During this 4-day course of super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Microsoft Identity Manager.
You´ll be able to:
Why this course:
This is a 4-day deep dive course on Microsoft Identity Manager, it’s ideal for System Engineers, Solution Architects, developers, and IT staff responsible for managing identities in their corporate environment. To attend this training, you should have good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
This training is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!
|
|
Prerequisites |
To participate in the course you need a Stable internet connection. For the best learning experience, we also need you to have a webcam, headphones, and a microphone.
|
|
Target Audience |
This training is intended for system engineers, solution architects, developers and IT staff responsible for managing identities in their corporate environment.
To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
Good understanding and hands on experience with Microsoft technologies: Active Directory, SQL Server, Exchange Server, Azure Active Directory.

Course content:
Module 1: General introduction – The principles of IDM & IAM
Before we jump in to the Microsoft Identity components, it’s essential to set a command
knowledge baseline about Identity Management (IDM) and Access Management, usually brought together in IAM (Identity & Access Management).
What is security about? Why does IAM matter? How do we connect identity with authentication and authorization.
Module 2: The Microsoft IAM landscape
Microsoft Identity Manager (MIM) is part of a bigger picture. Already for a longtime, MIM (or its predecessors, has played an important role in identity management, not only for company internal IT or infrastructure, but also in the cloud… You’ll find MIM components in many Microsoft tools.
In this module, we’ll sketch a quick overview on the Microsoft IDM and IAM landscape from data center to cloud. How do we link together different data stores, identity store and cloud with the identity lifecycle of your enterprise.
Module 3: Microsoft Identity Manager Architecture
Detailed discussion about MIM architecture and its components: MIM Portal, MIM Service, MIM Synchronization Service, MIM Reporting.
We will also provide an answer to the
question what business needs can be addressed with MIM. Brief presentations of built-in functionality, on which we will expand later in the course, will conclude this module.
We will also introduce the concepts of role-based access control and privileged
access management.
Module 4: Installation and Deployment
We will discuss various scenarios of MIM deployment and perform detailed analysis
of benefits and drawbacks of each solution.
We will present how to install Microsoft
Identity Manager and execute recommended post installation tasks.
Additionally, we will present how to perform capacity planning properly.
Module 5: MIM Synchronization Service
We’ll introduce you to the Synchronization Service and discuss its features. Students will gain hand on experience with main tools used to design, implement and manage synchronization.
We’ll discuss in detail the configuration of Management Agents and explain
various task related to schema management. We’ll compare initial loads to schedule runs.
The last part of this module will be spent on discussing how to move configurations between test and production environments.
Module 6: MIM Service Configuration
We will present and discuss MIM Service features. Trainers will also demonstrate the
configuration and customization of MIM Portal.
Module 7: User Management
The primary goal of almost all Microsoft Identity Manager installations is user management.
We will show how to provision accounts through MIM Portal. We will also discuss how to effectively use MIM policies.
Module 8: Group Management
We will discuss different group types and scopes in both Active Directory and Microsoft Identity Manager.
We will show how to create criteria-based groups.
To conclude this module, we will discuss the task related to group management.
Module 9: Password Management
We will focus on configuration and deployment of self-service reset password functionality, which allows users to reset their passwords without IT staff help.
We will describe how password synchronization works and how we can modify its configuration.
Module 10: High level overview of Role based access control (RBAC), PAM and Certificate management
In module 10 we’ll discuss MIM features that are (being) migrated to Azure, still it’s important to know how they work.
We will present how to deploy RBAC in your environment, which involves defining roles and control access based upon those roles.
We will discuss BHOLD Suite including designing and managing attestation process. Although this module has migrated to Microsoft Azure,
it’s quite important to understand RBAC.
We will also discuss the risks associated with access escalation and privileged accounts and how to manage them with PAM, including some essential process designs.
We will also introduce you to the concepts of certificate management. We will look at implementing various scenarios based on certificates including cross forest and ADFS scenarios.
We will take a look at MIM reporting features. Experts will discuss how reporting works under the hood and how you can customize and deploy it in your own infrastructure.
Module 11: Problems? Some basic MIM troubleshooting
We will demonstrate the troubleshooting procedures that will help when you end up in trouble with your MIM installation
Module 12: Best Practices
After this module day to day operations of Microsoft Identity Manager will not be a mystery for you.
We will also discuss a very important and often forgotten topic of backup and restore.
To conclude our course the xpert will present best practices for MIM configuration and management.
Module 13: The MIM community online
There is a massive library of MIM information and MIM resources available on the internet.
Where do you need to look? We’ll dig in to the best online resources and MIM community platforms to help yourself, go get help or to find interesting resources to the best job.
Where to look for online forums, help articles, Wiki, community, advanced scenarios, free tools and plugins to increase the performance of your MIM environment.

Certification
After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

FAQ - Ofte stilte spørsmål
Hva lærer jeg på dette kurset?
Du får en grundig og teknisk dypdykk i Microsoft Identity Manager (MIM) og hvordan det brukes til å administrere identiteter i komplekse enterprise-miljøer.
Kurset dekker blant annet:
Hvem passer kurset for?
Kurset er utviklet for:
Dette er et avansert kurs og passer for erfarne fagpersoner som jobber med identitetsløsninger i enterprise-miljøer.
Hvilke forkunnskaper kreves?
Du bør ha:
Dette er ikke et nybegynnerkurs.
Hvordan foregår kurset?
Kurset leveres som en internasjonal live virtuell klasse over fire intensive dager.
Du får:
Er kurset praktisk?
Ja. Kurset kombinerer teknisk teori med hands-on øvelser. Du jobber med:
Hva er hovedfokuset i kurset?
Hovedfokuset er å gi deg full forståelse av hvordan MIM fungerer i praksis – fra arkitektur og installasjon til drift, sikkerhet og governance.
Du lærer hvordan MIM løser reelle forretningsbehov innen:
Dekker kurset RBAC og PAM?
Ja. Kurset gir en overordnet gjennomgang av:
Får jeg sertifisering?
Ja. Etter fullført kurs mottar du en livslang Certificate of Completion. Sertifiseringen krever ingen fornyelse.
Hva gjør dette kurset annerledes enn standard MIM-kurs?
Kurset er en teknisk MasterClass med fokus på:
Dette er ikke kun et produktkurs – det er et strategisk og operativt dypdykk.
Hva vil jeg sitte igjen med etter kurset?
Du vil kunne:
Hva trenger jeg teknisk for å delta?
Du trenger stabil internettforbindelse, webkamera, mikrofon og hodetelefoner for å delta i den virtuelle klassen.

This course is a great starting point, if you want to explore more within security, have a look at these courses:
Microsoft Azure & Cloud
Data & AI
Microsoft Security & Identity
AI & Copilot spesifikt
Broader Cybersecurity