LinkedIn Learning – Privileged Access Management

LinkedIn Learning – Privileged Access Management
English | Tutorial | Size: 94.65 MB


This intermediate course for cybersecurity professionals highlights what Privileged Access Management (PAM) is, why it is used, and best practices for its uses.

Cloud Academy – Implementing Azure Active Directory Privileged Identity Management

Cloud Academy – Implementing Azure Active Directory Privileged Identity Management-STM
English | Size: 1.21 GB
Category: Tutorial

At a time when security breaches seem to be an everyday occurrence, it s become more and more important to protect resources with more than just a username and password It s even more important to protect resources from INTERNAL threats. By implementing Azure AD Privileged Identity Management, organizations can protect their resources with improved security features, and even keep an eye on what legitimate administrators are doing
In this course, you ll learn how to implement Azure AD Privileged Identity Management. We ll start the course by touching on an overview of what Azure AD Privileged Identity Management is and what it offers. We will then work through the deployment of PIM and how it works with multi-factor authentication. As we work through some demos, you will learn how to enable PIM and how to navigate tasks in PIM