Type
Virtual
Classroom ILT
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R9 700,00
Price excluding VAT
Introduction:
In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.
Audience profile:
The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.
Job role: Administrator
Pre-requisites:
Learners should start this course already having the following skills:
- Basic conceptual understanding of Microsoft Azure.
- Experience with Windows 10 devices.
- Experience with Office 365.
- Basic understanding of authorization and authentication.
- Basic understanding of computer networks.
- Working knowledge of managing mobile devices.
Course Objectives:
- Administer user and group access in Microsoft 365.
- Explain and manage Azure Identity Protection.
- Plan and implement Azure AD Connect.
- Manage synchronized user identities.
- Explain and use conditional access.
- Describe cyber-attack threat vectors.
- Explain security solutions for Microsoft 365.
- Use Microsoft Secure Score to evaluate and improve your security posture.
- Configure various advanced threat protection services for Microsoft 365.
- Plan for and deploy secure mobile devices.
- Implement information rights management.
- Secure messages in Office 365.
- Configure Data Loss Prevention policies.
- Deploy and manage Cloud App Security.
- Implement Windows information protection for devices.
- Plan and deploy a data archiving and retention system.
- Create and manage an eDiscovery investigation.
- Manage GDPR data subject requests.
- Explain and use sensitivity labels.
Course content
Module 1: User and Group Management |
This module explains how to manage user accounts and groups in Microsoft 365. It introduces you to the Zero Trust concept as well as authentication. The module sets the foundation for the remainder of the course.
Lessons: |
|
Lab: Initialize your tenant – users and groups |
|
Lab: Password management |
|
After completing this module, students will be able to: |
|
Module 2: Identity Synchronization and Protection |
This module explains concepts related to synchronizing identities for Microsoft 365. Specifically, it focuses on Azure AD Connect and managing directory synchronization to ensure the right people are connecting to your Microsoft 365 system.
Lessons: |
|
Lab: Implement Identity Synchronization |
|
After completing this module, students will be able to |
|
Module 3: Identity and Access Management |
This module explains conditional access for Microsoft 365 and how it can be used to control access to resources in your organization. The module also explains Role Based Access Control (RBAC) and solutions for external access. We discuss identity governance as a concept and its components.
Lessons: |
|
Lab: Use Conditional Access to enable MFA |
|
Lab: Configure Privileged Identity Management |
|
After completing this module, you will be able to: |
|
Module 4: Security in Microsoft 365 |
This module explains the various cyber-attack threats that exist. It then introduces you to the Microsoft solutions used to mitigate those threats. The module finishes with an explanation of Microsoft Secure Score and how it can be used to evaluate and report your organizations security posture.
Lessons: |
|
Lab: Use Microsoft Secure Score |
|
After completing this module, you will be able to: |
|
Module 5: Threat Protection |
This module explains the various threat protection technologies and services available for Microsoft 365. The module covers message protection through Exchange Online Protection, Microsoft Defender for Identity and Microsoft Defender for Endpoint.
Lessons: |
|
Lab: Manage Microsoft 365 Security Services |
|
After completing this module, you will be able to: |
|
Module 6: Threat Management |
This module explains Microsoft Threat Management which provides you with the tools to evaluate and address cyber threats and formulate responses. You will learn how to use the Security dashboard and Azure Sentinel for Microsoft 365.
Lessons: |
|
Lab: Using Attack Simulator |
|
After completing this module, you will be able to: |
|
Module 7: Microsoft Cloud Application Security |
This module focuses on cloud application security in Microsoft 365. The module will explain cloud discovery, app connectors, policies, and alerts. You will learn how these features work to secure you cloud applications.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 8: Mobility |
This module focuses on securing mobile devices and applications. You will learn about Mobile Device Management and how it works with Microsoft Intune. You will also learn about how Intune and Azure AD can be used to secure mobile applications.
Lessons: |
|
Lab: Device Management |
|
After completing this module, you will be able to: |
|
Module 9: Information Protection and Governance |
This module focuses on data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications to protect your data.
Lessons: |
|
Lab: Archiving and Retention |
|
After completing this module, you will be able to: |
|
Module 10: Rights Management and Encryption |
This module explains information rights management in Exchange and SharePoint. The module also describes encryption technologies used to secure messages.
Lessons: |
|
Lab: Configure Office 365 Message Encryption |
|
After completing this module, you will be able to: |
|
Module 11: Data Loss Prevention |
This module focuses on data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications to protect your data.
Lessons: |
|
Lab: Implement Data Loss Prevention policies |
|
After completing this module, you will be able to: |
|
Module 12: Compliance Management |
This module explains the Compliance center in Microsoft 365. It discusses the components of compliance score.
Lessons: |
|
After completing this module, you will be able to: |
|
Module 13: Insider Risk Management |
This module focuses on insider risk related functionality within Microsoft 365. It covers not only Insider Risk Management in the compliance center but also information barriers and privileged access management as well.
Lessons: |
|
Lab: Privileged Access Management |
|
After completing this module, you will be able to: |
|
Module 14: Discover and Respond |
This module focuses on content search and investigations. The module covers how to use eDiscovery to conduct advanced investigations of Microsoft 365 data. It also covers audit logs and discusses GDPR data subject requests.
Lessons: |
|
Lab: Manage Search and Investigation |
|
After completing this module, you will be able to: |
|
Torque IT specializes in providing our Clients with Vendor authorized instructor-led training, enablement IT courses, and certification solutions.
Associated certifications and exam:
The course helps learners prepare for the Exam MS-500: Microsoft 365 Security Administration
On successful completion of this course students will receive a Torque IT attendance certificate.
Microsoft Overview
Skilled Microsoft engineers add significant value to the marketplace by reducing the cost of technology solutions whilst improving efficiency and fuelling innovation. Through authorized Microsoft training, Torque IT empowers engineers, developers and end-users to realise their full potential by providing them with the necessary knowledge and skills to optimise the adoption and use of Microsoft solutions.
Torque IT considers authorised Microsoft training to be an integral part of any Microsoft implementation. Microsoft authorised training, and associated certification, ensures that you get the most from your technology investment and that you are able to operate above the technology curve. Microsoft career certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Authorized Microsoft training and certification is the industry standard for any solution that includes designing, selling, implementing, upgrading, managing, and operating Microsoft solutions.
For 19 years, Torque IT has maintained the status of Gold Learning Partner for Microsoft in South Africa. This is the highest level of accreditation that Microsoft awards to Learning Partners that specialize in technical, product, sales, development, end-user and solutions training.
These achievements reflect our commitment to providing our customers with quality skills development, enablement, training, and certification solutions that demonstrate exceptional depth, breadth, and expertise across Windows Server, Windows Client, Microsoft Virtualization, Microsoft Azure, Office 365, Exchange Server, SharePoint Server, Skype for Business, System Centre Server, Visual Studio and Microsoft Office technologies.
Torque is recognized by Microsoft, and the industry, as having met rigorous standards for educational competency, service, customer satisfaction and investment in Microsoft technologies that will prepare the next generation of IT industry professionals.