Microsoft 365 Security Administration Certification (MS-500) Training

About Course
The Microsoft 365 Security Administration Certification (MS-500) validates skills in implementing and managing security and compliance solutions in Microsoft 365 environments. It covers topics such as identity and access management, threat protection, information protection, and governance and compliance features. Aimed at security administrators and IT professionals, MS-500 ensures proficiency in safeguarding organizational assets, protecting against threats, and ensuring compliance with regulatory requirements using Microsoft 365 security tools and technologies. Certification holders demonstrate the ability to secure Microsoft 365 deployments, mitigate risks, and maintain data privacy, enhancing organizational security posture and supporting business continuity in the digital era.
What Will You Learn?
- 1. In-Demand Skills
- 2. Career Advancement
- 3. Efficient CRM Management
- 4. Data Security
- 5. Workflow Automation
- 6. Reporting Insights
- 7. Job OpportunitiesHours On Demanded Videos
Course Content
Module 1: Introduction
-
Introduction
Module 2: Managing Microsoft 365 Identity Access
-
Understanding Identity Challenges
-
What is Identity Governance Process?
-
Microsoft 365 Authentication Options
-
Creating Cloud Only User Accounts
-
Managing Cloud User Accounts
-
Deleting and Recovering User Accounts
-
Assigning Roles in Microsoft 365
-
Creating and Managing Groups in 365
-
What is Privileged Identity Management?
-
Implementing PIM
-
What is Privileged Access Management in 365?
Module 3: Password and Identity Protection
-
Managing Microsoft 365 Passwords
-
Implementing Multi-Factor Authentication
-
Planning Self-Service Password Reset
-
What are Password Alternatives?
-
Using Azure AD Access Reviews
-
Overview of Azure Active Directory Security Defaults
-
Overview of Azure Active Directory Identity Protection
-
Using Azure AD Identity Protection
Module 4: Identity Synchronization
-
SSO Options for Microsoft 365
-
Working with Directory Synchronization
-
Directory Sync Prerequisites
-
Installing and Configuring Azure Ad Connect
-
Azure AD Connect Health
-
Planning Azure AD Connect for Multi-Forest
-
Managing Users with Directory Synchronization
-
Managing Groups with Directory Synchronization
-
Overview of Azure AD Connect Security Groups
-
Understanding Identity Federation
Module 5: Access Management
-
What is Conditional Access?
-
Overview of Azure AD Application Proxy
-
Setting Up Azure AD Application Proxy
-
Planning for Device Compliance
-
What are Conditional Groups?
-
Creating Conditional Access Policies
-
Managing External Access
-
Creating External Users
Module 6: Microsoft 365 Security
-
Changing Work Place Threat Landscape
-
Overview of Microsoft Security Strategy
-
Using the Secure Score
-
What is the Anti-Malware Pipeline?
-
Overview of Zero-Hour Auto Purge
-
Spoofing and Phishing Protection
-
Microsoft Defender for Microsoft 365 Safe Attachments
-
Microsoft Defender for Microsoft 365 Safe Links
-
Overview of Microsoft Defender for Identity
-
Configuring Microsoft Defender for Identity
-
Using the Microsoft Defender for Identity Portal
-
Microsoft Defender for Endpoint
-
What is Application Guard?
-
Overview of Application Control
-
Microsoft Defender Exploit Protection
Module 7: Threat Intelligence
-
Using the Security Dashboard
-
What is the Microsoft Graph?
-
Overview of Threat Explorer and Tracker
-
Using the Attack Simulator
-
What is Automated Investigation and Response?
-
Overview of Azure Sentinel
-
Creating and Using Azure Sentinel
Module 8: Mobile Device Management
-
Mobile Application Management
-
Using Azure AD For SaaS Access
-
Managing Devices with Mobile Device Management
-
Overview of MDM Policies and Profile
-
Deploying Mobile Device Management
-
Defining Corporate Device Enrollment Policy
-
Enrolling Devices
-
Device Enrollment Manager
Module 9: Information Protection
-
How to Classify Data
-
Creating Sensitivity Labels
-
Using Sensitivity Labels
-
What is the AIP Super User?
-
Using the Customer Lockbox
-
Protecting Data Access in Microsoft 365
-
Planning for Windows Information Protection
-
Implementing WIP
-
Working with WIP in Windows Desktop
Module 10: Microsoft 365 Encryption
-
Overview of Microsoft 365 Encryption Options
-
Using Rights Management in Exchange
-
Using Rights Management in SharePoint
-
Comparing IRM vs AIP in SharePoint
-
Overview of Secure Multipurpose Internet Mail Extension
-
Using Office Message Encryption
Module 11: Data Loss Prevention
-
What is Data Loss Prevention?
-
Creating a DLP Policy
-
Using DLP with File Classification Infrastructure
-
Monitoring and Notifications
Module 12: Cloud Application Security
-
Overview of Cloud App Security
-
Deploying Cloud App Security
-
Controlling Cloud Apps with Policies
-
Working with Discovered Apps
-
Managing Alerts
Module 13: Archiving and Retention
-
Activating In-Place Archiving in Exchange
-
Using In-Place Records Management in SharePoint
-
Overview of Messaging Records Management
-
Configuring Retention Tags and Policy
-
Using Personal Retention Tags
-
Overview of Compliance Center Retention Policies
-
Creating Retention Labels
-
Creating Retention Policies in the Compliance Center
Module 14: Data Governance
-
Planning Security and Compliance
-
Overview of Compliance
-
Configuring Alert Policies
-
Monitoring Security Status
-
Building an Ethical Wall in Exchange
-
Using Content Search
-
Running Audit Log Search
-
Using Advanced eDiscovery
Module 15: Conclusion
-
Course Recap
Module 16: Microsoft 365 Security Administration (Exam MS-500) Assessment Quiz
-
Assessment Quiz
Earn a certificate
Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.
