Microsoft SC-300 Exam Course: Identity and Access Admin

Prepare for the SC-300: Microsoft Identity and Access Administrator exam by mastering identity governance, authentication, access management, and hybrid identity solutions. This course covers Azure AD, conditional access, privileged identity management (PIM), and enterprise app integrations to secure identity solutions.

4.9
(525)
8,000 Students
14.5 Hours
Stage 3 - Intermediate

Last update: Dec 2023

Audio Language: English

Subtitles/Captions: Yes

Caption Language: English

Focus: Azure Courses, Cloud Security Training, Cloud Certification Courses, Certification Courses, Cyber Security Certification Courses, Cloud Computing Courses, Cyber Security Courses

Type of Training: Online self-paced

Microsoft SC-300 Exam Course: Identity and Access Admin

What You’ll Learn

This Microsoft SC-300 Exam Course: Identity and Access Admin course will teach you:

  • Implement Identity Management:
    Configure Azure AD, custom domains, and administrative units.
  • Hybrid Identity Solutions:
    Deploy Azure AD Connect, Password Hash Sync (PHS), Pass-Through Authentication (PTA), and SSO.
  • Conditional Access & MFA:
    Implement Multi-Factor Authentication (MFA), risk policies, and access reviews.
  • Identity Governance:
    Manage privileged identity management (PIM), entitlements, and role assignments.
  • Application Security:
    Integrate SSO for SaaS apps, Azure AD Proxy, token-based authentication, and custom app permissions.
  • External Identities:
    Configure B2B and B2C collaboration, identity federation, and access policies.
  • Authentication & Authorization:
    Implement passwordless authentication, FIDO2 keys, and identity protection.
  • Enterprise Application Management:
    Configure app registrations, consent settings, and Microsoft Cloud App Security (MCAS).
  • Security Monitoring:
    Analyze sign-in logs, audit reports, Sentinel integration, and security alerts.
  • SC-300 Exam Preparation:
    Learn best practices, troubleshooting techniques, and case study-based security solutions.

Included in the Microsoft SC-300 Exam Course

14.5 Hours of On-Demand Video

2 Downloadable Resources

1 Article

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Identity & Access Administrator

Security Engineer

Azure AD Engineer

IAM Specialist

Cybersecurity Analyst

IT Administrator

Course Content

Introduction

icon-yt Introduction Preview
icon-yt SC 300 Course Introduction Preview

Module 1: Implement and Identity Management Solution (25-30%)

icon-yt Module 1 - Introduction Preview
icon-yt Active Directory - Throw Back Preview
icon-yt What is Azure Active Directory Preview
icon-yt Who uses Azure AD Preview
icon-yt Azure AD Roles Preview
icon-yt Differences between Azure Roles and Azure AD Roles Preview
icon-yt Capabilities of Global Admin Preview
icon-yt Azure AD Roles - Lab Activity Preview
icon-yt Azure AD - Custom roles Preview
icon-yt Custom Domains Preview
icon-yt Deleting Custom Domains Preview
icon-yt Bring Your Devices Preview
icon-yt Azure AD registered Devices Preview
icon-yt Azure AD Join Preview
icon-yt Azure AD domain Join - Lab Preview
icon-yt Azure AD - Hybrid Joined Preview
icon-yt Azure AD - Administrative Units Preview
icon-yt Administrative Units - Lab Activity Preview
icon-yt Planning and Delegation - Administrative Units Preview
icon-yt Plan for Delegation Preview
icon-yt Security Defaults Preview
icon-yt Create Configure and Manage Identities - Introduction Preview
icon-yt Azure Active Directory - Users Preview
icon-yt Azure Active Directory - Groups Preview
icon-yt Managing Licenses Preview
icon-yt License Requirements Preview
icon-yt Licensing Features Preview
icon-yt Implement and Manage External Identities - Introduction Preview
icon-yt Azure AD B2B Collaboration Preview
icon-yt Azure AD B2B - Lab Activity Preview
icon-yt Dynamic Groups Preview
icon-yt Dynamic Groups - Lab Preview
icon-yt Azure AD B2B - Google Auth - Demo Preview
icon-yt Implement and Manage Hybrid Identity Preview
icon-yt Plan, Design, and Implement Azure AD Connect Preview
icon-yt Need for AD connect Preview
icon-yt Selecting the Right Authentication Method Preview
icon-yt Azure AD External Collaboration Settings Preview
icon-yt Azure AD Password Hash Synchronization (PHS) Preview
icon-yt Azure AD password Through Authentication (PTA) Preview
icon-yt Federated authentication Preview
icon-yt Architecture diagrams Preview
icon-yt Azure AD Design Considerations Preview
icon-yt Azure AD Connect Components Preview
icon-yt PHS - How does it work? Preview
icon-yt Azure AD connect - Lab Preview
icon-yt Troubleshooting Sync Errors Preview
icon-yt Data mismatch errors - InvalidSoftMatch Preview
icon-yt Data mismatch errors - ObjectTypeMismatch Preview
icon-yt Duplicate attributes - AttributeValueMustBeUnique Preview
icon-yt Data validation failures - IdentityDataValidationFailed Preview
icon-yt FederatedDomainChangeError Preview
icon-yt LargeObjects error Preview
icon-yt Azure AD Connect Health Installation Preview
icon-yt Azure AD Connect Health Preview
icon-yt Self Remediation and Orphaned Objects Preview
icon-yt Lab 1 - Assigning Roles to User Accounts Preview
icon-yt Lab 2 - Tenant Properties Preview
icon-yt Lab 3 - Assigning Licenses to groups Preview
icon-yt Lab 4 - External Collaboration Settings Preview
icon-yt Lab 5 - Restoring Deleted Users Preview
icon-yt Module 1 - Summary Preview

Module 2 - Implement an Authentication and Access Management Solution (25-30%)

icon-yt Module 2 - Introduction Preview
icon-yt Plan and Implement Azure Multifactor Authentication- Introduction Preview
icon-yt What is Azure AD MFA Preview
icon-yt How Multi-Factor Authentication works Preview
icon-yt Planning the MFA Preview
icon-yt Enforcing MFA with Conditional Access Preview
icon-yt Deciding supported authentication methods Preview
icon-yt Azure AD Authentication methods Preview
icon-yt Monitoring and Usage Preview
icon-yt Manage User Authentication- Lesson Introduction Preview
icon-yt Password Less Authentication - Introduction Preview
icon-yt Security Usability Availability of Authentication Methods Preview
icon-yt Configuring Fido Key for a User - Lab Preview
icon-yt Windows Hello for Business Preview
icon-yt Windows Hello for Business works-key points Preview
icon-yt Azure AD Password Protection Preview
icon-yt Azure AD Password Protection - Lab Preview
icon-yt Multiple Forests and RODC - Considerations Preview
icon-yt Plan Implement and Manage Conditional Access Preview
icon-yt What Policies are Enforced and to Whom? Preview
icon-yt Blocking legacy authentication Preview
icon-yt Conditional Access Policies - Planning Preview
icon-yt Conditional Access Policies - Benefits Preview
icon-yt Conditional Access policies - Components Preview
icon-yt Conditional Access Policies - Best Practices Preview
icon-yt Condition Access Policies - Most Common Policies Preview
icon-yt Conditional Access Policies - Build and Test Policies - I Preview
icon-yt Conditional Access Policies - Build and Test Policies - II Preview
icon-yt Sign in Risk and User Risk - Conditional Access Policy Preview
icon-yt Conditional Access Policy - Blocking Locations - Lab Preview
icon-yt Troubleshooting using Sign-in Logs Preview
icon-yt Device Compliance Preview
icon-yt Conditional Access Policy - Device Compliance - Lab Preview
icon-yt User Exclusions Preview
icon-yt Conditional Access Policy - O365 Block MFA Required - Lab Preview
icon-yt Test and Troubleshoot Conditional Access Policies Preview
icon-yt Implement Application Controls and Application Preview
icon-yt Scenario 1 - Microsoft 365 apps require an approved client Preview
icon-yt Scenario 2 - Exchange Online and SharePoint Online Preview
icon-yt App Protection Policies Overview Preview
icon-yt How Can you Protect App Data Preview
icon-yt Manage Azure AD Identity Protection - Introduction Preview
icon-yt Manage Azure AD Identity Protection Preview
icon-yt Risk Detection and Remediation Preview
icon-yt Permissions Preview
icon-yt License Requirements Preview
icon-yt Sign in and User Risk Policy Preview
icon-yt Choosing Acceptable Risk Levels Preview
icon-yt Prerequisites of Self Remediation Preview
icon-yt Navigating through the reports - Lab Preview
icon-yt Remediate Risks and Unblock Users Preview
icon-yt User Risk Remediation Options Preview
icon-yt Unblocking Users Preview
icon-yt Enable Azure AD MFA - EnterpriseWide LAB Preview
icon-yt Deploy SSPR - Setup Preview
icon-yt Security Defaults - Lab Preview
icon-yt Control User Sign in frequency - LAB Preview
icon-yt Smart Lockout Values Preview
icon-yt Configuring User and Sign in Risk Policy Preview
icon-yt Configure Azure AD MFA Registration Policy Preview
icon-yt Module 2 Summary Preview

Module 3 - Plan and Design Integration of Enterprise Apps for SSO (25-30%)

Module 4 - Plan and Implement Identity Governance Strategy (10-15 %)

Azure Sentinel - Chapter 1

Azure Sentinel - Chapter 2

Azure Sentinel - Chapter 3

OPEN FULL CURRICULUM

Requirements

Basic knowledge of Azure and Active Directory

Experience with authentication and access management solutions

Understanding of security principles and identity governance

Enthusiasm for learning and securing enterprise identity solutions

Description of Microsoft SC-300 Exam Training

The SC-300: Microsoft Identity and Access Administrator exam validates expertise in identity and access management, security policies, and governance strategies using Microsoft Entra ID (formerly Azure AD). This course covers the design, implementation, and monitoring of identity solutions for hybrid and cloud environments.

Gain hands-on experience with Azure Active Directory, authentication solutions, privileged access management (PIM), and application security. Whether you’re an identity security professional or preparing for the SC-300 certification, this course equips you with the skills needed to protect enterprise identities, secure applications, and manage access permissions.

  • Deploy Azure AD & Hybrid Identity Solutions (PHS, PTA, SSO, ADFS).
  • Implement MFA, conditional access, and identity protection policies.
  • Configure B2B & B2C identities, app registrations, and token-based authentication.
  • Monitor identity security risks using sign-in logs, audit reports, and Microsoft Sentinel.
  • Manage entitlement governance, role assignments, and security delegation.
  • Prepare for the SC-300 certification exam with expert-led training and hands-on labs.

Secure enterprise identities, prevent unauthorized access, and enhance identity governance with SC-300 certification training.

Who Is This Course For

Ideal for identity administrators, security professionals, and IT administrators looking to earn the SC-300 certification and specialize in Microsoft identity solutions.

Course Instructor

StationX

StationX has been an award-winning, leading provider of online cybersecurity training and consultancy services since 1999. Through hands-on learning experiences, StationX offers the most engaging and effective way to learn real-world concepts and skills essential for a successful cyber career.

StationX has built and aggregated over 1,000 classes, virtual labs, practice tests, and exam simulations covering cybersecurity, hacking, penetration testing, certifications, Linux, networking, and cloud computing. Their training has benefited more than 250,000 students in 195+ countries, earning them the prestigious AI Cyber Security Educator of the Year 2020 Award.

Read More

Read Less

Testimonials

Anonymous

Jang B.

I found the course to be well-paced and engaging, with a good balance of theory and practical application. The instructor was knowledgeable and approachable.

Anonymous

CH S.

The course content is well-organized and presented in a clear and engaging manner. I especially appreciated the inclusion of real-world examples and case studies.

Anonymous

Irfan P.

I've been working in IT for a few years now, and this course really helped me to fill in some gaps in my knowledge about Microsoft Identity & Access. I especially appreciated the focus on real-world scenarios.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!