Which of our industry-leading Microsoft Identity Manager (MIM) training courses is right for you?
If you’re implementing Microsoft Identity Manager (MIM), or your organization already uses it, you’ll benefit from our MIM Foundation, MIM Advanced and MIM Expert training. Here, you can find out which topics each course covers and which level you should start with.
Just like both the MIM Foundation and MIM Advanced courses, the MIM Expert course was great – by far one of the best courses I have ever attended! The course materials, the instructor’s presentations and the labs are of great quality. I really enjoyed it. Hanne N, System Engineer, Norway
Hundreds of students have attended our instructor-led MIM 2016 training courses in the classroom or via Skype since 2016 – and over 90% said they would recommend the course to colleagues.
But which MIM training course is the best for you? The table below compares course content at each level.
|MIM Foundation||MIM Advanced||MIM Expert|
|Ways to learn||Classroom, Skype, Online||Classroom, Skype, Online||Classroom, Skype|
|What do students say?||Student feedback||Student feedback||Student feedback|
|MIM Fundamentals||In detail||Revision||–|
|Synchronization service||Understanding the connector space and metaverse, configuring classic rules, run profiles connecting to systems like HR and AD; synchronizing user and group data||In depth examination of synchronization, including holograms; monitoring and troubleshooting; comparing classic and portal rules; schema extension; connecting to others systems (including file-based)||Some further consideration of the options available, and best practices; an overview of Azure AD Connect (a special version of the sync engine used to connect AD and Azure AD)|
|Portal and service||The MIM service management agent; sets, simple workflows and policies; portal-based synchronization rules; managing users (including self-service); managing AD groups; troubleshooting||Portal configuration, schema extension, search scopes, usage keywords, localization; more advanced rules||Identifying limitations and workarounds; best practices; naming conventions; editing RCDCs; portal security|
|Workflows||A few simple out-of-the box workflows (e.g. SSPR and sync rules)||Adding new workflows (e.g. generating attributes, generating a unique attribute)||*Developing a workflow|
|Configuring self-service password reset, and password sync using the Password Change Notification Service (PCNS)||–||*Brief coverage of password extensions|
|Rules extensions||Using an existing rules|
|Basic coverage of extensions (using Visual Basic); developing simple|
|*In-depth coverage, with more complex examples based on our real world experience; best practices; useful techniques such as multiple metaverse extensions and data validation; debugging|
|Migration and roll-out||Basic migrating of synchronization service configuration||Basic migration of service/portal configuration||Detailed understanding and use of third party portal migration tool|
|Reporting||–||Out-of-the-box reporting, an introduction to a third party reporting tool, and an unofficial reporting technique||Extending out-of-the-|
box reporting (schema extensions and simple custom reports)
|Other||Backup, restore and disaster recovery; overview of RBAC (using BHOLD) and Privileged Access Management, WMI for basic operations||Some advanced synchronization techniques, such as handling multiple connectors, and automated group generation; detailed coverage of installation, configuration and alternative architectures||*ECMA2 (customer connectors) coverage of theory and some representative examples|
*Topics are more geared towards the developer (though we find that most non-developers take them in their stride)