ADSelfService Plus Starter Kit
Jumpstart your journey with the ADSelfService Plus Starter Kit—expert guidance and resources, all for free.
Start your journey here. Comprehensive, free courses designed to build a solid foundation in ManageEngine products.
Jumpstart your journey with the ADSelfService Plus Starter Kit—expert guidance and resources, all for free.
Jumpstart your journey with the ADManager Plus Starter Kit—expert guidance and resources, all for free.
Jumpstart your journey with the ADAudit Starter Kit—expert guidance and resources, all for free.
Jumpstart your journey with the M365 Manager Plus Starter Kit—expert guidance and resources.
Deep-dive into specific product capabilities. Earn verified badges by mastering advanced features and workflows.
Learn the essentials of user account creation, modification, and management in Active Directory.
Learn to manage and automate the core directory objects—groups, computers, and contacts.
Gain complete visibility into your AD environment through user, group, computer, and password reports.
Master Group Policy Object (GPO) management to enforce consistent configurations and security settings.
Automate routine administrative tasks through scheduled workflows that enhance efficiency.
Discover how event-triggered workflows transform identity management and orchestration.
Streamline AD change management with structured, role-based workflows and approval processes.
Delegate administrative control securely through OU, group, and site-based scopes.
Ensure directory hygiene by identifying and removing inactive, obsolete, or orphaned accounts.
Strengthen compliance and minimize access risks through certification campaigns.
Master the principles of directory backup and recovery across on-premises AD and Entra ID.
Unify on-premises AD and Entra ID management under a single governance framework.
Monitor changes across users, groups, computers, logons, and policies with structured audit data.
Audit access events, permission changes, and file activity across Windows and storage platforms.
Monitor server logons, replication events, endpoint actions, and user activity patterns.
Audit Windows and macOS workstation activity with clear visibility into system events.
Learn how to generate, interpret, and operationalize compliance reports across major regulatory frameworks.
Identify anomalous activity across logins, movement patterns, and privileged actions.
Audit user, group, role, license, application, and device activities in Entra ID.
Enable users to reset passwords, unlock accounts, and update credentials securely.
Enforce MFA across enterprise apps, endpoints, and access flows securely.
Implement SAML, OAuth, and OIDC-based SSO for unified authentication.
Enforce stronger password standards and meet compliance requirements.
Empower users to securely update their directory profiles with validation rules.
Manage Exchange, Entra ID, SharePoint, and Teams from a unified console.
Gain centralized visibility into Exchange Online and Entra ID activity.
Monitor Exchange Online, Entra ID, and Microsoft 365 activities through alerts.
Delegate Microsoft 365 administrative tasks with controlled, role-based access.
Protect and restore directory data with structured backup and version control.
Back up and restore critical Entra ID and Microsoft 365 data efficiently.
Collect, parse, and manage logs from diverse systems using agent-based and agentless methods.
Audit application and server activity across Windows, Linux/Unix, IIS, and databases.
Monitor logs from routers, switches, firewalls, VPNs, and IDS/IPS systems.
Search logs in real time, identify actionable patterns, and perform forensic investigations.
Detect security threats across Windows systems, vulnerabilities, and privileged actions.
Centralize log collection and management across directories, endpoints, and databases.
Correlate security events in real time and transform raw logs into meaningful security insights.
Detect behavioral anomalies, assess entity risk, and identify threats with analytics-driven insights.
Automate incident handling with structured workflows, playbooks, and ticketing integrations.
Manage cloud-native log ingestion and monitoring through a scalable SIEM framework.
Analyze cloud identity behavior to detect anomalies, risks, and unusual activity.
Detect cloud-based threats, investigate security events, and manage incidents.
Understand the core purpose and functionality of a Cloud Access Security Broker.
Evaluate and strengthen security posture across AWS and Azure environments.
Monitor security events across leading SaaS applications like Salesforce.
Audit file server activity, detect unauthorized file changes, and analyze storage usage.
Identify sensitive data, evaluate exposure risks, and prioritize remediation.
Prevent unauthorized data transfers and protect sensitive information across endpoints.
Structured learning pathways that bring together the capabilities that matter— Identity Governance, ITDR, Compliance and more. Each bundle offers a cohesive, end-to-end progression designed to strengthen real-world expertise.
Master the principles of enterprise identity governance across hybrid environments.
Monitor and govern hybrid IT environments with unified auditing and risk assessment.
Automate and secure every stage of the employee identity journey—from onboarding to offboarding.
Detect and respond to identity-centric threats across hybrid environments.
Protect enterprise identities across hybrid environments by combining strong authentication and adaptive access.
Automate and coordinate identity operations across hybrid environments through unified workflows.
Secure and streamline remote workforce operations through identity automation and adaptive authentication.
Unify and govern identities across on-premises and cloud environments by synchronizing directories.
Build a unified identity ecosystem across hybrid and cloud environments by integrating governance and analytics.
Learn how to automate and refine access governance with conditional access and adaptive policy enforcement.
Monitor and strengthen identity security by unifying analytics, compliance auditing, and continuous risk assessment.
Protect critical identity and data systems by unifying monitoring, automated response, and reliable recovery.
Enhance visibility and security by leveraging behavioral analytics and risk intelligence to uncover threats.
Unify monitoring, analytics, and access controls to build a distributed security architecture that enables scalable operations.
Our badges comply with IMS Global Open Badges 2.0 standards, ensuring they are portable, verifiable, and secure.
Optimized for LinkedIn and digital resumes. One-click sharing adds your credential directly to your profile.
Every badge contains unique metadata and a cryptographic signature to prevent forgery.