This course covers three central elements of Microsoft 365 enterprise administration Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.
This course may earn a Credly Badge.
- Price: $2,975.00
- Duration: 1 day
- Delivery Methods: Virtual
Date | Time | Price | Option |
---|---|---|---|
Please contact us at info@toptalentlearning.com or 469-721-6100 for this course schedule. |
Course Outline
1 – Introduction to Microsoft 365 Security Metrics
- Threat Vectors and Data Breaches
- The Zero Trust Model
- Security Solutions in Microsoft 365
- Introduction to Microsoft Secure Score
- Privileged Identity Management
- Introduction to Azure Active Directory Identity Protection
2 – Managing Your Microsoft 365 Security Services
- Introduction to Exchange Online Protection
- Introduction to Advanced Threat Protection
- Managing Safe Attachments
- Managing Safe Links
- Monitoring and Reports
3 – Microsoft 365 Threat Intelligence
- Overview of Microsoft 365 Threat Intelligence
- Using the Security Dashboard
- Configuring Advanced Threat Analytics
- Implementing Your Cloud Application Security
4 – Introduction to Data Governance in Microsoft 365
- Introduction to Archiving in Microsoft 365
- Introduction to Retention in Microsoft 365
- Introduction to Information Rights Management
- Introduction to Secure Multipurpose Internet Mail Extension
- Introduction to Office 365 Message Encryption
- Introduction to Data Loss Prevention
5 – Archiving and Retention in Microsoft 365
- In-Place Records Management in SharePoint
- Archiving and Retention in Exchange
- Retention Policies in the SCC
6 – Implementing Data Governance in Microsoft 365 Intelligence
- Evaluating Your Compliance Readiness
- Implementing Compliance Center Solutions
- Building Ethical Walls in Exchange Online
- Creating a Simple DLP Policy from a Built-in Template
- Creating a Custom DLP Policy
- Creating a DLP Policy to Protect Documents
- Working with Policy Tips
7 – Managing Data Governance in Microsoft 365
- Managing Retention in Email
- Troubleshooting Data Governance
- Implementing Azure Information Protection
- Implementing Advanced Features of AIP
- Implementing Windows Information Protection
8 – Managing Search and Investigations
- Searching for Content in the Security and Compliance Center
- Auditing Log Investigations
- Managing Advanced eDiscovery
9 – Planning for Device Management
- Introduction to Co-management
- Preparing Your Windows 10 Devices for Co-management
- Transitioning from Configuration Manager to Intune
- Introduction to Microsoft Store for Business
- Planning for Mobile Application Management
10 – Planning Your Windows 10 Deployment Strategy
- Windows 10 Deployment Scenarios
- Implementing and Managing Windows Autopilot
- Planning Your Windows 10 Subscription Activation Strategy
- Resolving Windows 10 Upgrade Errors
- Introduction to Windows Analytics
11 – Implementing Mobile Device Management
- Planning Mobile Device Management
- Deploying Mobile Device Management
- Enrolling Devices to MDM
- Managing Device Compliance
Learning Objectives
Microsoft 365 Security Metrics
- Microsoft 365 Security Services
- Microsoft 365 Threat Intelligence
- Data Governance in Microsoft 365
- Archiving and Retention in Office 365
- Data Governance in Microsoft 365 Intelligence
- Search and Investigations
- Device Management
- Windows 10 Deployment Strategies
- Mobile Device Management
No special instructions regarding this course’s target audience provided. Please contact us to discuss if you are unsure whether this course is for you!
No special prerequisites for this course provided. If you are unsure whether you might need to take another course first, please contact us to discuss.