This course doesn't just familiarize you with the basic concepts of Identity and Access Management (also known as IAM), it also explains how specific versions of Windows and Microsoft cloud services interact with IAM and provide network security. You'll learn the opportunities and limitations of different identity and access solutions across the Microsoft ecosystem.
Access all premium content with a free week!Start a free week
3 HOURS OF TRAINING
0 VIRTUAL LABS
0 PRACTICE EXAMS
Nugget trainer since 2020Read the full bio
What is it like to train with us?
Our learners say it best.
Helps me learn the skills I need when I need themTHOMAS S. | SYSTEMS ENGINEER & CONSULTANT
Getting Started with Microsoft Identity and Access Management: What is IAM? FAQs: Cost, Training, Value
Students of IT, new systems administrators and network administrators, and even general business users should take this course. Identity and Access Management (IAM) is a fundamental skill not just for administering a network, but also for using it. Be a better technology user after learning how IAM verifies users' identities and grants them access.
Although this Microsoft Identity and Access Management training isn't directly associated with any certifications, it is helpful for preparing for many different exams. IAM is an important part of certifications that administrators, business users and even developers can use to advance their career. This course will help you prepare for exams on implementing and using IAM.
This course can apply to many different certs, depending on platform, job role and experience level. The Microsoft Certified: Security, Compliance, and Identity Fundamentals is a good Azure-based course for new business users. And the Microsoft Certified: Identity and Access Administrator Associate is good for experienced techs who'd like to specialize their careers and expand their experience.
You should take this course on Microsoft IAM if you have any interest in a career in IT, or if you need a basic understanding of network security for your job. Even people who don't plan on working as systems administrators benefit from knowing how to identify authorized users and verify their identities.