Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Microsoft Identity & Access Administrator SC-300 Exam Guide

Packt via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
In today's landscape of cloud computing and hybrid environments, mastering identity management is essential to safeguarding organizational resources. This course is specifically designed for professionals preparing for the SC-300 exam, offering a deep dive into Microsoft Entra ID and its role in modern identity solutions. Through this course, participants will gain practical experience with implementing Microsoft Entra ID, Multi-Factor Authentication (MFA), conditional access, and identity protection—critical skills for securing cloud environments and managing access within Microsoft 365 and Azure AD. What distinguishes this course is its hands-on, exam-focused approach. Real-world scenarios and case studies provide learners with not only the knowledge to pass the SC-300 exam but also the practical tools to apply these skills in their day-to-day professional work. Ideal for cloud security engineers, Microsoft 365 administrators, and IT professionals seeking SC-300 certification, this course assumes a basic familiarity with Microsoft 365 and Azure AD to ensure maximum benefit from the content.

Syllabus

  • Implementing and Configuring a Microsoft Entra Tenant
    • In this section, we design and secure a Microsoft Entra tenant, integrate custom domains and branding, and delegate access using roles and Administrative Units to build a robust identity boundary.
  • Creating, Configuring, and Managing Microsoft Entra Identities
    • In this section, we manage Microsoft Entra cloud, synced and guest identities, apply custom security attributes, enforce Zero Trust access, and automate licensing and reporting with Entra PowerShell for governance.
  • Implementing and Managing Identities for External Users and Tenants
    • In this section, we learn to configure Entra ID guest options, manage external user lifecycle, enforce cross tenant policies and synchronization, and connect external identity providers like Google for secure, compliant multi tenant collaboration.
  • Implementing and Managing Hybrid Identity
    • In this section, we configure Entra Connect and Cloud Sync, apply filters, enable password-hash or pass-through authentication with seamless SSO, migrate from AD FS, and monitor hybrid identity health.
  • Planning, Implementing, and Managing Microsoft Entra User Authentication
    • In this section, we build tenant multi factor authentication, self service password reset, passwordless keys and certificates, smart lockout, banned passwords, and hybrid Kerberos to secure Microsoft Entra identities.
  • Planning, Implementing, and Managing Microsoft Entra Conditional Access
    • In this section, we explore Conditional Access planning, multifactor authentication, session and device controls, and Continuous Access Evaluation to deliver adaptive security that meets compliance without hindering users.
  • Managing Risk Using Microsoft Entra ID Protection
    • In this section, we configure Microsoft Entra ID Protection to assess user and sign-in risk, enforce MFA registration, and investigate, alert, and remediate compromised users and workload identities.
  • Implementing Access Management for Azure Resources by Using Azure Roles
    • In this section, we create least-privilege Azure RBAC roles, assign them at appropriate scopes, verify effective permissions, and secure virtual machines and Key Vault resources using Microsoft Entra ID.
  • Implementing Global Secure Access
    • In this section, we deploy Global Secure Access (SSE) clients through manual or Intune methods, configure Private and Internet Access, and apply Conditional Access to protect on-premises and cloud resources.
  • Planning and Implementing Identities for Applications and Azure Workloads
    • In this section, we compare Azure identity options, including service principals, create system-assigned and user-assigned managed identities, and test resource access, securing application workloads and ensuring compliance without hard-coded credentials.
  • Planning, Implementing, and Monitoring the Integration of Enterprise Applications
    • In this section, we configure tenant-level consent policies, assign appropriate Microsoft Entra administrator roles, and publish on-premises and SaaS applications via Application Proxy to ensure secure compliant access.
  • Planning and Implementing App Registrations
    • In this section, we plan Microsoft Entra ID app registrations, secure OAuth2 flows with correct redirect URIs, and assign delegated or application API permissions alongside custom app roles.
  • Managing and Monitoring App Access Using Microsoft Defender for Cloud Apps
    • In this section, we leverage Microsoft Defender for Cloud Apps to discover shadow IT, enforce Conditional Access App Control, create session policies, and tune risk scores to strengthen SaaS security.
  • Planning and Implementing Entitlement Management
    • In this section, we design least-privilege entitlement architectures with Microsoft Entra, building catalogs and access packages, automating access requests, enforcing terms of use, and governing external user lifecycles for collaboration.
  • Planning, Implementing, and Managing Access Reviews in Microsoft Entra
    • In this section, we plan licensing and scope for Microsoft Entra access reviews, configure recurring evaluations for groups and roles, then analyze reports to remediate excess permissions and uphold least-privilege.
  • Planning and Implementing Privileged Access
    • In this section, we configure Privileged Identity Management for just in time Entra role elevation, manage Azure resources and groups, and examine audit logs to uphold least privilege and maintain break-glass accounts.
  • Monitoring Identity Activity Using Logs, Workcourses, and Reports
    • In this section, we design an Entra ID monitoring architecture, inspect sign-in, audit, provisioning logs, route diagnostics, and apply KQL workbooks and Identity Secure Score for security and compliance.
  • Planning and Implementing Microsoft Entra Permissions Management
    • In this section, we explore how to onboard Azure in Entra Permissions Management, analyze permission creep, and configure alerts that reinforce least privilege across multi-cloud architectures.

Taught by

Packt - Course Instructors

Reviews

Start your review of Microsoft Identity & Access Administrator SC-300 Exam Guide

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.