_title":["Configure Conditional Access app control"],"_course_section_2_section_3_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_4_lession_title":["Create access and session policies in Defender for Cloud Apps"],"_course_section_2_section_3_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_5_lession_title":["Implement and manage policies for OAuth apps"],"_course_section_2_section_3_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_6_lession_title":["Manage the Cloud app catalog"],"_course_section_2_section_3_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list":["7"],"_course_section_2_section_3_lesson_list":["field_612f530a0ac40"],"course_section_3_section_4_title":["Plan and implement Microsoft Entra Permissions Management"],"_course_section_3_section_4_title":["field_612f5233b0278"],"course_section_3_section_4_lesson_list_0_lession_title":["Onboard Azure subscriptions to Permissions Management"],"_course_section_3_section_4_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_4_lesson_list_1_lession_title":["Evaluate and remediate risks relating to Azure identities, resources, and tasks"],"_course_section_3_section_4_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_4_lesson_list_2_lession_title":["Evaluate and remediate risks relating to Azure highly privileged roles"],"_course_section_3_section_4_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_4_lesson_list_3_lession_title":["Evaluate and remediate risks relating to Permissions Creep Index (PCI) in Azure"],"_course_section_3_section_4_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_4_lesson_list_4_lession_title":["Configure activity alerts and triggers for Azure subscriptions"],"_course_section_3_section_4_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_4_lesson_list":["5"],"_course_section_3_section_4_lesson_list":["field_612f530a0ac40"],"_regular_price_wmcp":["{\"USD\":\"1599\",\"GBP\":\"1399\",\"BDT\":\"39900\"}"],"_yoast_wpseo_primary_stm_lms_course_taxonomy":[""],"wpdocs-meta-rand":["1199"],"wpdocs-meta-aed":["4699"],"_yoast_wpseo_canonical":["https:\/\/stage.cloudthat.com\/training\/microsoft-security\/exam-sc-300-microsoft-identity-and-access-administrator"],"offline_price":["38870"],"offline-bdt":["38870"],"offline-gbp":["1599"],"offline-rand":[""],"offline-aed":["6197"],"offline-usd":["2199"]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/8831"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":2,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/8831\/revisions"}],"predecessor-version":[{"id":26247,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/8831\/revisions\/26247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/12638"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=8831"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=8831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}