NextGen Cyber Army – implementing access management for Azure/Global Secure Access |Haladu Abdullahi
Автор: Naija Microsoft Security Usergroup
Загружено: 2026-01-10
Просмотров: 120
Описание:
Welcome back to the Next Gen Cyber Army, Microsoft Security Bootcamp Series!
In this session, we dive deep into implementing access management for Azure resources and Microsoft Global Secure Access, focusing on authorization, role-based access control (RBAC), Zero Trust principles, and best practices for securing access in Microsoft Entra ID and Azure environments.
🎙 Session Speaker: Haladu Abdullahi
👥 Organizer / Host: Oyimafu Emmanuel
🏷 Community: Microsoft Naija Security User Group
📌 Session Highlights & Timestamps
Topic Timestamp
Session Kickoff & Overview 0:08
Introduction to Azure Access Management 0:25
Authentication vs Authorization Explained 0:57
Permission Scoping & Least Privilege 1:38
Understanding Global Admin vs Other Admin Roles 1:56
Overview of Microsoft Entra Admin Roles 2:11
Access Issues & Geo-based Blocking Scenarios 2:17:19
Troubleshooting Access & Secure Access Issues 2:17:36
Best Practices: Pilot Users, Communication & Logs 2:17:41
Licensing Requirements (P1 / P2 / Entra Suite) 2:18:21
Global Secure Access Admin Role Explained 2:18:36
Read-only vs Admin Roles for Secure Access 2:19:10
Zero Trust & Identity-Driven Access Recap 2:19:41
Internet Access & Private Access Profiles 2:19:58
Conditional Access Integration 2:20:16
Remote Networks Configuration 2:20:34
Open Q&A Session 2:20:53
Learning Resources & Deployment Guides 2:21:02
Session Wrap-Up & Closing Remarks 2:21:28
Appreciation & Closing 2:22:04
🎯 Who Should Watch This?
✅ Cloud & Security Beginners
✅ Azure & Microsoft Entra ID Administrators
✅ Identity & Access Management (IAM) Learners
✅ SC-300 / SC-900 Candidates
✅ Anyone building real-world Azure security skills
🚀 Key Takeaways
Difference between Authentication and Authorization
Implementing RBAC for Azure resources
Understanding Microsoft Entra Admin roles
Configuring Global Secure Access
Applying Zero Trust using identity-driven controls
Best practices for secure access deployment
👍 Stay Connected & Support the Community
🔔 Subscribe on YouTube:
/ @naijamicrosoftsecuritygroup
💼 Follow us on LinkedIn:
/ microsoft-naija-security-user-group
🏁 Final Note
Security is no longer just network-based, identity is the new control plane.
Train today. Defend tomorrow. 💪🔐
Welcome to the Next Gen Cyber Army.
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: