We really hope you'll agree, this training is way more then the average course on Udemy!
Have access to the following:
- Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
- Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
- Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
- Welcome to the course
- Understanding the Microsoft Environment
- A Solid Foundation of Active Directory Domains
- A Solid Foundation of RAS, DMZ, and Virtualization
- A Solid Foundation of the Microsoft Cloud Services
- Creating a free Microsoft 365 Azure AD Account
- Managing Microsoft 365 Services with PowerShell
- Connecting to Security and Compliance using PowerShell
- IMPORTANT Using Assignments in the course
Implement and manage data classification
- Identify sensitive information requirements for an organization's data
- Translate sensitive information requirements into built-in or custom
- Create and manage custom sensitive info types
- Implement document fingerprinting
- Create and manage exact data match (EDM) classifiers
- What are trainable classifiers?
- Create and manage trainable classifiers
- Monitor data classification & label by using data explorer & content explorer
- Configure optical character recognition (OCR) support for sensitive info types
Implement and manage sensitivity labels in Microsoft Purview
- Implement roles and permissions for administering sensitivity labels
- Define the concepts of sensitivity labels in Microsoft Purview
- Define and create sensitivity labels for items and containers
- Configure protection settings and content marking for sensitivity labels
- Configure and manage publishing policies for sensitivity labels
- Configure and manage auto-labeling policies for sensitivity labels
- Apply a sensitivity label to containers, such as Teams, SharePoint etc
- Apply sensitivity labels manually using Microsoft Word
- Understanding Microsoft Defender for Cloud Apps
- Apply sensitivity labels by using Microsoft Defender for Cloud Apps
Implement information protection for Windows, file shares, and Exchange
- Plan the Microsoft Purview Information Protection client
- Implement the Microsoft Purview Information Protection client
- Manage files by using the Microsoft Purview Information Protection client
- Apply bulk classifications with Microsoft Purview Information Protection scanner
- Removing the Azure virtual machine that is no longer needed
- Design solutions for email Encryption in Microsoft 365
- Implement Microsoft Purview Message Encryption
- Implement Microsoft Purview Advanced Message Encryption
Create and configure data loss prevention policies
- Design data loss prevention policies based on an organization’s requirements
- Implement roles and permissions for data loss prevention
- Create and manage data loss prevention policies
- Configure data loss prevention policies for Adaptive Protection
- Interpret policy and rule precedence in data loss prevention
- Create file policies in Microsoft Defender for Cloud Apps by using a DLP policy
Implement and monitor Microsoft Purview Endpoint DLP
- Specify device requirements for Endpoint DLP, including extensions
- Configure Endpoint DLP settings
- Configure advanced DLP rules for devices in DLP policies
- Configure just-in-time protection
- Monitor endpoint activities
Implement and manage retention
- Plan for information retention and disposition by using retention labels
- Concepts of Retention Policies vs Retention Labels vs Retention Label Policies
- Create, configure, and manage adaptive scopes
- Create retention labels for data lifecycle management
- Configure a retention label policy to publish labels
- Configure a retention label policy to auto-apply labels
- Interpret the results of policy precedence, including using Policy lookup
- Create and configure retention policies
- Recover retained content in Microsoft 365
Implement and manage Microsoft Purview Insider Risk Management
- Implement roles and permissions for Insider Risk Management
- Plan for Insider Risk Management in Microsoft 365
- Plan and implement Insider Risk Management connectors
- Plan integration with Microsoft Defender for Endpoint
- Configure and manage Insider Risk Management settings
- Configure policy indicators
- Select an appropriate policy template
- Create and manage Insider Risk Management policies
- Manage forensic evidence settings
- Enable and configure insider risk levels for Adaptive Protection
- Manage insider risk alerts and cases
- Manage Insider Risk Management workflow, including notice templates
Manage information security alerts and activities
- Assign Microsoft Purview Audit (Premium) user licenses
- Investigate activities by using Microsoft Purview Audit
- Configure audit retention policies
- Analyze Purview activities by using activity explorer
- Respond to data loss prevention alerts in the Microsoft Purview portal
- Investigate insider risk activities by using the Microsoft Purview portal
- Respond to Purview alerts in Microsoft Defender XDR
- Respond to Defender for Cloud Apps file policy alerts
- Perform searches by using Content search
Protect data used by AI services
- Implement controls in Microsoft Purview in an environment that uses AI services
- Implement controls in MS 365 productivity workloads in environments that use AI
- Deploying a Windows 11 virtual machine for the lab
- Implement pre-requisites for DSPM for AI along with roles and permissions
- Configure DSPM for AI policies
- Delete the Windows 11 virtual machine stored in Azure
- Monitor activities in DSPM for AI