Error
Invalid column name 'Price'.
Microsoft 365 Security Administration (Exam MS-500) - Advanced
Course Overview
Students will learn to implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. This course will prepare for the MS-500 exam. Passing the exam will earn you the Microsoft 365 Certified: Security Administrator Associate certification.
Course Objectives
Introduction , Managing Microsoft 365 Identity Access , Password and Identity Protection , Identity Synchronization , Access Management , Microsoft 365 Security , Threat Intelligence , Mobile Device Management , Information Protection , Microsoft 365 Encryption , Data Loss Prevention , Cloud Application Security , Archiving and Retention , Data Governance , Conclusion
Course Outline
2 - Managing Microsoft 365 Identity Access
- Understanding Identity Challenges
- What is Identity Governance Process?
- Microsoft 365 Authentication Options
- Creating Cloud Only User Accounts
- Managing Cloud User Accounts
- Deleting and Recovering User Accounts
- Assigning Roles in Microsoft 365
- Creating and Managing Groups in 365
- What is Privileged Identity Management?
- Implementing PIM
- What is Privileged Access Management in 365?
3 - Password and Identity Protection
- Managing Microsoft 365 Passwords
- Implementing Multi-Factor Authentication
- Planning Self-Service Password Reset
- What are Password Alternatives?
- Using Azure AD Access Reviews
- Overview of Azure Active Directory Security Defaults
- Overview of Azure Active Directory Identity Protection
- Using Azure AD Identity Protection
4 - Identity Synchronization
- SSO Options for Microsoft 365
- Working with Directory Synchronization
- Directory Sync Prerequisites
- Installing and Configuring Azure Ad Connect
- Azure AD Connect Health
- Planning Azure AD Connect for Multi-Forest
- Managing Users with Directory Synchronization
- Managing Groups with Directory Synchronization
- Overview of Azure AD Connect Security Groups
- Understanding Identity Federation
5 - Access Management
- What is Conditional Access?
- Overview of Azure AD Application Proxy
- Setting Up Azure AD Application Proxy
- Planning for Device Compliance
- What are Conditional Groups?
- Creating Conditional Access Policies
- Managing External Access
- Creating External Users
6 - Microsoft 365 Security
- Changing Work Place Threat Landscape
- Overview of Microsoft Security Strategy
- Using the Secure Score
- What is the Anti-Malware Pipeline?
- Overview of Zero-Hour Auto Purge
- Spoofing and Phishing Protection
- Using Microsoft 365 ATP Safe Attachments
- Using Microsoft 365 ATP Safe Links
- Overview Of Azure ATP
- Configuring Azure ATP
- What is Microsoft Defender ATP?
- What is Application Guard?
- Overview of Application Control
- Microsoft Defender Exploit Protection
7 - Threat Intelligence
- Using the Security Dashboard
- What is the Microsoft Graph?
- Overview of Threat Explorer and Tracker
- Using the Attack Simulator
- What is Automated Investigation and Response?
- Overview of Azure Sentinel
8 - Mobile Device Management
- Mobile Application Management
- Using Azure AD For SaaS Access
- Managing Devices with Mobile Device Management
- Overview of MDM Policies and Profile
- Deploying Mobile Device Management
- Defining Corporate Device Enrollment Policy
- Enrolling Devices
- Device Enrollment Manager
9 - Information Protection
- How to Classify Data
- Creating Sensitivity Labels
- Preparing for Azure Information Protection
- Creating AIP Labels and Policies
- What is the AIP Super User?
- Choosing Your AIP Key
- Overview of AIP Scanner
- Using RMS Connector
- Planning for Windows Information Protection
- Implementing WIP
- Working with WIP in Windows Desktop
10 - Microsoft 365 Encryption
- Overview of Microsoft 365 Encryption Options
- Using Rights Management in Exchange
- Using Rights Management in SharePoint
- Comparing IRM vs AIP in SharePoint
- Overview of Secure Multipurpose Internet Mail Extension
- Using Office Message Encryption
11 - Data Loss Prevention
- What is Data Loss Prevention?
- Creating a DLP Policy
- Using DLP with File Classification Infrastructure
12 - Cloud Application Security
- Overview of Cloud App Security
- Deploying Cloud App Security
- Controlling Cloud Apps with Policies
- Working with Discovered Apps
- Managing Alerts
13 - Archiving and Retention
- Activating In-Place Archiving in Exchange
- Using In-Place Records Management in SharePoint
- Overview of Messaging Records Management
- Configuring Retention Tags and Policy
- Using Personal Retention Tags
- Overview of Compliance Center Retention Policies
- Creating Retention Policies in the Compliance Center
14 - Data Governance
- Planning Security and Compliance
- Overview of Compliance
- Building an Ethical Wall in Exchange
- Using Content Search
- Running Audit Log Search
- Using Advanced eDiscovery