Microsoft 365 Security Administration Certification Training Course Singapore.

Microsoft 365 Security Administration Course Overview

In an ever-evolving technological business landscape, it is critical for enterprises to be dependent on applications to create and share data for their convenience. However, it is important to introduce the right security protocols and measures in order to maintain that convenience.

One of the commonly used tools in most business environments is the Microsoft software suite, Microsoft 365. The M 365 suite consists of tools that make running a business organized and almost entirely virtual. As a result, Security Administration professionals for the Microsoft 365 are in great demand and play a significant role within their organizations. Check out the dates below to enrol in this Microsoft 365 Security Administration Training today.

Module 1: User and Group Protection

  • Identity and Access Management Concepts
  • Zero Trust Security
  • User Accounts in Microsoft 365
  • Administrator Roles and Security Groups in Microsoft 365
  • Password Management in Microsoft 365
  • Azure AD Identity Protection
  • Lab : Initialize your trial tenant
  • Set up your Microsoft 365 tenant
  • Lab : Configure Privileged Identity Management
  • Discover and Manage Azure Resources
  • Assign Directory Roles
  • Activate and Deactivate PIM Roles
  • Directory Roles (General)
  • PIM Resource Workflows
  • View audit history for Azure AD roles in PIM

Module 2: Identity Synchronization

  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities
  • Introduction to Federated Identities
  • Lab : Implement Identity Synchronization
  • Set up your organization for identity synchronization

Module 3: Access Management

  • Conditional access
  • Manage device access
  • Role Based Access Control (RBAC)
  • Solutions for external access
  • Lab : Use Conditional Access to enable MFA
  • MFA Authentication Pilot (require MFA for specific apps)
  • MFA Conditional Access (complete an MFA roll out)

Module 4: Security in Microsoft 365

  • Threat vectors and data breaches
  • Security strategy and principles
  • Security solutions in Microsoft 365
  • Microsoft Secure Score
  • Lab : Use Microsoft Secure Score
  • Improve your secure score in the Microsoft 365 Security Center

Module 5: Advanced Threat Protection

  • Exchange Online Protection
  • Office 365 Advanced Threat Protection
  • Manage Safe Attachments
  • Manage Safe Links
  • Azure Advanced Threat Protection
  • Microsoft Defender Advanced Threat Protection
  • Lab : Manage Microsoft 365 Security Services
  • Implement ATP Policies

Module 6: Threat Management

  • Use the Security dashboard
  • Microsoft 365 threat investigation and response
  • Azure Sentinel for Microsoft 365
  • Configuring Advanced Threat Analytics
  • Lab : Using Attack Simulator
  • Conduct a simulated Spear phishing attack
  • Conduct simulated password attacks

Module 7: Mobility

  • Plan for Mobile Application Management
  • Plan for Mobile Device Management
  • Deploy Mobile Device Management
  • Enroll Devices to Mobile Device Management
  • Lab : Configure Azure AD for Intune
  • Enable Device Management
  • Configure Azure AD for Intune
  • Create Intune Policies

Module 8: Information Protection

  • Information Protection Concepts
  • Azure Information Protection
  • Advanced Information Protection
  • Windows Information Protection
  • Lab : Implement Azure Information Protection and Windows Information Protection
  • Implement Azure Information Protection
  • Implement Windows Information Protection

Module 9: Rights Management and Encryption

  • Information Rights Management
  • Secure Multipurpose Internet Mail Extension
  • Office 365 Message Encryption
  • Lab : Configure Office 365 Message Encryption
  • Configure Office 365 Message Encryption
  • Validate Information Rights Management

Module 10: Data Loss Prevention

  • Data Loss Prevention Explained
  • Data Loss Prevention Policies
  • Custom DLP Policies
  • Creating a DLP Policy to Protect Documents
  • Policy Tips
  • Lab : Implement Data Loss Prevention policies
  • Manage DLP Policies
  • Test MRM and DLP Policies

Module 11: Cloud Application Security

  • Cloud App Security Explained
  • Using Cloud Application Security Information

Module 12: Compliance in Microsoft 365

  • Plan for compliance requirements
  • Build ethical walls in Exchange Online
  • Manage Retention in Email
  • Troubleshoot Data Governance

Module 13: Archiving and Retention

  • Archiving in Microsoft 365
  • Retention in Microsoft 365
  • Retention policies in the Microsoft 365 Compliance Center
  • Archiving and Retention in Exchange
  • In-place Records Management in SharePoint
  • Lab : Compliance and Retention
  • Initialize Compliance
  • Configure retention tags and policies

Module 14: Content Search and Investigation

  • Content Search
  • Audit Log Investigations
  • Advanced eDiscovery
  • Lab : Manage Search and Investigation
  • Investigate your Microsoft 365 Data
  • Conduct a Data Subject Request

 

Leave a Reply

Your email address will not be published. Required fields are marked *