Course duration
- 4 days
Course Benefits
- Learn to administer user and group access in Microsoft 365.
- Learn to explain and manage Azure Identity Protection.
- Learn to plan and implement Azure AD Connect.
- Learn to manage synchronized user identities.
- Learn to explain and use conditional access.
- Learn to describe cyber-attack threat vectors.
- Learn to explain security solutions for Microsoft 365.
- Learn to use Microsoft Secure Score to evaluate and improve your security posture.
- Learn to configure various advanced threat protection services for Microsoft 365.
- Learn to plan for and deploy secure mobile devices.
- Learn to implement information rights management.
- Learn to secure messages in Office 365.
- Learn to configure Data Loss Prevention policies.
- Learn to deploy and manage Cloud App Security.
- Learn to implement Windows information protection for devices.
- Learn to plan and deploy a data archiving and retention system.
- Learn to create and manage an eDiscovery investigation.
- Learn to manage GDPR data subject requests.
- Learn to explain and use sensitivity labels.
Webucator is a Microsoft Certified Partner for Learning Solutions (CPLS). This class uses official Microsoft courseware and will be delivered by a Microsoft Certified Trainer (MCT).
Course Outline
- User and Group Management
- Identity and Access Management concepts
- The Zero Trust model
- Plan your identity and authentication solution
- User accounts and roles
- Password Management
- Lab: Initialize your tenant - users and groups
- Set up your Microsoft 365 tenant
- Manage users and groups
- Lab: Password management
- Configure Self-service password reset (SSPR) for user accounts in Azure AD
- Deploy Azure AD Smart Lockout
- Identity Synchronization and Protection
- Plan directory synchronization
- Configure and manage synchronized identities
- Azure AD Identity Protection
- Lab: Implement Identity Synchronization
- Set up your organization for identity synchronization
- Identity and Access Management
- Application Management
- Identity Governance
- Manage device access
- Role Based Access Control (RBAC)
- Solutions for external access
- Privileged Identity Management
- Lab: Use Conditional Access to enable MFA
- MFA Authentication Pilot (require MFA for specific apps)
- MFA Conditional Access (complete an MFA roll out)
- Lab: Configure Privileged Identity Management
- Manage Azure resources
- Assign directory roles
- Activate and deactivate PIM roles
- Directory roles
- PIM resource workflows
- View audit history for Azure AD roles in PIM
- Security in Microsoft 365
- Threat vectors and data breaches
- Security strategy and principles
- Microsoft security solutions
- Secure Score
- Lab: Use Microsoft Secure Score
- Improve your secure score in the Microsoft 365 Security Center
- Threat Protection
- Exchange Online Protection (EOP)
- Microsoft Defender for Office 365
- Manage Safe Attachments
- Manage Safe Links
- Microsoft Defender for Identity
- Microsoft Defender for Endpoint
- Lab: Manage Microsoft 365 Security Services
- Implement Microsoft Defender Policies
- Threat Management
- Security dashboard
- Threat investigation and response
- Azure Sentinel
- Advanced Threat Analytics
- Lab: Using Attack Simulator
- Conduct a simulated Spear phishing attack
- Conduct simulated password attacks
- Microsoft Cloud Application Security
- Deploy Cloud Application Security
- Use cloud application security information
- Mobility
- Mobile Application Management (MAM)
- Mobile Device Management (MDM)
- Deploy mobile device services
- Enroll devices to Mobile Device Management
- Lab: Device Management
- Enable Device Management
- Configure Azure AD for Intune
- Create compliance and conditional access policies
- Information Protection and Governance
- Information protection concepts
- Governance and Records Management
- Sensitivity labels
- Archiving in Microsoft 365
- Retention in Microsoft 365
- Retention policies in the Microsoft 365 Compliance Center
- Archiving and retention in Exchange
- In-place records management in SharePoint
- Lab: Archiving and Retention
- Initialize compliance
- Configure retention tags and policies
- Rights Management and Encryption
- Information Rights Management (IRM)
- Secure Multipurpose Internet Mail Extension (S-MIME)
- Office 365 Message Encryption
- Lab: Configure Office 365 Message Encryption
- Configure Office 365 Message Encryption
- Validate Information Rights Management
- Data Loss Prevention
- Data loss prevention fundamentals
- Create a DLP policy
- Customize a DLP policy
- Create a DLP policy to protect documents
- Policy tips
- Lab: Implement Data Loss Prevention policies
- Manage DLP Policies
- Test MRM and DLP Policies
- Compliance Management
- Compliance center
- Insider Risk Management
- Insider Risk
- Privileged Access
- Information barriers
- Building ethical walls in Exchange Online
- Lab: Privileged Access Management
- Set up privileged access management and process a request
- Discover and Respond
- Content Search
- Audit Log Investigations
- Advanced eDiscovery
- Lab: Manage Search and Investigation
- Investigate your Microsoft 365 Data
- Conduct a Data Subject Request
Class Materials
Each student will receive a comprehensive set of materials, including course notes and all the class examples.
Experience in the following is required for this Microsoft 365 Administration class:
- Basic conceptual understanding of Microsoft Azure.
- Experience with Windows 10 devices.
- Experience with Office 365.
- Basic understanding of authorization and authentication.
- Basic understanding of computer networks.
- Working knowledge of managing mobile devices.
Instructor-led courses are offered via a live Web connection, at client sites throughout Europe, and at our Geneva Training Center.