1 - User and Group Management
Identity and Access Management conceptsThe Zero Trust modelPlan your identity and authentication solutionUser accounts and rolesPassword Management
2 - Identity Synchronization and Protection
Plan directory synchronizationConfigure and manage synchronized identitiesAzure AD Identity Protection
3 - Identity and Access Management
Application ManagementIdentity GovernanceManage device accessRole Based Access Control (RBAC)Solutions for external accessPrivileged Identity Management
4 - Security in Microsoft 365
Threat vectors and data breachesSecurity strategy and principlesMicrosoft security solutionsSecure Score
5 - Threat Protection
Exchange Online Protection (EOP)Microsoft Defender for Office 365Manage Safe AttachmentsManage Safe LinksMicrosoft Defender for Identity
6 - Threat Management
Security dashboardThreat investigation and responseAzure SentinelAdvanced Threat Analytics
7 - Microsoft Cloud Application Security
Deploy Cloud Application SecurityUse cloud application security information
8 - Mobility
Mobile Application Management (MAM)Mobile Device Management (MDM)Deploy mobile device servicesEnroll devices to Mobile Device Management
9 - Information Protection and Governance
Information protection conceptsGovernance and Records ManagementSensitivity labelsArchiving in Microsoft 365Retention in Microsoft 365Retention policies in the Microsoft 365 Compliance CenterArchiving and retention in ExchangeIn-place records management in SharePoint
10 - Rights Management and Encryption
Information Rights Management (IRM)Secure Multipurpose Internet Mail Extension (S-MIME)Office 365 Message Encryption
11 - Data Loss Prevention
Data loss prevention fundamentalsCreate a DLP policyCustomize a DLP policyCreate a DLP policy to protect documentsPolicy tips
12 - Compliance Management
13 - Insider Risk Management
Insider RiskPrivileged AccessInformation barriersBuilding ethical walls in Exchange Online
14 - Discover and Respond
Content SearchAudit Log InvestigationsAdvanced eDiscovery
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.
Learners should start this course already having the following skills:
Basic conceptual understanding of Microsoft Azure.
Experience with Windows 10 devices.
Experience with Office 365.
Basic understanding of authorization and authentication.
Basic understanding of computer networks.
Working knowledge of managing mobile devices.