Microsoft 365 Mobility and Security (Exam MS-101)

This class is only available as part of a 12‑month Educate 360 Pro Subscription

Learn more about Educate 360 Pro >

Duration

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

This course will cover topics from the Microsoft MS-101 exam, which measures a student\'s ability to accomplish the following technical and administrative tasks: Identify threat vectors; use Secure Score; configure Azure Identity Protection; configure Exchange online protection; implement modern device services; implement Microsoft 365 security and threat management; and manage Microsoft 365 governance and compliance.

Course Objectives

Introduction , Identifying Threat Vectors , Using Secure Score , Configuring Azure Identity Protection , Exchange Online Protection , Microsoft 365 Threat Intelligence , Microsoft Data Governance , Security and Compliance , Managing Search and Investigation , Planning for Device Management , Windows 10 Deployment Strategy , Conclusion , Implementing Mobile Device Management
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Agenda

1 - Introduction

  • Introduction

2 - Identifying Threat Vectors

  • Today's Threat Landscape
  • What is Spoofing?
  • What is Phishing?
  • How Do Spam and Malware Cause Harm?
  • How Do Account Breaches Cause Harm?
  • Data Exfiltration, Deletion and Spillage

3 - Using Secure Score

  • What is a Secure Score?
  • Using the Secure Score Dashboard and Analyzer
  • Increasing Your Security Posture

4 - Configuring Azure Identity Protection

  • What is Azure Identity Protection?
  • Activating Azure Identity Protection
  • Configuring Azure Identity Protection
  • Configuring Alerts and Investigation
  • Setting Exclusions

5 - Exchange Online Protection

  • What is Exchange Online Protection?
  • Understanding Zero Hour Auto Purge
  • Spoofing and Phishing Protection
  • Configuring with Exchange AntiSpam
  • Configuring Exchange AntiMalware
  • Creating a Safe Attachment Policy
  • Creating a Transport Rule to Bypass Safe Attachments
  • Creating a Safe Links Policy
  • Creating a Transport Rule to Bypass Safe Links
  • Monitoring and Reporting

6 - Microsoft 365 Threat Intelligence

  • Microsoft Intelligent Security Graph
  • Working with the Security Dashboard
  • Viewing the Threat Explorer
  • What is Microsoft Advanced Threat Analytics?
  • Configuring ATA
  • Managing ATA

7 - Microsoft Data Governance

  • In-Place Archive in Exchange
  • Enabling In-Place Archiving
  • In-Place Records Management in SharePoint
  • Activating In-Place Records Management
  • Messaging Records Management
  • Creating MRM Policy and Tags
  • Troubleshooting MRM Policies that Don't Run
  • Information Rights Management in Exchange
  • Information Rights Management in SharePoint
  • Office 365 Message Encryption

8 - Security and Compliance

  • Planning Security and Compliance Roles
  • Reviewing GDPR Needs
  • Building an Ethical Wall
  • Working with a Retention Policy
  • Creating a Retention Policy
  • Data Loss Prevention
  • Creating a DLP Policy
  • Troubleshooting Policy Tips
  • What is Azure Information Protection?
  • Planning Azure Information Protection
  • Configuring Super User For AIP
  • Implementing the AIP Tenant Key
  • Working with AIP Labels and Policies
  • What is Windows Information Protection?
  • Planning for Windows Information Protection
  • Implementing Windows Information Protection

9 - Managing Search and Investigation

  • What is Content Search?
  • Creating a Content Search
  • Auditing in Microsoft 365
  • Searching Audit Logs
  • Configuring Audit Policy in SharePoint

10 - Planning for Device Management

  • Planning for Device Management
  • Prerequisites for Using Co-Management
  • Enabling Co-Management
  • Transferring Service to Intune
  • What is the Microsoft Store for Business?
  • Configuring the Microsoft Store for Business
  • Managing Settings for the Microsoft Store for Business
  • What is Mobile Application Management?
  • Configuring Mobile Application Management
  • Using Azure Ad for Apps

11 - Windows 10 Deployment Strategy

  • Planning for Windows as a Service
  • What are Windows 10 Deployment Models?
  • Planning Your Subscription Activation Strategy
  • Resolving Windows 10 Upgrade Errors

12 - Implementing Mobile Device Management

  • Managing Devices with MDM
  • Activating MDM
  • Configuring MDM
  • Managing Device Policies
  • Creating Conditional Access Policies
  • Enrolling Devices for MDM
  • Monitoring Enrolled Devices

13 - Conclusion

  • Course Recap
 

Get in touch to schedule training for your team
We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.

CourseID: 3606683E
 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with New Horizons