We really hope you'll agree, this training is way more than the average course on Udemy!
Have access to the following:
- Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
- Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
- Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
- Welcome to the course!
- Foundation of Active Directory Domains
- A foundation for Remote Access, DMZs, and Virtualization
- A foundation of the Microsoft Cloud Services
- DO NOT SKIP: Azure AD has been renamed
- Creating a trial Microsoft 365/Azure Account
- DO NOT SKIP: Using assignments in the course
- Questions for John Christopher
User Identity administration as well as understanding PowerShell concepts
- Introduction to Creating and Managing User Identities
- The First Concept of Microsoft's Cloud
- Creating and Managing User Identities
- Working with guest users
- Understanding the foundational concepts of Microsoft PowerShell Administration
- Using PowerShell to Manage Microsoft 365 Cloud Resources
Working with Groups in Microsoft 365
- Group management in Microsoft 365
Password Lockout Management in Microsoft 365
- Introduction to Password Lockout Management in Microsoft 365
- Configuring the Password Lockout settings
Administrative units, Role Based Access Control and Privileged Identity Management (PIM)
- Concepts of administrative units
- Introduction to Assigning Roles
- Role permissions in Microsoft 365 and Entra ID (formerly Azure AD)
- Role groups in MS Defender and Microsoft Purview
- Understanding Privileged Identity Management (PIM)
- Configuring and implementing Privileged Identity Management (PIM)
Multi-Factor Authentication In Microsoft 365
- Introduction to Multi-Factor Authentication
- Implementing Multi-Factor Authentication
Self Service Password Reset (SSPR)
- Introduction to Self Service Password Reset (SSPR)
- Implementing and configure SSPR
Entra ID (formerly Azure AD) Identity Protection
- Intro to Entra Identity Protection ( Formerly Azure AD Identity Protection)
- Implementing Entra Identity Protection (formerly Azure AD Identity Protection)
Conditional Access and Compliance Policies
- Introduction to Conditional Access Policies
- Controlling access using Conditional Access Policies
- Understanding Device Compliance Policies
- Implementing Device Compliance Policies using Endpoint Manage (Intune)
Foundations of Microsoft 365 threat concepts and dashboards
- Concepts of the Zero Trust Model
- Introduction to Microsoft Defender
- Introduction to Microsoft Purview for compliance management
Microsoft Purview information protection and data lifecycle management
- Understanding Sensitivity Labels
- Implementing sensitive info types
- Implementing retention in Microsoft Purview
- Configuring sensitivity labels and sensitivity label policies
Managing Data Loss Prevention (DLP) in Microsoft Purview
- Introduction to Data Loss Prevention
- Implementing Data Loss Prevention in Microsoft 365
- Reviewing DLP alerts, events, and reports
Secure endpoints by using Microsoft Defender for Endpoint
- Plan a Microsoft Defender for Endpoint solution
- Defender for Endpoint configuration
Implement and manage Microsoft Defender for Office 365
- Introduction to Microsoft Defender for Office365 (formerly ATP)
- Implementing Defender for Office 365 policies
- Reviewing threats identified in Defender for Office 365
- Using attack simulations
Monitor Microsoft 365 Security with Microsoft Sentinel
- Understanding Azure Sentinel
- Connecting to Azure Sentinel
- Using Azure Sentinel
Implement and manage Microsoft Defender for Cloud Apps and Defender for Identity
- Plan Microsoft Defender for Cloud Apps implementation
- Manage entries in the Microsoft Defender for Cloud Apps catalog
- Configure Microsoft Defender Cloud Apps connectors
- Configure Microsoft Defender for Cloud Apps policies and templates
- Review Defender for Cloud App activity log
- Review, interpret and respond to Microsoft Defender for Cloud Apps
- Understanding Microsoft Defender for Identity
- Basic setup for Microsoft Defender for Identity
Microsoft Purview audit logs and reports
- Standard and Premium auditing concepts
- Plan for and configure auditing
- Investigating a unified audit log
- Using compliance manager along with looking at compliance reports
- Alert policies
- Using audit retention policies
Discover and respond to compliance queries in Microsoft 365
- Understanding eDiscovery Standard vs Premium
- Content search
- Creating an eDiscovery search
Microsoft Purview Communication Compliance
- Understanding communication compliance
- Communication compliance policy creation
- Communication compliance alerts and reports
Implement and manage Microsoft Purview Insider Risk Management
- Understanding insider risk management
- Insider risk management policy creation
- Insider risk activities, alerts, and reports
- Insider risk cases, forensic evidence settings, and notice templates