Error

Invalid column name 'Price'.

Microsoft 365 Security Administration (Exam MS-500) - Advanced

Course Overview

Students will learn to implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. This course will prepare for the MS-500 exam. Passing the exam will earn you the Microsoft 365 Certified: Security Administrator Associate certification.

Course Objectives

Introduction , Managing Microsoft 365 Identity Access , Password and Identity Protection , Identity Synchronization , Access Management , Microsoft 365 Security , Threat Intelligence , Mobile Device Management , Information Protection , Microsoft 365 Encryption , Data Loss Prevention , Cloud Application Security , Archiving and Retention , Data Governance , Conclusion

Course Outline

1 - Introduction

  • Introduction

2 - Managing Microsoft 365 Identity Access

  • Understanding Identity Challenges
  • What is Identity Governance Process?
  • Microsoft 365 Authentication Options
  • Creating Cloud Only User Accounts
  • Managing Cloud User Accounts
  • Deleting and Recovering User Accounts
  • Assigning Roles in Microsoft 365
  • Creating and Managing Groups in 365
  • What is Privileged Identity Management?
  • Implementing PIM
  • What is Privileged Access Management in 365?

3 - Password and Identity Protection

  • Managing Microsoft 365 Passwords
  • Implementing Multi-Factor Authentication
  • Planning Self-Service Password Reset
  • What are Password Alternatives?
  • Using Azure AD Access Reviews
  • Overview of Azure Active Directory Security Defaults
  • Overview of Azure Active Directory Identity Protection
  • Using Azure AD Identity Protection

4 - Identity Synchronization

  • SSO Options for Microsoft 365
  • Working with Directory Synchronization
  • Directory Sync Prerequisites
  • Installing and Configuring Azure Ad Connect
  • Azure AD Connect Health
  • Planning Azure AD Connect for Multi-Forest
  • Managing Users with Directory Synchronization
  • Managing Groups with Directory Synchronization
  • Overview of Azure AD Connect Security Groups
  • Understanding Identity Federation

5 - Access Management

  • What is Conditional Access?
  • Overview of Azure AD Application Proxy
  • Setting Up Azure AD Application Proxy
  • Planning for Device Compliance
  • What are Conditional Groups?
  • Creating Conditional Access Policies
  • Managing External Access
  • Creating External Users

6 - Microsoft 365 Security

  • Changing Work Place Threat Landscape
  • Overview of Microsoft Security Strategy
  • Using the Secure Score
  • What is the Anti-Malware Pipeline?
  • Overview of Zero-Hour Auto Purge
  • Spoofing and Phishing Protection
  • Using Microsoft 365 ATP Safe Attachments
  • Using Microsoft 365 ATP Safe Links
  • Overview Of Azure ATP
  • Configuring Azure ATP
  • What is Microsoft Defender ATP?
  • What is Application Guard?
  • Overview of Application Control
  • Microsoft Defender Exploit Protection

7 - Threat Intelligence

  • Using the Security Dashboard
  • What is the Microsoft Graph?
  • Overview of Threat Explorer and Tracker
  • Using the Attack Simulator
  • What is Automated Investigation and Response?
  • Overview of Azure Sentinel

8 - Mobile Device Management

  • Mobile Application Management
  • Using Azure AD For SaaS Access
  • Managing Devices with Mobile Device Management
  • Overview of MDM Policies and Profile
  • Deploying Mobile Device Management
  • Defining Corporate Device Enrollment Policy
  • Enrolling Devices
  • Device Enrollment Manager

9 - Information Protection

  • How to Classify Data
  • Creating Sensitivity Labels
  • Preparing for Azure Information Protection
  • Creating AIP Labels and Policies
  • What is the AIP Super User?
  • Choosing Your AIP Key
  • Overview of AIP Scanner
  • Using RMS Connector
  • Planning for Windows Information Protection
  • Implementing WIP
  • Working with WIP in Windows Desktop

10 - Microsoft 365 Encryption

  • Overview of Microsoft 365 Encryption Options
  • Using Rights Management in Exchange
  • Using Rights Management in SharePoint
  • Comparing IRM vs AIP in SharePoint
  • Overview of Secure Multipurpose Internet Mail Extension
  • Using Office Message Encryption

11 - Data Loss Prevention

  • What is Data Loss Prevention?
  • Creating a DLP Policy
  • Using DLP with File Classification Infrastructure

12 - Cloud Application Security

  • Overview of Cloud App Security
  • Deploying Cloud App Security
  • Controlling Cloud Apps with Policies
  • Working with Discovered Apps
  • Managing Alerts

13 - Archiving and Retention

  • Activating In-Place Archiving in Exchange
  • Using In-Place Records Management in SharePoint
  • Overview of Messaging Records Management
  • Configuring Retention Tags and Policy
  • Using Personal Retention Tags
  • Overview of Compliance Center Retention Policies
  • Creating Retention Policies in the Compliance Center

14 - Data Governance

  • Planning Security and Compliance
  • Overview of Compliance
  • Building an Ethical Wall in Exchange
  • Using Content Search
  • Running Audit Log Search
  • Using Advanced eDiscovery

15 - Conclusion

  • Course Recap