Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). This course may earn a Credly badge.

starstarstarstarstar_half

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Discuss information protection and data lifecycle management and why it's important.
Describe Microsoft's approach to information protection and data lifecycle management.
Define key terms associated with Microsoft's information protection and data lifecycle management solutions.
Identify the solutions that comprise information and data lifecycle management in Microsoft Purview.
List the components of the Data Classification solution
Explain the Content explorer and Activity explorer
Recognize the difference between built-in and custom sensitivity labels
Configure sensitive information types with exact data match-based classification
Implement document fingerprinting
Create custom keyword dictionaries
Explain how encryption mitigates the risk of unauthorized data disclosure.
Describe Microsoft data-at-rest and data-in-transit encryption solutions.
Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
Configure Microsoft Purview Message Encryption for end users
Implement Microsoft Purview Advanced Message Encryption

1
  • MODULE 1 INTRODUCTION TO INFORMATION PROTECTION AND DATA LIFECYCLE MANAGEMENT IN MICROSOFT PURVIEW INTRODUCTION TO INFORMATION PROTECTION AND DATA LIFECYCLE MANAGEMENT

  • Introduction to information protection and data lifecycle management15 min

    Know your data1

    Protect your data

    Prevent data loss

    Govern your data

    Summary and knowledge check


2
  • MODULE 2 CLASSIFY DATA FOR PROTECTION AND GOVERNANCE

  • Data classification overview

    Classify data using sensitive information types

    Classify data using trainable classifiers

    Review sensitive information and label usage

    Explore labeled and sensitive content

    Understand activities related to your data

    Summary and knowledge check


3
  • MODULE 3 CREATE AND MANAGE SENSITIVE INFORMATION TYPES

  • Introduction

    Compare built-in versus custom sensitive information types

    Create and manage custom sensitive information types

    Describe custom sensitive information types with exact data match

    Implement document fingerprinting

    Create keyword dictionary

    Knowledge check

    Summary and resources


4
  • MODULE 4 UNDERSTAND MICROSOFT 365 ENCRYPTION

  • Introduction to Microsoft 365 encryption

    Learn how Microsoft 365 data is encrypted at rest

    Understand service encryption in Microsoft Purview

    Explore customer key management using Customer Key

    Learn how data is encrypted in-transit

    Summary and knowledge check


5
  • MODULE 5 DEPLOY MICROSOFT PURVIEW MESSAGE ENCRYPTION

  • Introduction

    Implement Microsoft Purview Message Encryption

    Implement Microsoft Purview Advanced Message Encryption

    Use Microsoft Purview Message Encryption templates in mail flow rules

    Knowledge check

    Summary and resources


Audience

The information protection administrator translates an organization’s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls.

Language

English

Prerequisites

Before attending this course, students should have: Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services.

$2,495

Length: 4.0 days (32 hours)

Level:

Not Your Location? Change

Course Schedule:

Schedule select
06
Nov
Monday
9:00 AM ET -
5:00 PM ET
Available
Schedule select
04
Mar
Monday
9:00 AM ET -
5:00 PM ET
Available
Schedule select
17
Jun
Monday
8:00 AM PT -
4:00 PM PT
Available
Loading...