Module 1: Introduction to Microsoft Azure Active Directory
- What is Azure Active Directory?
- Comparison with on-premises Active Directory
- Core features and benefits
Module 2: Setting Up Azure AD
- Creating an Azure AD tenant
- Configuring custom domains
- Initial setup and configurations
Module 3: Managing Users and Groups
- Creating and managing users
- User settings and profile
- Managing groups and group memberships
- External users and guest accounts
- Azure AD B2B and B2C basics
Module 4: Authentication and Authorization
- Understand authentication basics
- Implementing Multi-Factor Authentication (MFA)
- Managing application access
- OAuth, OpenID Connect, and SAML protocols
Module 5: Azure AD Join and Azure AD Domain Services
- Benefits and use cases for Azure AD Join
- Setting up Azure AD Domain Services
- Comparison with on-premises AD DS
Module 6: Application Integration
- Adding and configuring applications
- Single Sign-On (SSO) configurations
- Managing application provisioning
Module 7: Azure AD Conditional Access
- Understanding Conditional Access policies
- Implementing Conditional Access
- Common scenarios and use cases
Module 8: Azure AD Identity Protection
- Risk detections and reports
- Risk policies
- Reviewing risky sign-ins and users
Module 9: Azure AD Privileged Identity Management (PIM)
- Introduction to PIM
- Role assignments and activation
- Access reviews
Module 10: Azure AD B2B and B2C
- Differences between B2B and B2C
- Implementing collaboration with external users
- Setting up Azure AD B2C and custom policies
Module 11: Monitoring and Reporting
- Azure AD auditing
- Monitoring and diagnostics
- Reporting and insights
Module 12: Integration with Microsoft 365 and Other Microsoft Services
- Setting up Azure AD for Microsoft 365
- Integration with Intune, Power Platform, and other Microsoft services
Module 13: Advanced Topics (Optional)
- Azure AD Graph and Microsoft Graph
- Azure AD PowerShell Module
- Azure AD development and extensibility
Module 14: Best Practices and Recommendations
- Security best practices
- Governance and compliance
- Backup and recovery
Module 15: Conclusion and Next Steps
- Real-world scenarios and use cases
- Additional resources and further learning
- It's essential to note that the complexity and depth