MS-500: MICROSOFT 365 SECURITY ADMINISTRATION Training in Sterling Heights
We offer private customized training for groups of 3 or more attendees.
|
||
Course Description |
||
In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.
Preparation for exam: MS-500
Course Length: 4 Days
Course Tuition: $2235 (US) |
Prerequisites |
|
Basic conceptual understanding of Microsoft Azure. Experience with Windows 10 devices. Experience with Office 365. Basic understanding of authorization and authentication. Basic understanding of computer networks. Working knowledge of managing mobile devices. |
Course Outline |
Module 1: User and Group ManagementThis module explains how to manage user accounts and groups in Microsoft 365. It introduces you to the Zero Trust concept as well as authentication. The module sets the foundation for the remainder of the course. Lessons
Lab : Initialize your tenant – users and groups
Lab : Password management
After completing this module, students will be able to:
Module 2: Identity Synchronization and ProtectionThis module explains concepts related to synchronizing identities for Microsoft 365. Specifically, it focuses on Azure AD Connect and managing directory synchronization to ensure the right people are connecting to your Microsoft 365 system. Lessons
Lab : Implement Identity Synchronization
After completing this module, students will be able to:
Module 3: Identity and Access ManagementThis module explains conditional access for Microsoft 365 and how it can be used to control access to resources in your organization. The module also explains Role Based Access Control (RBAC) and solutions for external access. We discuss identity governance as a concept and its components. Lessons
Lab : Use Conditional Access to enable MFA
Lab : Configure Privileged Identity Management
After completing this module, students will be able to:
Module 4: Security in Microsoft 365This module explains the various cyber-attack threats that exist. It then introduces you to the Microsoft solutions used to mitigate those threats. The module finishes with an explanation of Microsoft Secure Score and how it can be used to evaluate and report your organizations security posture. Lessons
Lab : Use Microsoft Secure Score
After completing this module, students will be able to:
Module 5: Threat ProtectionThis module explains the various threat protection technologies and services available for Microsoft 365. The module covers message protection through Exchange Online Protection, Microsoft Defender for Identity and Microsoft Defender for Endpoint. Lessons
Lab : Manage Microsoft 365 Security Services
After completing this module, students will be able to:
Module 6: Threat ManagementThis module explains Microsoft Threat Management which provides you with the tools to evaluate and address cyber threats and formulate responses. You will learn how to use the Security dashboard and Azure Sentinel for Microsoft 365. Lessons
Lab : Using Attack Simulator
After completing this module, students will be able to:
Module 7: Microsoft Cloud Application SecurityThis module focuses on cloud application security in Microsoft 365. The module will explain cloud discovery, app connectors, policies, and alerts. You will learn how these features work to secure you cloud applications. Lessons
After completing this module, students will be able to:
Module 8: MobilityThis module focuses on securing mobile devices and applications. You will learn about Mobile Device Management and how it works with Microsoft Intune. You will also learn about how Intune and Azure AD can be used to secure mobile applications. Lessons
Lab : Device Management
After completing this module, students will be able to:
Module 9: Information Protection and GovernanceThis module focuses on data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications to protect your data. Lessons
Lab : Archiving and Retention
After completing this module, students will be able to:
Module 10: Rights Management and EncryptionThis module explains information rights management in Exchange and SharePoint. The module also describes encryption technologies used to secure messages. Lessons
Lab : Configure Office 365 Message Encryption
After completing this module, students will be able to:
Module 11: Data Loss PreventionThis module focuses on data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications to protect your data. Lessons
Lab : Implement Data Loss Prevention policies
After completing this module, students will be able to:
Module 12: Compliance ManagementThis module explains the Compliance center in Microsoft 365. It discusses the components of compliance score. Lessons
After completing this module, students will be able to:
Module 13: Insider Risk ManagementThis module focuses on insider risk related functionality within Microsoft 365. It covers not only Insider Risk Management in the compliance center but also information barriers and privileged access management as well. Lessons
Lab : Privileged Access Management
After completing this module, students will be able to:
Module 14: Discover and RespondThis module focuses on content search and investigations. The module covers how to use eDiscovery to conduct advanced investigations of Microsoft 365 data. It also covers audit logs and discusses GDPR data subject requests. Lessons
Lab : Manage Search and Investigation
|
Course Directory [training on all levels]
- .NET Classes
- Agile/Scrum Classes
- Ajax Classes
- Android and iPhone Programming Classes
- Blaze Advisor Classes
- C Programming Classes
- C# Programming Classes
- C++ Programming Classes
- Cisco Classes
- Cloud Classes
- CompTIA Classes
- Crystal Reports Classes
- Design Patterns Classes
- DevOps Classes
- Foundations of Web Design & Web Authoring Classes
- Git, Jira, Wicket, Gradle, Tableau Classes
- IBM Classes
- Java Programming Classes
- JBoss Administration Classes
- JUnit, TDD, CPTC, Web Penetration Classes
- Linux Unix Classes
- Machine Learning Classes
- Microsoft Classes
- Microsoft Development Classes
- Microsoft SQL Server Classes
- Microsoft Team Foundation Server Classes
- Microsoft Windows Server Classes
- Oracle, MySQL, Cassandra, Hadoop Database Classes
- Perl Programming Classes
- Python Programming Classes
- Ruby Programming Classes
- Security Classes
- SharePoint Classes
- SOA Classes
- Tcl, Awk, Bash, Shell Classes
- UML Classes
- VMWare Classes
- Web Development Classes
- Web Services Classes
- Weblogic Administration Classes
- XML Classes