Home

Azure Privileged Identity Manager (Azure PIM) course is now available !

%3CLINGO-SUB%20id%3D%22lingo-sub-251588%22%20slang%3D%22en-US%22%3EAzure%20Privileged%20Identity%20Manager%20(Azure%20PIM)%20course%20is%20now%20available%20!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-251588%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fblog.ahasayen.com%2Fmicrosoft-azure-pim%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20PIM%3C%2FA%3E%20or%20Azure%20AD%20Privileged%20Identity%20Manager%20is%20a%20great%20solution%20to%20protect%20your%20organization%20from%20misuse%20or%20compromised%20privileged%20identities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECourse%20Structure%3A%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EI%20have%20just%20published%20a%20complete%20%3CA%20href%3D%22https%3A%2F%2Fblog.ahasayen.com%2Fmicrosoft-azure-pim%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EPluralsight%20course%3C%2FA%3E%20that%20will%20help%20you%20understand%20how%20to%3A%3C%2FP%3E%0A%3CP%3E-%20Enable%20PIM%20in%20your%20tenant.%3C%2FP%3E%0A%3CP%3E-%20Configure%20Just%20in%20Time%20Access.%3C%2FP%3E%0A%3CP%3E-%20Configure%20Time-bound%20Access%20for%20Azure%20Resources.%3C%2FP%3E%0A%3CP%3E-%20Configure%20Permanent%20Access%20and%20Break%20Glass%20Accounts.%3C%2FP%3E%0A%3CP%3E-%20When%20to%20use%20each%20type%20of%20access.%3C%2FP%3E%0A%3CP%3E-%20Just%20Enough%20Administration%20and%20Azure%20AD%20Directory%20Roles.%3C%2FP%3E%0A%3CP%3E-%20PIM%20Management%20Access.%3C%2FP%3E%0A%3CP%3E-%20PIM%20Workflow%20Approvals.%3C%2FP%3E%0A%3CP%3E-%20PIM%20Audit%20Logs.%3C%2FP%3E%0A%3CP%3E-%20PIM%20Access%20Reviews.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECourse%20Description%3A%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EPrivileged%20Identity%20Management%20is%20emerging%20as%20one%20of%20the%20hottest%20topics%20in%20cybersecurity.%20In%20this%20Pluralsight%20course%2C%20you%E2%80%99ll%20learn%20how%20to%20use%20Microsoft%20Azure%20PIM%20to%20manage%2C%20control%2C%20and%20monitor%20access%20within%20Azure%20AD%2C%20Azure%20resources%2C%20and%20Microsoft%20Online%20Services.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECourse%20Long%20Description%3A%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ECybercriminals%20are%20relentless%20when%20it%20comes%20to%20finding%20and%20compromising%20their%20targets%E2%80%99%20privileged%20credentials%20to%20gain%20unfettered%20access%20to%20critical%20assets.%20In%20this%20course%2C%20Implementing%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EMicrosoft%20Azure%20Privileged%20Identity%20Management%3C%2FSTRONG%3E(Microsoft%20Azure%20PIM)%2C%20you%20will%20receive%20the%20most%20up-to-date%20knowledge%20on%20how%20to%20mitigate%20these%20security%20risks%20and%20to%20achieve%20compliance%20by%20securing%2C%20controlling%2C%20monitoring%2C%20analyzing%2C%20and%20governing%20privileged%20access%20on%20Azure%20AD%2C%20Azure%20resources%2C%20and%20Microsoft%20online%20services.%3C%2FP%3E%0A%3CP%3EFirst%2C%20you%20will%20learn%20how%20to%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3Equickly%20enable%20Microsoft%20Azure%20PIM%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ein%20your%20Azure%20tenant%20along%20with%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3Elicensing%20requirements%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eto%20do%20so.%20Next%2C%20you%20will%20explore%20the%20concept%20of%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EJust%20in%20Time%20Access%26nbsp%3B(JIT)%26nbsp%3B%3C%2FSTRONG%3Eand%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EJust%20Enough%20Administration%20(JEA)%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ethat%20will%20help%20you%20configure%20Microsoft%20Azure%20PIM%20properly.%20Finally%2C%20you%20will%20get%20all%20the%20knowledge%20you%20need%20to%20enable%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3Eworkflow%20approval%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eand%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3Eaccess%20reviews%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ealong%20with%20some%20best%20practices%20that%20will%20help%20you%20properly%20manage%20Microsoft%20Azure%20PIM%20to%20meet%20your%20business%20needs.%3C%2FP%3E%0A%3CP%3EWhen%20you%20are%20finished%20with%20this%20course%2C%20you%20will%20have%20the%20skills%20and%20knowledge%20you%20need%20to%20enhance%20your%20overall%20security%20and%20compliance%20with%20more%20efficient%20administration%20and%20governance%20of%20privileged%20access.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-251588%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAccess%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20AD%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Ammar Hasayen
MVP

Azure PIM or Azure AD Privileged Identity Manager is a great solution to protect your organization from misuse or compromised privileged identities.

 

Course Structure:

I have just published a complete Pluralsight course that will help you understand how to:

- Enable PIM in your tenant.

- Configure Just in Time Access.

- Configure Time-bound Access for Azure Resources.

- Configure Permanent Access and Break Glass Accounts.

- When to use each type of access.

- Just Enough Administration and Azure AD Directory Roles.

- PIM Management Access.

- PIM Workflow Approvals.

- PIM Audit Logs.

- PIM Access Reviews.

 

Course Description:

Privileged Identity Management is emerging as one of the hottest topics in cybersecurity. In this Pluralsight course, you’ll learn how to use Microsoft Azure PIM to manage, control, and monitor access within Azure AD, Azure resources, and Microsoft Online Services.

 

Course Long Description:

Cybercriminals are relentless when it comes to finding and compromising their targets’ privileged credentials to gain unfettered access to critical assets. In this course, Implementing Microsoft Azure Privileged Identity Management(Microsoft Azure PIM), you will receive the most up-to-date knowledge on how to mitigate these security risks and to achieve compliance by securing, controlling, monitoring, analyzing, and governing privileged access on Azure AD, Azure resources, and Microsoft online services.

First, you will learn how to quickly enable Microsoft Azure PIM in your Azure tenant along with the licensing requirements to do so. Next, you will explore the concept of Just in Time Access (JIT) and Just Enough Administration (JEA) that will help you configure Microsoft Azure PIM properly. Finally, you will get all the knowledge you need to enable workflow approval and access reviews along with some best practices that will help you properly manage Microsoft Azure PIM to meet your business needs.

When you are finished with this course, you will have the skills and knowledge you need to enhance your overall security and compliance with more efficient administration and governance of privileged access.

 

 

Related Conversations
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies
Tabs and Dark Mode
cjc2112 in Discussions on
30 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
How to Prevent Teams from Auto-Launch
chenrylee in Microsoft Teams on
29 Replies