1 - User and Group Security
User Accounts in Microsoft 365Administrator Roles and Security Groups in Microsoft 365Password Management in Microsoft 365Azure AD Identity Protection
2 - Identity Synchronization
Introduction to Identity SynchronizationPlanning for Azure AD ConnectImplementing Azure AD ConnectManaging Synchronized Identities
3 - Federated Identities
Introduction to Federated IdentitiesPlanning an AD FS DeploymentImplementing AD FS
4 - Access Management
Conditional AccessManaging Device AccessRole Based Access Control (RBAC)Solutions for External Access
5 - Security in Microsoft 365
Threat Vectors and Data BreachesSecurity Solutions for Microsoft 365Microsoft Secure Score
6 - Advanced Threat Protection
Exchange Online ProtectionOffice 365 Advanced Threat ProtectionManaging Safe AttachmentsManaging Safe LinksAzure Advanced Threat ProtectionWindows Defender Advanced Threat Protection
7 - Threat Intelligence
Microsoft 365 Threat IntelligenceUsing the Security DashboardConfiguring Advanced Threat Analytics
8 - Mobility
Plan for Mobile Application ManagementPlan for Mobile Device ManagementDeploy Mobile Device ManagementEnroll Devices to Mobile Device Management
9 - Information Protection
Information Rights ManagementSecure Multipurpose Internet Mail ExtensionOffice 365 Message EncryptionAzure Information ProtectionAdvanced Information ProtectionWindows Information Protection
10 - Data Loss Prevention
Data Loss Prevention ExplainedData Loss Prevention PoliciesCustom DLP PoliciesCreating a DLP Policy to Protect DocumentsPolicy Tips
11 - Cloud Application Security
Cloud Application Security ExplainedUsing Cloud Application Security InformationOffice 365 Cloud App Security
12 - Archiving and Retention
Archiving in Microsoft 365Retention in Microsoft 365Retention Policies in the Security and Compliance CenterArchiving and Retention in ExchangeIn-place Records Management in SharePoint
13 - Data Governance in Microsoft 365
Planning Security and Compliance NeedsBuilding Ethical Walls in Exchange OnlineManage Retention in EmailTroubleshooting Data GovernanceAnalytics and Telemetry
14 - Managing Search and Investigations
Searching for Content in the Security and Compliance CenterAudit Log InvestigationsAdvanced eDiscovery
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
This course is for the Microsoft 365 security administrator role. This role collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization.
Learners should start this course already having the following skills:
Basic conceptual understanding of Microsoft Azure.
Experience with Windows 10 devices.
Experience with Office 365.
Basic understanding of authorization and authentication.
Basic understanding of computer networks.
Working knowledge of managing mobile devices.