MS-500 - Microsoft 365 Security Administration
Course Duration: 36 Hours
Delivery Methods: Classroom Training - Instructor Led or Online
COURSE OVERVIEW
In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.
WHO SHOULD ATTEND?
This course is for the Microsoft 365 security administrator role. This role collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization.
COURSE PREREQUISITES
- There are no prerequisites for this course.
Course Outline
- Identity and Access Management concepts
- The Zero Trust model
- Plan your identity and authentication solution
- User accounts and roles
- Password Management
- Plan directory synchronization
- Configure and manage synchronized identities
- Azure AD Identity Protection
- Application Management
- Identity Governance
- Manage device access
- Role Based Access Control (RBAC)
- Solutions for external access
- Privileged Identity Management
- Threat vectors and data breaches
- Security strategy and principles
- Microsoft security solutions
- Secure Score
- Exchange Online Protection (EOP)
- Microsoft Defender for Office 365
- Manage Safe Links
- Microsoft Defender for Identity
- Microsoft Defender for Endpoint
- Security dashboard
- Threat investigation and response
- Azure Sentinel
- Advanced Threat Analytics
- Deploy Cloud Application Security
- Use cloud application security information
- Mobile Application Management (MAM)
- Mobile Device Management (MDM)
- Deploy mobile device services
- Information protection concepts
- Governance and Records Management
- Sensitivity labels
- Archiving in Microsoft 365
- Retention in Microsoft 365
- Retention policies in the Microsoft 365 Compliance Center
- Archiving and retention in Exchange
- In-place records management in SharePoint
- Information Rights Management (IRM)
- Secure Multipurpose Internet Mail Extension (S-MIME)
- Office 365 Message Encryption
- Data loss prevention fundamentals
- Create a DLP policy
- Customize a DLP policy
- Create a DLP policy to protect documents
- Policy tips
- Compliance portal
- Microsoft Priva Privacy Risk Management
- Microsoft Priva Subject Rights Requests
- Insider Risk
- Privileged Access
- Information barriers
- Building ethical walls in Exchange Online
- Content Search
- Audit Log Investigations
- Advanced eDiscovery
Dates & Times |
---|
* Actual dates may vary.