Syllabus
Microsoft 365 Security Administration Certification Training Course Singapore.
Microsoft 365 Security Administration Course Overview
In an ever-evolving technological business landscape, it is critical for enterprises to be dependent on applications to create and share data for their convenience. However, it is important to introduce the right security protocols and measures in order to maintain that convenience.
One of the commonly used tools in most business environments is the Microsoft software suite, Microsoft 365. The M 365 suite consists of tools that make running a business organized and almost entirely virtual. As a result, Security Administration professionals for the Microsoft 365 are in great demand and play a significant role within their organizations. Check out the dates below to enrol in this Microsoft 365 Security Administration Training today.
Module 1: User and Group Protection
Identity and Access Management Concepts
Zero Trust Security
User Accounts in Microsoft 365
Administrator Roles and Security Groups in Microsoft 365
Password Management in Microsoft 365
Azure AD Identity Protection
Lab : Initialize your trial tenant
Set up your Microsoft 365 tenant
Lab : Configure Privileged Identity Management
Discover and Manage Azure Resources
Assign Directory Roles
Activate and Deactivate PIM Roles
Directory Roles (General)
PIM Resource Workflows
View audit history for Azure AD roles in PIM
Module 2: Identity Synchronization
Introduction to Identity Synchronization
Planning for Azure AD Connect
Implementing Azure AD Connect
Managing Synchronized Identities
Introduction to Federated Identities
Lab : Implement Identity Synchronization
Set up your organization for identity synchronization
Module 3: Access Management
Conditional access
Manage device access
Role Based Access Control (RBAC)
Solutions for external access
Lab : Use Conditional Access to enable MFA
MFA Authentication Pilot (require MFA for specific apps)
MFA Conditional Access (complete an MFA roll out)
Module 4: Security in Microsoft 365
Threat vectors and data breaches
Security strategy and principles
Security solutions in Microsoft 365
Microsoft Secure Score
Lab : Use Microsoft Secure Score
Improve your secure score in the Microsoft 365 Security Center
Module 5: Advanced Threat Protection
Exchange Online Protection
Office 365 Advanced Threat Protection
Manage Safe Attachments
Manage Safe Links
Azure Advanced Threat Protection
Microsoft Defender Advanced Threat Protection
Lab : Manage Microsoft 365 Security Services
Implement ATP Policies
Module 6: Threat Management
Use the Security dashboard
Microsoft 365 threat investigation and response
Azure Sentinel for Microsoft 365
Configuring Advanced Threat Analytics
Lab : Using Attack Simulator
Conduct a simulated Spear phishing attack
Conduct simulated password attacks
Module 7: Mobility
Plan for Mobile Application Management
Plan for Mobile Device Management
Deploy Mobile Device Management
Enroll Devices to Mobile Device Management
Lab : Configure Azure AD for Intune
Enable Device Management
Configure Azure AD for Intune
Create Intune Policies
Module 8: Information Protection
Information Protection Concepts
Azure Information Protection
Advanced Information Protection
Windows Information Protection
Lab : Implement Azure Information Protection and Windows Information Protection
Implement Azure Information Protection
Implement Windows Information Protection
Module 9: Rights Management and Encryption
Information Rights Management
Secure Multipurpose Internet Mail Extension
Office 365 Message Encryption
Lab : Configure Office 365 Message Encryption
Configure Office 365 Message Encryption
Validate Information Rights Management
Module 10: Data Loss Prevention
Data Loss Prevention Explained
Data Loss Prevention Policies
Custom DLP Policies
Creating a DLP Policy to Protect Documents
Policy Tips
Lab : Implement Data Loss Prevention policies
Manage DLP Policies
Test MRM and DLP Policies
Module 11: Cloud Application Security
Cloud App Security Explained
Using Cloud Application Security Information
Module 12: Compliance in Microsoft 365
Plan for compliance requirements
Build ethical walls in Exchange Online
Manage Retention in Email
Troubleshoot Data Governance
Module 13: Archiving and Retention
Archiving in Microsoft 365
Retention in Microsoft 365
Retention policies in the Microsoft 365 Compliance Center
Archiving and Retention in Exchange
In-place Records Management in SharePoint
Lab : Compliance and Retention
Initialize Compliance
Configure retention tags and policies
Module 14: Content Search and Investigation
Content Search
Audit Log Investigations
Advanced eDiscovery
Lab : Manage Search and Investigation
Investigate your Microsoft 365 Data
Conduct a Data Subject Request