- This module introduces students to the various authentication methods used to protect identities.
After this module, you should be able to:
- Describe Windows Hello for Business
- Describe Windows Hello deployment and management
- Describe Microsoft Entra ID Protection
- Describe and manage self-service password reset in Microsoft Entra ID
- Describe and manage multi-factor authentication
- This module describes how clients can be configured to access organizational resources using a virtual private network (VPN).
- Describe how you can access corporate resources
- Describe VPN types and configuration
- Describe Always On VPN
- Describe how to configure Always On VPN
- This module describes how to use compliance and conditional access policies to help protect access to organizational resources.
After this module, you should be able to:
- Describe device compliance policy
- Deploy a device compliance policy
- Describe conditional access
- Create conditional access policies
- This module describes how to use Microsoft Endpoint Manager and Power BI to create compliance and custom reports.
After this module, you should be able to:
- Generate inventory reports and Compliance reports using Microsoft Intune
- Report and monitor device compliance
- Create custom reports using the Intune Data Warehouse
- Use the Microsoft Graph API for building custom reports
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Protect identities in Microsoft Entra ID
- Introduction
- Explore Windows Hello for Business
- Deploy Windows Hello
- Manage Windows Hello for Business
- Explore Microsoft Entra ID Protection
- Manage self-service password reset in Microsoft Entra ID
- Implement Microsoft Entra multifactor authentication
- Module assessment
- Summary
- Enable organizational access
- Introduction
- Enable access to organization resources
- Explore VPN types and configuration
- Explore Always On VPN
- Deploy Always On VPN
- Module assessment
- Summary
- Implement device compliance policies
- Introduction
- Protect access to resources using Intune
- Explore device compliance policy
- Deploy a device compliance policy
- Explore conditional access
- Create conditional access policies
- Module assessment
- Summary
- Generate inventory and compliance reports
- Introduction
- Report enrolled devices inventory in Intune
- Monitor and report device compliance
- Build custom Intune inventory reports
- Access Intune using Microsoft Graph API
- Module assessment
- Summary