Identity & Access Management

For Security Engineers, M365 Administrators, Identity Engineers, and IT Leads Who Design, Operate, and Defend Identity Programs

Identity and Access Management in Microsoft 365

Stop managing identities. Start governing them.

Right now, access accumulates in your tenant without review. Service principals outnumber your users and nobody governs them. Developers leave and their applications keep authenticating. Auditors ask for evidence and you scramble. This course takes you from that reality to a governed identity program — where every identity has an owner, every permission has a justification, every lifecycle event is automated, and compliance evidence is a byproduct of how you operate, not a project you start the week before an audit.

Content last updated: May 2026

Text-based · M365 E5 developer tenant + Entra ID Governance labs · 2 free modules available now · 40 CPE credits · Content last updated: May 2026

What you'll deploy immediately after this course
A governed identity program where every identity — human and machine — has an accountable owner
Automated lifecycle that provisions on day one and revokes completely on the last day
Non-human identity governance that treats service principals and AI agents with the same rigor as users
Access that is justified, time-bound, and automatically revoked when the business need ends
Compliance evidence on demand — not a scramble before the assessment
20+ Architecture Decision Records your successor can follow and your auditor can verify
IAM PROGRAM — SIX CAPABILITY DOMAINS PHASE 1 — FOUNDATIONS + ENTRA ID PRIMER IAM thinking · Identity ecosystem · Data quality · Governance assessment PHASE 2 — USER IDENTITIES User objects · Bulk operations · Groups · Role-based access · Licensing PHASE 3 — AUTHENTICATION + ACCESS Auth methods · Passwordless · Conditional Access · Token protection PHASE 4 — APPS + WORKLOAD IDENTITIES OAuth consent · Service principals · Managed identities · AI agents PHASE 5 — PRIVILEGED ACCESS + DELEGATION PIM · Role governance · Emergency access · Administrative units PHASE 6 — GOVERNANCE + LIFECYCLE Lifecycle workflows · Entitlement mgmt · Access reviews · Compliance 17 modules · 20+ ADRs · Built on your own M365 tenant
View Pricing Take End of Course Exam → 40 CPE Credits

What you'll be able to do

Design and operate a complete IAM program covering human and non-human identities
Govern service principals, workload identities, and AI agents with operational cadences
Build authentication architecture with passwordless roadmap and Conditional Access governance
Automate the identity lifecycle with joiner, mover, and leaver workflows
Implement entitlement management and access reviews that actually find problems
Produce compliance evidence mapped to ISO 27001, SOC 2, NIST CSF, and Cyber Essentials

From administration to governance

Most identity training teaches you how to configure features. This course teaches you how to operate a program. The difference matters when the auditor arrives, the developer leaves, or the AI agent accumulates permissions nobody approved.

Every module follows the same four-stage cycle: Design the governance solution with real-world constraints — incomplete HR data, E3 licensing gaps, managers who rubber-stamp access reviews. Implement in your own M365 tenant — portal first, then PowerShell and Graph API. Govern by establishing the recurring cadences that keep the program running after the initial build. Validate that the governance control actually works — if a lifecycle workflow fails silently, you find out in your lab, not during an audit.

Configuration is a project. Governance is an operation. This course builds the operation.

Who this course is for

M365 administrators ready to move beyond ad-hoc identity management — you create users, assign licenses, and reset passwords, but provisioning is manual, access reviews are spreadsheets, and nobody knows what 200+ app registrations in your tenant actually do.

Security engineers who need the governance layer — you can configure Conditional Access and PIM, but the organization still has stale accounts, departed developers' applications running on old credentials, and no evidence that access is actually governed.

IT managers and security leads who answer to auditors — you get findings about over-provisioned access and can't produce the evidence to close them. You need the framework, the cadences, and the compliance documentation.

Identity engineers who want to formalize what they do — provisioning is ad-hoc, movers keep old access, leavers have residual permissions, and the organization has no visibility into the non-human identities accumulating in the tenant.

Anyone with a genuine interest in identity and access management. Whatever your background — early career, transitioning from another domain, or expanding your skill set — if the subject interests you and you're willing to do the work, this course is for you. Backgrounds vary. Motivation is what matters.

What you will be able to do

1. Operate a complete IAM program — not just configure identity features, but run the governance program that controls who gets access to what, why, for how long, and what happens when the business need ends. Every design decision documented as an ADR with evidence from your own tenant.

2. Govern non-human identities with the same rigor as user accounts — service principal inventory and classification, credential health monitoring, permission right-sizing, AI agent governance with sponsor accountability. The capability that most organizations don't have and no competitor teaches.

3. Eliminate manual provisioning and access accumulation — automated joiner, mover, and leaver workflows that provision on day one, adjust when roles change, and revoke completely when people leave. Entitlement management with self-service access requests, approval chains, and automatic expiration.

4. Make access reviews find real problems — design reviews that surface over-provisioned access instead of generating rubber-stamp approvals. Reviewer assignment, scope targeting, cadence design, automated remediation, and the governance structure that makes certification meaningful.

5. Produce compliance evidence as a byproduct of how you operate — ISO 27001 A.5.15–A.5.18, SOC 2 CC6.1–CC6.3, NIST CSF PR.AC, Cyber Essentials. Automated evidence collection scripts that run on schedule. The compliance package that auditors ask for and most organizations can't produce.

6. Defend every decision to your CISO, your auditor, and your successor — 20+ Architecture Decision Records documenting context, decision, alternatives rejected, consequences, and residual risk. The documentation that survives staff changes and satisfies audit requirements.

Course at a glance

Modules: 17 (14 content + 1 capstone + 2 reference)

Phases: 6 (Foundations → User Identities → Authentication + Access → Apps + Workload Identities → Privileged Access → Governance + Lifecycle)

Estimated study time: 36–40 hours

ADRs produced: 20+

Decision matrices: 5+

Risk register entries: 15+

Reusable scripts: 50+ PowerShell and Graph API scripts

CPE credits: 40

Free modules: IAM0 + IAM1 (no account required)

Lab: M365 E5 developer tenant + Entra ID Governance trial (yours to keep)

Typical pace: ~5-10 weeks at 5 hrs/week

Built by Ridgeline Cyber

Ridgeline Cyber Defence builds security operations training grounded in operational experience. The team behind this course runs CSOC operations, manages Entra ID environments, and builds identity governance programs for production tenants.

This course isn't SC-300 study material repackaged as training. It's based on the IAM programs we build and operate — the same orphaned service principals, the same "Approve All" access review problem, the same HR systems that don't populate the attributes lifecycle workflows depend on. Every anti-pattern box comes from real assessment findings. Every decision matrix comes from real governance projects.

The course is text-based. No videos, no live sessions, no cohorts. You work at your own pace, on your own schedule, with content you can search, reference, and return to. The format is deliberate — identity governance is a reading and doing discipline, not a watching discipline.

Lab environment

M365 E5 Developer Tenant — free tenant with 25 E5 user licenses. Provides Entra ID, Exchange Online, SharePoint, Teams — every service the course uses. Setup in IAM0.6 takes about 30 minutes.

Entra ID Governance Trial — 90-day free trial covering lifecycle workflows, entitlement management, and access reviews. Renewable with active development. Without the trial, Graph API and PowerShell workarounds cover approximately 70% of governance capability — every module includes a "Without Entra ID Governance Licensing" callout with the workaround.

Test accounts — 15+ personas covering different departments, employment types, and access levels. Created during the course and used throughout for lifecycle testing, access reviews, and governance validation.

App registrations — 20+ test applications with varying permission levels, credential states, and ownership profiles for the non-human identity governance modules.

Azure subscription — minimal, for managed identity and workload federation exercises only. Free tier is sufficient.

No hosted lab images. You build the environment yourself, module by module. By course end, you have a fully configured IAM program in a tenant you own and can continue to use.

What you get that you won't find elsewhere

The non-human identity governance program that nobody else teaches. Service principals outnumber your users. AI agents are accumulating permissions with no governance framework. No training provider covers the full non-human identity lifecycle — inventory, credential health, permission analysis, consent governance, lifecycle management, and operational cadences — as a structured program. SC-300 doesn't teach it. SANS doesn't cover it. This course dedicates three modules to the governance gap that most organizations don't even know they have.

The messy middle, not the clean demo. Your HR system doesn't populate the attributes lifecycle workflows depend on. Managers click "Approve All" on access reviews in under 60 seconds. Developers create app registrations without telling anyone. E3 licensing blocks the Governance features you need. Every module addresses these realities with workarounds, compensating controls, and the honest assessment of what's achievable with the licensing you have.

An identity operation, not an identity project. Most identity training ends when the feature is configured. This course builds the operational cadences — daily, weekly, monthly, quarterly — that keep the program running after the initial implementation. The difference between "we configured access reviews" and "we operate an access review program" is the difference between a compliance checkbox and actual governance.

A program you can hand to your successor. 20+ ADRs documenting every design decision. Operational cadences documented. Risk register maintained. Executive summary written. When you move on, your successor doesn't start from scratch — they inherit a documented, defensible, operating program.

The outcome

You start with identity as an administrative function — manual provisioning, ad-hoc access, ungoverned service principals, and a scramble every time an auditor asks for evidence. You finish with identity as a governed program:

New hires get the right access on day one. Leavers lose it completely on their last day. Movers get adjusted access automatically when their role changes. No tickets, no delays, no residual permissions.

Every identity has an owner. Human accounts have managers. Service principals have application owners. AI agents have sponsors. Orphaned identities are detected and escalated before they become attack paths.

Access reviews find real problems. Not 100% approval rates in under 60 seconds. Scoped reviews with context, targeted reviewers, automated remediation, and evidence that the certification actually evaluated whether access is still needed.

Compliance evidence exists before the auditor asks. ISO 27001, SOC 2, NIST CSF, Cyber Essentials — the controls are mapped, the evidence is automated, and the package is ready.

Every decision is documented and defensible. 20+ ADRs with context, alternatives, consequences, and residual risk. The documentation your CISO presents to the board and your successor uses to understand why things are the way they are.

At $289/year, this is less than a single day of instructor-led training — for a complete IAM program you work through at your own pace and reference permanently.

Where this course fits

This course implements and operates the identity domain. Other Ridgeline courses design or investigate around it:

M365 Security Architecture designs the architecture. IAM implements and operates the identity domain in depth.

Entra ID Security teaches identity threat detection. IAM teaches identity governance. Phase 3 overlaps intentionally — IAM teaches authentication and CA from a governance perspective, EI from a threat perspective.

Practical IR investigates when identity governance fails. IAM reduces the attack surface that IR responds to.

Detection Engineering writes detection rules. IAM M13 creates identity-specific detection rules for governance operations.

Admin to Defender (free) covers M365 basics. IAM assumes this level or teaches inline.

Conditional Access (skill) covers 7 subs. IAM5 covers 14 subs with full governance context.

Learner ladder: Admin to Defender (basics) → M365 Security Architecture (design layer) → Identity and Access Management (identity operations layer) → Entra ID Security (detection layer) → Practical IR (investigation layer)

Support and community

Questions about course content: training@ridgelinecyber.com

Billing and account management: Self-service via your account page or training@ridgelinecyber.com

LinkedIn: Follow Ridgeline Cyber for operational security content and course updates

X: @RidgelineCyber

Usage rights and disclaimer

Course materials: Licensed for individual professional development. You may deploy configurations, governance frameworks, scripts, and policies from this course in your organization's production environment. You may not redistribute course content, share account credentials, or republish course materials.

Governance configurations: All PowerShell commands, Graph API queries, lifecycle workflows, access review configurations, and entitlement management packages are provided as-is for deployment in your environment. Test every configuration in a non-production tenant before deploying to production. Identity governance controls have organizational impact — validate scope and remediation actions before enforcement. Ridgeline Cyber Defence is not responsible for operational impact from deployed configurations.

Scenarios: All example data uses the Northgate Engineering fictional environment. Any resemblance to real organizations, incidents, or individuals is coincidental.

Version and changelog

Current version: 1.0  |  Last updated: May 2026

2026 — v1.0: Course launch. 17 modules across 6 phases. Complete IAM program from identity fundamentals through non-human identity governance, lifecycle automation, entitlement management, access reviews, and capstone assembly. Graph API evidence, PowerShell implementation, portal-first instruction, and ADR documentation throughout.

This course is actively maintained. Governance features are updated as Microsoft capabilities evolve, Entra ID Governance adds features, and the identity threat landscape changes.

COURSE ASSESSMENT

End of Course Exam

Complete the course, then prove your skills under time pressure. Pass mark: 70. Earn your certificate with CPE credits.

40minutes
3phases
100points
1scenario
Take End of Course Exam

Requires 80% course completion. One random scenario per attempt. Certificate issued on pass.