Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Identity and Access Administrator Exam Guide

You're reading from   Microsoft Identity and Access Administrator Exam Guide Implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC-300 exam

Arrow left icon
Product type Paperback
Published in Mar 2022
Publisher Packt
ISBN-13 9781801818049
Length 452 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Dwayne Natwick Dwayne Natwick
Author Profile Icon Dwayne Natwick
Dwayne Natwick
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Section 1 – Exam Overview and the Evolution of Identity and Access Management
2. Chapter 1: Preparing for Your Microsoft Exam FREE CHAPTER 3. Chapter 2: Defining Identity and Access Management 4. Section 2 - Implementing an Identity Management Solution
5. Chapter 3: Implementing and Configuring Azure Active Directory 6. Chapter 4: Creating, Configuring, and Managing Identities 7. Chapter 5: Implementing and Managing External Identities and Guests 8. Chapter 6: Implementing and Managing Hybrid Identities 9. Section 3 – Implementing an Authentication and Access Management Solution
10. Chapter 7: Planning and Implementing Azure Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) 11. Chapter 8: Planning and Managing Password-Less Authentication Methods 12. Chapter 9: Planning, Implementing, and Administering Conditional Access and Azure Identity Protection 13. Section 4 – Implementing Access Management for Applications
14. Chapter 10: Planning and Implementing Enterprise Apps for Single Sign-On (SSO) 15. Chapter 11: Monitoring Enterprise Apps with Microsoft Defender for Cloud Apps 16. Section 5 – Planning and Implementing an Identity Governance Strategy
17. Chapter 12: Planning and Implementing Entitlement Management 18. Chapter 13: Planning and Implementing Privileged Access and Access Reviews 19. Section 6 – Monitoring and Maintaining Azure Active Directory
20. Chapter 14: Analyzing and Investigating Sign-in Logs and Elevated Risk Users 21. Chapter 15: Enabling and Integrating Azure AD Logs with SIEM Solutions 22. Chapter 16: Mock Test 23. Other Books You May Enjoy

The evolution of IAM

Now that you understand more about IAM, how it is used in our daily lives, and the importance of protecting our resources with IAM, it is important to understand how IAM has changed as people and companies have continued to use more applications and resources in the cloud.

This section will discuss the evolution of IAM at a high level. This will provide a better level of understanding in terms of the importance of IAM and how it is changing with the increasingly growing role of cloud technologies within companies and for personal use. Three stages are discussed when talking about IAM: traditional, advanced, and optimal. We will go through each of these in detail.

Traditional

Traditional IAM is how IAM was handled prior to cloud technologies. As a company, all applications and user identities were within a private data center. Users that connected to resources did so through secure virtual private network (VPN) connections into the data center to access...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image