https://store-images.s-microsoft.com/image/apps.55195.816ba778-decc-431a-9140-9b4ab7b197e6.b7e1fc78-243c-477d-b160-d051f23f99d0.f3f7f95b-a95e-46d0-9b62-7f4e9b29c281

Microsoft 365 Security Administration: 4 Days Workshop

NETCOM LEARNING

This course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection.

In MS-500T00: Microsoft 365 (M365) Security Administration course you will learn how to secure user access to your organization's resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365.

Target Audience

• The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization.
• This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance.

Prerequisites

Required

• Basic conceptual understanding of Microsoft Azure
• Experience with Windows 10 devices & Office 365
• Basic understanding of authorization and authentication
• Basic understanding of computer networks
• Working knowledge of managing mobile devices

Agenda

Day 1

• User and Group Management

1. Identity and Access Management concepts
2. The Zero Trust model
3. Plan your identity and authentication solution
4. User accounts and roles
5. Password Management
6. Lab : Initialize your tenant - users and groups
7. Lab : Password management

• Identity Synchronization and Protection

1. Plan directory synchronization
2. Configure and manage synchronized identities
3. Azure AD Identity Protection
4. Lab : Implement Identity Synchronization

• Identity and Access Management

1. Application Management
2. Identity Governance
3. Manage device access
4. Role Based Access Control (RBAC)
5. Solutions for external access
6. Privileged Identity Management
7. Lab : Use Conditional Access to enable MFA
8. Lab : Configure Privileged Identity Management

Day 2:

• Security in Microsoft 365

1. Threat vectors and data breaches
2. Security strategy and principles
3. Microsoft security solutions
4. Secure Score
5. Lab : Use Microsoft Secure Score

• Threat Protection

1. Exchange Online Protection (EOP)
2. Office 365 Advanced Threat Protection
3. Manage Safe Attachments
4. Manage Safe Links
5. Azure Advanced Threat Protection
6. Microsoft Defender Advanced Threat Protection
7. Lab : Manage Microsoft 365 Security Services

• Threat Management

1. Security dashboard
2. Threat investigation and response
3. Azure Sentinel
4. Advanced Threat Analytics
5. Lab : Using Attack Simulator

Day 3:

• Microsoft Cloud Application Security

1. Deploy Cloud Application Security
2. Use cloud application security information

• Mobility

1. Mobile Application Management (MAM)
2. Mobile Device Management (MDM)
3. Deploy mobile device services
4. Enroll devices to Mobile Device Management
5. Lab : Device Management

• Information Protection and Governance

1. Information protection concepts
2. Governance and Records Management
3. Sensitivity labels
4. Archiving in Microsoft 365
5. Retention in Microsoft 365
6. Retention policies in the Microsoft 365 Compliance Center
7. Archiving and retention in Exchange
8. In-place records management in SharePoint
9. Lab : Archiving and Retention

Day 4:

Rights Management and Encryption

1. Information Rights Management (IRM)
2. Secure Multipurpose Internet Mail Extension (S-MIME)
3. Office 365 Message Encryption
4. Lab : Configure Office 365 Message Encryption

• Data Loss Prevention

1. Data loss prevention fundamentals
2. Create a DLP policy
3. Customize a DLP policy
4. Create a DLP policy to protect documents
5. Policy tips
6. Lab : Implement Data Loss Prevention policies

• Compliance Management

1. Compliance center

• Insider Risk Management

1. Insider Risk
2. Privileged Access
3. Information barriers
4. Building ethical walls in Exchange Online
5. Lab : Privileged Access Management

• Discover and Respond

1. Content Search
2. Audit Log Investigations
3. Advanced eDiscovery
4. Lab : Manage Search and Investigation

Sekilas pandang

https://store-images.s-microsoft.com/image/apps.13086.816ba778-decc-431a-9140-9b4ab7b197e6.b7e1fc78-243c-477d-b160-d051f23f99d0.aeaa2a68-53bd-4369-a32a-bf3fd51ea87e
/staticstorage/6d4e0803/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.4846.816ba778-decc-431a-9140-9b4ab7b197e6.b7e1fc78-243c-477d-b160-d051f23f99d0.1d94499f-9617-4695-beca-4319795f8607