Microsoft 365 Identity and Services: Designing a Hybrid Identity

Microsoft 365    |    Expert
  • 12 videos | 53m 22s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 24 users Rating 4.7 of 24 users (24)
This course covers the planning and designing of an identity strategy from its adoption through to its implementation, and examines how to address synchronization, authentication, access control, and protection requirements. The 12-video course can be used to prepare for the MS-100 Microsoft 365 Identity and Services certification exam. You will begin by learning how to determine synchronization and multifactor authentication requirements. Next, hear an overview of lifecycle adoption strategies, adopting cloud services, and the identity requirements needed when doing so. You will then examine considerations applicable for protecting data and how that will integrate with your identity solution. Then take a look at content management requirements in terms of planning your identity solution, access control requirements, and what is necessary to implement an incident response plan. Next, explore the considerations and requirements for implementing a hybrid identity solution and defining an adoption strategy. Conclude the course by taking a look at choosing identity synchronization tools.

WHAT YOU WILL LEARN

  • Identify the subject areas covered in this course
    Recognize sync requirements
    Recognize mfa requirements
    Provide an overview of lifecycle adoption strategies
    Describe data protection requirements
    Determine content management requirements
  • Determine access control requirements
    List incident response requirements
    Plan for hybrid identity lifecycle
    Define an adoption strategy
    List identity synchronization tools
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 2s
  • 5m 9s
    After completing this video, you will be able to recognize the requirements for synchronization. FREE ACCESS
  • Locked
    3.  MFA Requirements
    4m 27s
    Upon completion of this video, you will be able to recognize the requirements for an MFA. FREE ACCESS
  • Locked
    4.  Lifecycle Adoption Strategy
    7m 55s
    After completing this video, you will be able to provide an overview of lifecycle adoption strategies. FREE ACCESS
  • Locked
    5.  Data Protection Requirements
    5m 13s
    Upon completion of this video, you will be able to describe data protection requirements. FREE ACCESS
  • Locked
    6.  Content Management
    5m 6s
    In this video, learn how to determine your content management requirements. FREE ACCESS
  • Locked
    7.  Access Control
    5m 43s
    In this video, you will learn how to determine access control requirements. FREE ACCESS
  • Locked
    8.  Incident Response
    3m 23s
    After completing this video, you will be able to list the requirements for incident response. FREE ACCESS
  • Locked
    9.  Hybrid Identity Lifecycle
    4m 27s
    During this video, you will learn how to plan for a hybrid identity lifecycle. FREE ACCESS
  • Locked
    10.  Adoption Strategy
    4m 58s
    In this video, you will learn how to define an adoption strategy. FREE ACCESS
  • Locked
    11.  Identity Synchronization Tools
    4m 10s
    After completing this video, you will be able to list identity synchronization tools. FREE ACCESS
  • Locked
    12.  Course Summary
    48s
    53e53350-6995-446e-b8e8-d0f17bb9f688 FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 29 users Rating 4.6 of 29 users (29)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 114 users Rating 4.5 of 114 users (114)
Rating 4.6 of 118 users Rating 4.6 of 118 users (118)
Rating 4.2 of 18 users Rating 4.2 of 18 users (18)