% Off Udemy Coupon - CoursesWyn

SC-401 Information Security Administrator Associate course

Get prepared for the SC-401 exam with instructor led labs and hands on simulations available 24/7

$9.99 (93% OFF)
Get Course Now

About This Course

<div>We really hope you'll agree, this training is way more then the average course on Udemy!</div><div><br></div><div>Have access to the following:</div><div><ul><li><span style="font-size: 1rem;">Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer</span></li><li><span style="font-size: 1rem;">Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material</span></li><li><span style="font-size: 1rem;">Instructor led hands on and simulations to practice that can be followed even if you have little to no experience</span></li></ul></div><div><br></div><div>TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:</div><div><span style="font-size: 1rem;">Introduction</span></div><div><ul><li><span style="font-size: 1rem;">Welcome to the course</span></li><li><span style="font-size: 1rem;">Understanding the Microsoft Environment</span></li><li><span style="font-size: 1rem;">A Solid Foundation of Active Directory Domains</span></li><li><span style="font-size: 1rem;">A Solid Foundation of RAS, DMZ, and Virtualization</span></li><li><span style="font-size: 1rem;">A Solid Foundation of the Microsoft Cloud Services</span></li><li><span style="font-size: 1rem;">Creating a free Microsoft 365 Azure AD Account</span></li><li><span style="font-size: 1rem;">Managing Microsoft 365 Services with PowerShell</span></li><li><span style="font-size: 1rem;">Connecting to Security and Compliance using PowerShell</span></li><li><span style="font-size: 1rem;">IMPORTANT Using Assignments in the course</span></li></ul></div><div><span style="font-size: 1rem;">Implement and manage data classification</span></div><div><ul><li><span style="font-size: 1rem;">Identify sensitive information requirements for an organization's data</span></li><li><span style="font-size: 1rem;">Translate sensitive information requirements into built-in or custom</span></li><li><span style="font-size: 1rem;">Create and manage custom sensitive info types</span></li><li><span style="font-size: 1rem;">Implement document fingerprinting</span></li><li><span style="font-size: 1rem;">Create and manage exact data match (EDM) classifiers</span></li><li><span style="font-size: 1rem;">What are trainable classifiers?</span></li><li><span style="font-size: 1rem;">Create and manage trainable classifiers</span></li><li><span style="font-size: 1rem;">Monitor data classification &amp; label by using data explorer &amp; content explorer</span></li><li><span style="font-size: 1rem;">Configure optical character recognition (OCR) support for sensitive info types</span></li></ul></div><div><span style="font-size: 1rem;">Implement and manage sensitivity labels in Microsoft Purview</span></div><div><ul><li><span style="font-size: 1rem;">Implement roles and permissions for administering sensitivity labels</span></li><li><span style="font-size: 1rem;">Define the concepts of sensitivity labels in Microsoft Purview</span></li><li><span style="font-size: 1rem;">Define and create sensitivity labels for items and containers</span></li><li><span style="font-size: 1rem;">Configure protection settings and content marking for sensitivity labels</span></li><li><span style="font-size: 1rem;">Configure and manage publishing policies for sensitivity labels</span></li><li><span style="font-size: 1rem;">Configure and manage auto-labeling policies for sensitivity labels</span></li><li><span style="font-size: 1rem;">Apply a sensitivity label to containers, such as Teams, SharePoint etc</span></li><li><span style="font-size: 1rem;">Apply sensitivity labels manually using Microsoft Word</span></li><li><span style="font-size: 1rem;">Understanding Microsoft Defender for Cloud Apps</span></li><li><span style="font-size: 1rem;">Apply sensitivity labels by using Microsoft Defender for Cloud Apps</span></li></ul></div><div><span style="font-size: 1rem;">Implement information protection for Windows, file shares, and Exchange</span></div><div><ul><li><span style="font-size: 1rem;">Plan the Microsoft Purview Information Protection client</span></li><li><span style="font-size: 1rem;">Implement the Microsoft Purview Information Protection client</span></li><li><span style="font-size: 1rem;">Manage files by using the Microsoft Purview Information Protection client</span></li><li><span style="font-size: 1rem;">Apply bulk classifications with Microsoft Purview Information Protection scanner</span></li><li><span style="font-size: 1rem;">Removing the Azure virtual machine that is no longer needed</span></li><li><span style="font-size: 1rem;">Design solutions for email Encryption in Microsoft 365</span></li><li><span style="font-size: 1rem;">Implement Microsoft Purview Message Encryption</span></li><li><span style="font-size: 1rem;">Implement Microsoft Purview Advanced Message Encryption</span></li></ul></div><div><span style="font-size: 1rem;">Create and configure data loss prevention policies</span></div><div><ul><li><span style="font-size: 1rem;">Design data loss prevention policies based on an organization’s requirements</span></li><li><span style="font-size: 1rem;">Implement roles and permissions for data loss prevention</span></li><li><span style="font-size: 1rem;">Create and manage data loss prevention policies</span></li><li><span style="font-size: 1rem;">Configure data loss prevention policies for Adaptive Protection</span></li><li><span style="font-size: 1rem;">Interpret policy and rule precedence in data loss prevention</span></li><li><span style="font-size: 1rem;">Create file policies in Microsoft Defender for Cloud Apps by using a DLP policy</span></li></ul></div><div><span style="font-size: 1rem;">Implement and monitor Microsoft Purview Endpoint DLP</span></div><div><ul><li><span style="font-size: 1rem;">Specify device requirements for Endpoint DLP, including extensions</span></li><li><span style="font-size: 1rem;">Configure Endpoint DLP settings</span></li><li><span style="font-size: 1rem;">Configure advanced DLP rules for devices in DLP policies</span></li><li><span style="font-size: 1rem;">Configure just-in-time protection</span></li><li><span style="font-size: 1rem;">Monitor endpoint activities</span></li></ul></div><div><span style="font-size: 1rem;">Implement and manage retention</span></div><div><ul><li><span style="font-size: 1rem;">Plan for information retention and disposition by using retention labels</span></li><li><span style="font-size: 1rem;">Concepts of Retention Policies vs Retention Labels vs Retention Label Policies</span></li><li><span style="font-size: 1rem;">Create, configure, and manage adaptive scopes</span></li><li><span style="font-size: 1rem;">Create retention labels for data lifecycle management</span></li><li><span style="font-size: 1rem;">Configure a retention label policy to publish labels</span></li><li><span style="font-size: 1rem;">Configure a retention label policy to auto-apply labels</span></li><li><span style="font-size: 1rem;">Interpret the results of policy precedence, including using Policy lookup</span></li><li><span style="font-size: 1rem;">Create and configure retention policies</span></li><li><span style="font-size: 1rem;">Recover retained content in Microsoft 365</span></li></ul></div><div><span style="font-size: 1rem;">Implement and manage Microsoft Purview Insider Risk Management</span></div><div><ul><li><span style="font-size: 1rem;">Implement roles and permissions for Insider Risk Management</span></li><li><span style="font-size: 1rem;">Plan for Insider Risk Management in Microsoft 365</span></li><li><span style="font-size: 1rem;">Plan and implement Insider Risk Management connectors</span></li><li><span style="font-size: 1rem;">Plan integration with Microsoft Defender for Endpoint</span></li><li><span style="font-size: 1rem;">Configure and manage Insider Risk Management settings</span></li><li><span style="font-size: 1rem;">Configure policy indicators</span></li><li><span style="font-size: 1rem;">Select an appropriate policy template</span></li><li><span style="font-size: 1rem;">Create and manage Insider Risk Management policies</span></li><li><span style="font-size: 1rem;">Manage forensic evidence settings</span></li><li><span style="font-size: 1rem;">Enable and configure insider risk levels for Adaptive Protection</span></li><li><span style="font-size: 1rem;">Manage insider risk alerts and cases</span></li><li><span style="font-size: 1rem;">Manage Insider Risk Management workflow, including notice templates</span></li></ul></div><div><span style="font-size: 1rem;">Manage information security alerts and activities</span></div><div><ul><li><span style="font-size: 1rem;">Assign Microsoft Purview Audit (Premium) user licenses</span></li><li><span style="font-size: 1rem;">Investigate activities by using Microsoft Purview Audit</span></li><li><span style="font-size: 1rem;">Configure audit retention policies</span></li><li><span style="font-size: 1rem;">Analyze Purview activities by using activity explorer</span></li><li><span style="font-size: 1rem;">Respond to data loss prevention alerts in the Microsoft Purview portal</span></li><li><span style="font-size: 1rem;">Investigate insider risk activities by using the Microsoft Purview portal</span></li><li><span style="font-size: 1rem;">Respond to Purview alerts in Microsoft Defender XDR</span></li><li><span style="font-size: 1rem;">Respond to Defender for Cloud Apps file policy alerts</span></li><li><span style="font-size: 1rem;">Perform searches by using Content search</span></li></ul></div><div><span style="font-size: 1rem;">Protect data used by AI services</span></div><div><ul><li><span style="font-size: 1rem;">Implement controls in Microsoft Purview in an environment that uses AI services</span></li><li><span style="font-size: 1rem;">Implement controls in MS 365 productivity workloads in environments that use AI</span></li><li><span style="font-size: 1rem;">Deploying a Windows 11 virtual machine for the lab</span></li><li><span style="font-size: 1rem;">Implement pre-requisites for DSPM for AI along with roles and permissions</span></li><li><span style="font-size: 1rem;">Configure DSPM for AI policies</span></li><li><span style="font-size: 1rem;">Delete the Windows 11 virtual machine stored in Azure</span></li><li><span style="font-size: 1rem;">Monitor activities in DSPM for AI</span></li></ul></div>

What you'll learn:

  • Learn the concepts and perform hands on activities needed to pass the SC-401 exam
  • Gain a tremendous amount of knowledge involving Microsoft 365 and Azure Services
  • Get loads of hands on experience with Microsoft Information Security Administration!
  • Utilize hands on simulations that can be access anytime, anywhere!