Microsoft 365 Security Administration (Exam MS-500) - Advanced

Price
$64.99
Duration
7 Hours, 30 Minutes
Delivery Method
LearnNow On Demand

Students will learn to implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. This course will prepare for the MS-500 exam. Passing the exam will earn you the Microsoft 365 Certified: Security Administrator Associate certification.

 

Purchase This On Demand Title or a LearnNow On Demand subscription

Microsoft 365 Security Administration (Exam MS-500) - Advanced
  Buy Now $64.99 Purchase this course for 12 months.
  Buy Now $99.95 Purchase this course and hundreds of others with our LearnNow On Demand 12-month subscription.

Course Objectives

    Introduction , Managing Microsoft 365 Identity Access , Password and Identity Protection , Identity Synchronization , Access Management , Microsoft 365 Security , Threat Intelligence , Mobile Device Management , Information Protection , Microsoft 365 Encryption , Data Loss Prevention , Cloud Application Security , Archiving and Retention , Data Governance , Conclusion

Agenda

1 - Introduction
  • Introduction
2 - Managing Microsoft 365 Identity Access
  • Understanding Identity Challenges
  • What is Identity Governance Process?
  • Microsoft 365 Authentication Options
  • Creating Cloud Only User Accounts
  • Managing Cloud User Accounts
  • Deleting and Recovering User Accounts
  • Assigning Roles in Microsoft 365
  • Creating and Managing Groups in 365
  • What is Privileged Identity Management?
  • Implementing PIM
  • What is Privileged Access Management in 365?
3 - Password and Identity Protection
  • Managing Microsoft 365 Passwords
  • Implementing Multi-Factor Authentication
  • Planning Self-Service Password Reset
  • What are Password Alternatives?
  • Using Azure AD Access Reviews
  • Overview of Azure Active Directory Security Defaults
  • Overview of Azure Active Directory Identity Protection
  • Using Azure AD Identity Protection
4 - Identity Synchronization
  • SSO Options for Microsoft 365
  • Working with Directory Synchronization
  • Directory Sync Prerequisites
  • Installing and Configuring Azure Ad Connect
  • Azure AD Connect Health
  • Planning Azure AD Connect for Multi-Forest
  • Managing Users with Directory Synchronization
  • Managing Groups with Directory Synchronization
  • Overview of Azure AD Connect Security Groups
  • Understanding Identity Federation
5 - Access Management
  • What is Conditional Access?
  • Overview of Azure AD Application Proxy
  • Setting Up Azure AD Application Proxy
  • Planning for Device Compliance
  • What are Conditional Groups?
  • Creating Conditional Access Policies
  • Managing External Access
  • Creating External Users
6 - Microsoft 365 Security
  • Changing Work Place Threat Landscape
  • Overview of Microsoft Security Strategy
  • Using the Secure Score
  • What is the Anti-Malware Pipeline?
  • Overview of Zero-Hour Auto Purge
  • Spoofing and Phishing Protection
  • Using Microsoft 365 ATP Safe Attachments
  • Using Microsoft 365 ATP Safe Links
  • Overview Of Azure ATP
  • Configuring Azure ATP
  • What is Microsoft Defender ATP?
  • What is Application Guard?
  • Overview of Application Control
  • Microsoft Defender Exploit Protection
7 - Threat Intelligence
  • Using the Security Dashboard
  • What is the Microsoft Graph?
  • Overview of Threat Explorer and Tracker
  • Using the Attack Simulator
  • What is Automated Investigation and Response?
  • Overview of Azure Sentinel
8 - Mobile Device Management
  • Mobile Application Management
  • Using Azure AD For SaaS Access
  • Managing Devices with Mobile Device Management
  • Overview of MDM Policies and Profile
  • Deploying Mobile Device Management
  • Defining Corporate Device Enrollment Policy
  • Enrolling Devices
  • Device Enrollment Manager
9 - Information Protection
  • How to Classify Data
  • Creating Sensitivity Labels
  • Preparing for Azure Information Protection
  • Creating AIP Labels and Policies
  • What is the AIP Super User?
  • Choosing Your AIP Key
  • Overview of AIP Scanner
  • Using RMS Connector
  • Planning for Windows Information Protection
  • Implementing WIP
  • Working with WIP in Windows Desktop
10 - Microsoft 365 Encryption
  • Overview of Microsoft 365 Encryption Options
  • Using Rights Management in Exchange
  • Using Rights Management in SharePoint
  • Comparing IRM vs AIP in SharePoint
  • Overview of Secure Multipurpose Internet Mail Extension
  • Using Office Message Encryption
11 - Data Loss Prevention
  • What is Data Loss Prevention?
  • Creating a DLP Policy
  • Using DLP with File Classification Infrastructure
12 - Cloud Application Security
  • Overview of Cloud App Security
  • Deploying Cloud App Security
  • Controlling Cloud Apps with Policies
  • Working with Discovered Apps
  • Managing Alerts
13 - Archiving and Retention
  • Activating In-Place Archiving in Exchange
  • Using In-Place Records Management in SharePoint
  • Overview of Messaging Records Management
  • Configuring Retention Tags and Policy
  • Using Personal Retention Tags
  • Overview of Compliance Center Retention Policies
  • Creating Retention Policies in the Compliance Center
14 - Data Governance
  • Planning Security and Compliance
  • Overview of Compliance
  • Building an Ethical Wall in Exchange
  • Using Content Search
  • Running Audit Log Search
  • Using Advanced eDiscovery
15 - Conclusion
  • Course Recap