Advanced search

MS-101 Microsoft 365 Mobility and Security Print

Learn about Microsoft 365 Security, Compliance and Device Management, including how to manage your security metrics, how to enable Azure AD Identity Protection, how to configure your Microsoft 365 security services, and user Microsoft 365 Threat Intelligence, implementing data retention and data loss prevention solutions in Microsoft 365, archiving and retention in Microsoft 365, implementing and managing data governance, and managing search and investigations, establishing Microsoft Intune, enrolling devices to Intune, monitoring the devices, and controlling what users can do from the enrolled devices by using conditional access policies.

Accredited course for Continuing Education of Pedagogical Staff

Course length: 5 days (8:30 - 16:00)

Dates

Date PlaceLanguagePrice (without VAT)Availability
11/29/2021 - 12/03/2021 Prague cs 35 600 CZK Free date
PDF to download Expand allCollapse all
  • Students will be able to

    • Microsoft 365 Security Metrics
    • Microsoft 365 Security Services
    • Microsoft 365 Threat Intelligence
    • Data Governance in Microsoft 365
    • Archiving and Retention in Office 365
    • Data Governance in Microsoft 365 Intelligence
    • Search and Investigations
    • Device Management
    • Windows 10 Deployment Strategies
    • Mobile Device Management

     

  • Course requirements

    • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
    • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
    • A proficient understanding of general IT practices.
  • This course is intended for

    This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.

  • Literature

    All participants will get original Microsoft student materials.

  • Hardware

    Classrooms are equipped with high-performance computers with Internet access and the possibility of wireless connection.

  • Syllabus

    Module 1: Introduction to Microsoft 365 Security Metrics

    • Threat Vectors and Data Breaches
    • The Zero Trust Model
    • Security Solutions in Microsoft 365
    • Introduction to Microsoft Secure Score
    • Privileged Identity Management
    • Introduction to Azure Active Directory Identity Protection

    Module 2: Managing Your Microsoft 365 Security Services

    • Introduction to Exchange Online Protection
    • Introduction to Advanced Threat Protection
    • Managing Safe Attachments
    • Managing Safe Links
    • Monitoring and Reports

    Module 3: Microsoft 365 Threat Intelligence

    • Overview of Microsoft 365 Threat Intelligence
    • Using the Security Dashboard
    • Configuring Advanced Threat Analytics
    • Implementing Your Cloud Application Security

    Module 4: Introduction to Data Governance in Microsoft 365

    • Introduction to Archiving in Microsoft 365
    • Introduction to Retention in Microsoft 365
    • Introduction to Information Rights Management
    • Introduction to Secure Multipurpose Internet Mail Extension
    • Introduction to Office 365 Message Encryption
    • Introduction to Data Loss Prevention

    Module 5: Archiving and Retention in Microsoft 365

    • In-Place Records Management in SharePoint
    • Archiving and Retention in Exchange
    • Retention Policies in the SCC

    Module 6: Implementing Data Governance in Microsoft 365 Intelligence

    • Evaluating Your Compliance Readiness
    • Implementing Compliance Center Solutions
    • Building Ethical Walls in Exchange Online
    • Creating a Simple DLP Policy from a Built-in Template
    • Creating a Custom DLP Policy
    • Creating a DLP Policy to Protect Documents
    • Working with Policy Tips

    Module 7: Managing Data Governance in Microsoft 365

    • Managing Retention in Email
    • Troubleshooting Data Governance
    • Implementing Azure Information Protection
    • Implementing Advanced Features of AIP
    • Implementing Windows Information Protection

    Module 8: Managing Search and Investigations

    • Searching for Content in the Security and Compliance Center
    • Auditing Log Investigations
    • Managing Advanced eDiscovery

    Module 9: Planning for Device Management

    • Introduction to Co-management
    • Preparing Your Windows 10 Devices for Co-management
    • Transitioning from Configuration Manager to Intune
    • Introduction to Microsoft Store for Business
    • Planning for Mobile Application Management

    Module 10: Planning Your Windows 10 Deployment Strategy

    • Windows 10 Deployment Scenarios
    • Implementing and Managing Windows Autopilot
    • Planning Your Windows 10 Subscription Activation Strategy
    • Resolving Windows 10 Upgrade Errors
    • Introduction to Windows Analytics

    Module 11: Implementing Mobile Device Management

    • Planning Mobile Device Management
    • Deploying Mobile Device Management
    • Enrolling Devices to MDM
    • Managing Device Compliance
OKsystem a.s.
We use cookies to optimize site functionality and deliver best results based on your interests. More info