Microsoft Azure Security, Part 2 of 8: Conditional Access
Interactive

Microsoft Azure Security, Part 2 of 8: Conditional Access

LearnNow Online
Updated Sep 04, 2020

Course description

This course helps prepare for the Microsoft Certified: Azure Security Engineer (AZ-500 exam). It will cover AAD Conditional Access Consisting of, AAD access, Device based access and AAD Identity Protection.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

Candidates for this exam should have strong skills in scripting and automation, a deep understanding of networking, virtualization, and cloud N-tier architecture, and a strong familiarity with cloud capabilities.


Meet the expert

Varma Rudra

Varma has over 14 years of experience in defining the integrated process, application, data & cloud architectures for both corporate & large scale multi-million business transformation programs and has worked extensively in defining strategy for migration of on-premise applications into AWS & Azure Cloud IaaS, PaaS, SaaS platforms. He is a TOGAF certified enterprise architect, PRINCE2 practitioner, and hold several certifications in SAP and cloud space.

Video Runtime

72 Minutes

Time to complete

128 Minutes

Course Outline

AAD Conditional Access

Conditional Access in AAD (20:48)

  • Introduction (00:13)
  • Introduction to Conditional Access in AAD (11:39)
  • Demo: Location based conditional access policy (08:48)
  • Summary (00:08)

Device Based Access (37:08)

  • Introduction (00:08)
  • Device based conditional based access (11:29)
  • Demo: Join a Windows 10 device with AAD (12:42)
  • Demo: Implement device based conditional access i (12:39)
  • Summary (00:08)

AAD Identity Protection (14:52)

  • Introduction (00:08)
  • Azure AD Identity protection (08:24)
  • Demo: Identity protection features and policies (06:11)
  • Summary (00:08)
;