category
Information Security Administrator
Type
Virtual
Classroom ILT
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Introduction
The Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services. The course covers essential topics such as information protection, data loss prevention (DLP), retention, and insider risk management. You learn how to protect data within Microsoft 365 collaboration environments from internal and external threats. Additionally, you learn how to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. You also learn how to protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.
Audience Profile
As an Information Security Administrator, you plan and implement information security for sensitive data using Microsoft Purview and related services. You’re responsible for mitigating risks by protecting data within Microsoft 365 collaboration environments from internal and external threats, as well as safeguarding data used by AI services. Your role involves implementing information protection, data loss prevention (DLP), retention, and insider risk management. You also manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. In this role, you collaborate with other roles responsible for governance, data, and security to develop policies that address your organization’s security and risk reduction goals. You work with workload administrators, business application owners, and governance stakeholders to implement technology solutions that support these policies and controls.
Pre-requisites:
Before attending this course, delegates must be familiar with:
- Microsoft 365 services and security-related tools
- PowerShell for administrative automation
- Microsoft Entra (formerly Azure Active Directory) for identity management
- Microsoft Defender portal for security monitoring
- Microsoft Defender for Cloud Apps for cloud security governance
Course objectives
After completing this course, students will be able to:
- Implement information protection: Safeguard sensitive data using Microsoft Purview and related services
- Deploy data loss prevention and retention policies: Ensure compliance and secure data across collaboration environments
- Manage risks, alerts, and activities: Respond to security incidents and mitigate threats effectively
- Collaborate with governance and security teams: Develop policies to address organizational security goals
- Coordinate with workload administrators and stakeholders: Implement technology solutions aligned with regulatory frameworks
Course content
| Module 1: Protect sensitive data in a digital world | |
| Discover how Microsoft Purview helps organizations classify, protect, and monitor sensitive data across cloud, endpoint, and AI environments. This module explores strategies for securing data through classification labeling, encryption, and proactive risk management. | |
| Lessons: | |
|
|
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
|
|
| Module 2: Classify data for protection and governance | |
| Learn about the information available to help you understand your data landscape and know your data. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 3: Review and analyse data classification and protection | |
| Discover how Microsoft Purview helps organizations monitor and analyze data classification and
protection. This module explores how security teams can track classification trends, investigate labeled content, and assess policy effectiveness using Information Protection Reports, Data explorer, Content explorer, and Activity explorer. |
|
| Lessons: | |
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 4: Create and manage sensitive information types | |
| Learn how to use sensitive information types to support your information protection strategy. | |
| Lessons: | |
|
|
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 5: Create and configure sensitivity labels with Microsoft Purview | |
| Microsoft Purview sensitivity labels enable you to classify and protect sensitive data throughout your organization, including in the cloud and on devices. This module covers how to classify and protect sensitive information to ensure its security and compliance. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
|
|
| Module 6: Apply sensitivity labels for data protection | |
| Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate aren’t hindered. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 7: Understand Microsoft 365 encryption | |
| Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 8: Deploy Microsoft Purview Message Encryption | |
| Learn about the different encryption methods Microsoft Purview provides to protect messages. | |
| Lessons: | |
|
|
|
|
|
|
|
|
|
|
| Module 9: Prevent data loss in Microsoft Purview | |
| Microsoft Purview Data Loss Prevention (DLP) helps safeguard sensitive information by monitoring and preventing accidental data leaks across your organization’s digital platforms. In this module, you’ll learn how to plan, deploy, and adjust DLP policies to protect sensitive data in your organization, ensuring security without disrupting daily work. | |
| Lessons: | |
|
|
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
|
|
| Module 10: Implement endpoint data loss prevention (DLP) with Microsoft Purview | |
| Endpoint DLP in Microsoft Purview helps organizations protect sensitive data on endpoint devices by monitoring, restricting, or allowing actions such as file transfers, copying, and sharing. Learn how to onboard devices, configure settings, and create custom policies to ensure data security across your organization. | |
| Lessons: | |
|
|
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 11: Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform | |
| Learn how to configure and implement data loss prevention policies and integrate them with Microsoft Defender for Cloud Apps. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
| Module 12: Understand Microsoft Purview Insider Risk Management | |
| Understand insider risks and discover how Microsoft Purview Insider Risk Management identifies risky activities, analyzes context, and helps organizations protect data while respecting privacy. | |
| Lessons: | |
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 13: Prepare for Microsoft Purview Insider Risk Management | |
| Discover strategies for planning and configuring Microsoft Purview Insider Risk Management to meet organizational needs and protect privacy. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 14: Create and manage Insider Risk Management policies | |
| Create and manage Microsoft Purview Insider Risk Management policies to detect and address potential insider risks while supporting organizational security and privacy. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
|
|
| Module 15: Implement Adaptive Protection in Insider Risk Management | |
| Understand how Adaptive Protection applies machine learning to assess user risk and automatically enforce the right level of security controls. By dynamically assigning Data loss prevention, Data lifecycle management, and Conditional Access policies, it strengthens data security while reducing unnecessary alerts and manual intervention. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 16: Discover AI interactions with Microsoft Purview | |
| Microsoft Purview helps organizations discover how Microsoft 365 Copilot and other AI tools interact with data. Using Data Security Posture Management (DSPM) for AI and Audit, security teams can detect AI activity, assess potential risks, and gather insights to support data protection and compliance strategies. | |
| Lessons: | |
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 17: Protect sensitive data from AI-related risks | |
| Microsoft Purview helps organizations protect sensitive data in environments that use AI tools. Learn how to reduce data security risks by applying sensitivity labels, using data loss prevention controls, and deploying recommended protections through DSPM for AI. | |
| Lessons: | |
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 18: Govern AI usage with Microsoft Purview | |
| Learn how to apply policies and manage the lifecycle of AIgenerated content using Microsoft Purview. This module shows how to retain, delete, investigate, and review content created in Microsoft 365 Copilot and other AI apps. | |
| Lessons: | |
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 19: Assess and mitigate AI risks with Microsoft Purview | |
| Microsoft Purview includes tools that help detect risky activity and apply policy-based protections in AI environments. This includes detecting generative AI usage, assigning user risk levels, and adjusting enforcement actions based on those levels. | |
| Lessons: | |
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 20: Understand retention in Microsoft Purview | |
| Microsoft Purview retention helps organizations manage how long data is kept and when it can be deleted. Learn how to apply retention strategically to meet compliance requirements, reduce risk, and protect important information throughout its lifecycle. | |
| Lessons: | |
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 19: Assess and mitigate AI risks with Microsoft Purview | |
| Microsoft Purview includes tools that help detect risky activity and apply policy-based protections in AI environments. This includes detecting generative AI usage, assigning user risk levels, and adjusting enforcement actions based on those levels. | |
| Lessons: | |
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
| Module 21: Implement and manage retention and recovery in Microsoft Purview | |
| Microsoft Purview helps reduce data exposure by providing tools to control how long content is kept and when it’s permanently deleted. Through retention labels, policies, adaptive scopes, and recovery capabilities, organizations can apply consistent lifecycle rules across Microsoft 365 and reduce the risk of keeping unnecessary or outdated data. This approach supports both compliance and information security goals by minimizing what data is available to unauthorized access or misuse. | |
| Lessons: | |
|
|
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
|
|
| Module 22: Search and investigate with Microsoft Purview Audit | |
| Enhance data security and compliance with Microsoft Purview Audit by configuring detailed audits, managing logs, and analysing access patterns. | |
| Lessons: | |
|
|
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
|
|
| Module 23: Search for content in the Microsoft Purview compliance portal | |
| This module examines how to search for content in the Microsoft Purview compliance portal using Content Search functionality, including how to view and export the search results, and configure search permissions filtering. | |
| Lessons: | |
|
|
|
|
|
|
|
|
|
|
| After completing this module, students will be able to: | |
|
|
|
|
Associated certifications and exam
There is no Associated certification & Exam for this course.
Microsoft Overview
Skilled Microsoft engineers add significant value to the marketplace by reducing the cost of technology solutions whilst improving efficiency and fuelling innovation. Through authorized Microsoft training, Torque IT empowers engineers, developers and end-users to realise their full potential by providing them with the necessary knowledge and skills to optimise the adoption and use of Microsoft solutions.
Torque IT considers authorised Microsoft training to be an integral part of any Microsoft implementation. Microsoft authorised training, and associated certification, ensures that you get the most from your technology investment and that you are able to operate above the technology curve. Microsoft career certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Authorized Microsoft training and certification is the industry standard for any solution that includes designing, selling, implementing, upgrading, managing, and operating Microsoft solutions.
For 19 years, Torque IT has maintained the status of Gold Learning Partner for Microsoft in South Africa. This is the highest level of accreditation that Microsoft awards to Learning Partners that specialize in technical, product, sales, development, end-user and solutions training.
These achievements reflect our commitment to providing our customers with quality skills development, enablement, training, and certification solutions that demonstrate exceptional depth, breadth, and expertise across Windows Server, Windows Client, Microsoft Virtualization, Microsoft Azure, Office 365, Exchange Server, SharePoint Server, Skype for Business, System Centre Server, Visual Studio and Microsoft Office technologies.
Torque is recognized by Microsoft, and the industry, as having met rigorous standards for educational competency, service, customer satisfaction and investment in Microsoft technologies that will prepare the next generation of IT industry professionals.