ADSelfService Plus Starter Kit
Jumpstart your journey with the ADSelfService Plus Starter Kit—expert guidance and resources, all for free.
Learning paths bring structure, clarity, and purpose to your growth. Each path is a curated sequence of courses designed to help you build deep, role-ready skills across IAM and SIEM, from foundational concepts to advanced best practices.
Whether you're aiming for skill badges, achievements, or full certifications, our guided paths give you a clear route to mastery. And when you're done, showcase your progress on LinkedIn, Credly, and across your professional network.
Master the full power of your ManageEngine solutions. These starter kits guide you from initial setup to best practices.
Jumpstart your journey with the ADSelfService Plus Starter Kit—expert guidance and resources, all for free.
Jumpstart your journey with the ADManager Plus Starter Kit—expert guidance and resources, all for free.
Jumpstart your journey with the ADAudit Starter Kit—expert guidance and resources, all for free.
Jumpstart your journey with the M365 Manager Plus Starter Kit—expert guidance and resources.
Expand your professional toolkit with high-demand IAM and SIEM skills. Build focused expertise in areas like automation, analytics, threat detection, and identity governance.
Learn the essentials of user account creation, modification, and bulk management using ADManager Plus.
Automate the management of core directory objects—groups, computers, and contacts.
Gain complete visibility into your AD environment through user, group, computer, password, and NTFS reports.
Master Group Policy Object (GPO) management to enforce consistent configurations and security settings.
Automate routine administrative tasks through scheduled workflows that enhance efficiency and consistency.
Discover how event-triggered workflows transform identity management. Build orchestration and webhook-based automations.
Streamline AD change management with structured, role-based workflows. Configure request, review, and approval processes.
Delegate administrative control securely through OU, group, and site-based scopes. Learn to define roles and manage technicians.
Ensure directory hygiene by identifying and removing inactive, obsolete, or orphaned accounts. Learn automated cleanup techniques.
Strengthen compliance and minimize access risks through certification campaigns, identity risk assessments, and privileged entity oversight.
Master the principles of directory backup and recovery across on-premises AD and Entra ID. Learn to protect identity data.
Unify on-premises AD and Entra ID management under a single governance framework. Automate provisioning and policy enforcement.
Monitor changes across users, groups, computers, and policies with structured audit data.
Audit access events, permission changes, and file activity across Windows and storage.
Monitor server logons, replication events, endpoint actions, and user activity patterns.
Audit Windows and macOS workstation activity with clear visibility into system events.
Learn how to generate, interpret, and operationalize compliance reports across major frameworks.
Identify anomalous activity across logins, movement patterns, and privileged actions.
Audit user, group, role, license, application, and device activities in Entra ID.
Enable users to reset passwords, unlock accounts, and update credentials securely.
Enforce MFA across enterprise apps, endpoints, and access flows.
Implement SAML, OAuth, and OIDC-based SSO for unified authentication.
Enforce stronger password standards and meet compliance requirements.
Empower users to securely update their directory profiles while maintaining governance.
Manage Exchange Online, Entra ID, SharePoint, and Teams from a unified console.
Gain centralized visibility into Exchange Online and Entra ID activity.
Monitor Exchange Online, Entra ID, and Microsoft 365 activities through alerts.
Delegate Microsoft 365 administrative tasks with controlled, role-based access.
Collect, parse, and manage logs from diverse systems using agent-based methods.
Audit application and server activity across Windows, Linux/Unix, and IIS.
Monitor logs from routers, switches, firewalls, VPNs, and IDS/IPS systems.
Search logs in real time, identify actionable patterns, and perform forensic investigations.
Detect security threats across Windows systems, vulnerabilities, file changes, and privileged actions.
Centralize log collection and management across directories, endpoints, and databases.
Correlate security events in real time and transform raw logs into meaningful insights.
Detect behavioral anomalies, assess entity risk, and identify threats with analytics.
Automate incident handling with structured workflows, playbooks, and ticketing.
Manage cloud-native log ingestion and monitoring through a scalable SIEM framework.
Analyze cloud identity behavior to detect anomalies, risks, and unusual activity.
Detect cloud-based threats, investigate security events, and manage incidents.
Understand the core purpose and functionality of a Cloud Access Security Broker (CASB).
Evaluate and strengthen security posture across AWS and Azure environments.
Monitor security events across leading SaaS applications to maintain visibility and control.
Audit file server activity, detect unauthorized file changes, and analyze storage usage.
Identify sensitive data, evaluate exposure risks, and prioritize remediation.
Prevent unauthorized data transfers and protect sensitive information across endpoints.
Structured learning pathways that bring together the capabilities that matter—Identity Governance, ITDR, Compliance and more. Each bundle offers a cohesive, end-to-end progression designed to strengthen real-world expertise.
Master the principles of enterprise identity governance across hybrid environments.
Automate and secure every stage of the employee identity journey.
Protect enterprise identities across hybrid environments by combining strong authentication.
Automate and coordinate identity operations across hybrid environments.
Secure and streamline remote workforce operations through identity automation.
Unify and govern identities across on-premises and cloud environments.
Build a unified identity ecosystem across hybrid and cloud environments.
Learn how to automate and refine access governance.
Monitor and govern hybrid IT environments with unified auditing and risk assessment.
Detect and respond to identity-centric threats across hybrid environments.
Monitor and strengthen identity security by unifying analytics, compliance auditing.
Protect critical identity and data systems by unifying monitoring, automated response.
Enhance visibility and security by leveraging behavioral analytics and risk intelligence.
Unify monitoring, analytics, and access controls to build a distributed security architecture.