Microsoft 365 Security Administration (Exam MS-500) - Advanced

Price
$64.99 USD

Duration

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

Students will learn to implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. This course will prepare for the MS-500 exam. Passing the exam will earn you the Microsoft 365 Certified: Security Administrator Associate certification.

Course Objectives

Introduction , Managing Microsoft 365 Identity Access , Password and Identity Protection , Identity Synchronization , Access Management , Microsoft 365 Security , Threat Intelligence , Mobile Device Management , Information Protection , Microsoft 365 Encryption , Data Loss Prevention , Cloud Application Security , Archiving and Retention , Data Governance , Conclusion
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Agenda

1 - Introduction

  • Introduction

2 - Managing Microsoft 365 Identity Access

  • Understanding Identity Challenges
  • What is Identity Governance Process?
  • Microsoft 365 Authentication Options
  • Creating Cloud Only User Accounts
  • Managing Cloud User Accounts
  • Deleting and Recovering User Accounts
  • Assigning Roles in Microsoft 365
  • Creating and Managing Groups in 365
  • What is Privileged Identity Management?
  • Implementing PIM
  • What is Privileged Access Management in 365?

3 - Password and Identity Protection

  • Managing Microsoft 365 Passwords
  • Implementing Multi-Factor Authentication
  • Planning Self-Service Password Reset
  • What are Password Alternatives?
  • Using Azure AD Access Reviews
  • Overview of Azure Active Directory Security Defaults
  • Overview of Azure Active Directory Identity Protection
  • Using Azure AD Identity Protection

4 - Identity Synchronization

  • SSO Options for Microsoft 365
  • Working with Directory Synchronization
  • Directory Sync Prerequisites
  • Installing and Configuring Azure Ad Connect
  • Azure AD Connect Health
  • Planning Azure AD Connect for Multi-Forest
  • Managing Users with Directory Synchronization
  • Managing Groups with Directory Synchronization
  • Overview of Azure AD Connect Security Groups
  • Understanding Identity Federation

5 - Access Management

  • What is Conditional Access?
  • Overview of Azure AD Application Proxy
  • Setting Up Azure AD Application Proxy
  • Planning for Device Compliance
  • What are Conditional Groups?
  • Creating Conditional Access Policies
  • Managing External Access
  • Creating External Users

6 - Microsoft 365 Security

  • Changing Work Place Threat Landscape
  • Overview of Microsoft Security Strategy
  • Using the Secure Score
  • What is the Anti-Malware Pipeline?
  • Overview of Zero-Hour Auto Purge
  • Spoofing and Phishing Protection
  • Using Microsoft 365 ATP Safe Attachments
  • Using Microsoft 365 ATP Safe Links
  • Overview Of Azure ATP
  • Configuring Azure ATP
  • What is Microsoft Defender ATP?
  • What is Application Guard?
  • Overview of Application Control
  • Microsoft Defender Exploit Protection

7 - Threat Intelligence

  • Using the Security Dashboard
  • What is the Microsoft Graph?
  • Overview of Threat Explorer and Tracker
  • Using the Attack Simulator
  • What is Automated Investigation and Response?
  • Overview of Azure Sentinel

8 - Mobile Device Management

  • Mobile Application Management
  • Using Azure AD For SaaS Access
  • Managing Devices with Mobile Device Management
  • Overview of MDM Policies and Profile
  • Deploying Mobile Device Management
  • Defining Corporate Device Enrollment Policy
  • Enrolling Devices
  • Device Enrollment Manager

9 - Information Protection

  • How to Classify Data
  • Creating Sensitivity Labels
  • Preparing for Azure Information Protection
  • Creating AIP Labels and Policies
  • What is the AIP Super User?
  • Choosing Your AIP Key
  • Overview of AIP Scanner
  • Using RMS Connector
  • Planning for Windows Information Protection
  • Implementing WIP
  • Working with WIP in Windows Desktop

10 - Microsoft 365 Encryption

  • Overview of Microsoft 365 Encryption Options
  • Using Rights Management in Exchange
  • Using Rights Management in SharePoint
  • Comparing IRM vs AIP in SharePoint
  • Overview of Secure Multipurpose Internet Mail Extension
  • Using Office Message Encryption

11 - Data Loss Prevention

  • What is Data Loss Prevention?
  • Creating a DLP Policy
  • Using DLP with File Classification Infrastructure

12 - Cloud Application Security

  • Overview of Cloud App Security
  • Deploying Cloud App Security
  • Controlling Cloud Apps with Policies
  • Working with Discovered Apps
  • Managing Alerts

13 - Archiving and Retention

  • Activating In-Place Archiving in Exchange
  • Using In-Place Records Management in SharePoint
  • Overview of Messaging Records Management
  • Configuring Retention Tags and Policy
  • Using Personal Retention Tags
  • Overview of Compliance Center Retention Policies
  • Creating Retention Policies in the Compliance Center

14 - Data Governance

  • Planning Security and Compliance
  • Overview of Compliance
  • Building an Ethical Wall in Exchange
  • Using Content Search
  • Running Audit Log Search
  • Using Advanced eDiscovery

15 - Conclusion

  • Course Recap
 

Get in touch to schedule training for your team
We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.

 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with New Horizons