% Off Udemy Coupon - CoursesWyn

Microsoft 365 Security Admin Course with practice SIMs

Learn how to expertly administer Microsoft 365 Security with lecture and hands on simulations available 24/7

$9.99 (90% OFF)
Get Course Now

About This Course

<div>We really hope you'll agree, this training is way more than the average course on Udemy!</div><div><br></div><div>Have access to the following:</div><div><ul><li><span style="font-size: 1rem;">Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer</span></li><li><span style="font-size: 1rem;">Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material</span></li><li><span style="font-size: 1rem;">Instructor led hands on and simulations to practice that can be followed even if you have little to no experience</span></li></ul></div><div><br></div><div>TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:</div><div><span style="font-size: 1rem;">Introduction</span></div><div><ul><li><span style="font-size: 1rem;">Welcome to the course!</span></li><li><span style="font-size: 1rem;">Foundation of Active Directory Domains</span></li><li><span style="font-size: 1rem;">A foundation for Remote Access, DMZs, and Virtualization</span></li><li><span style="font-size: 1rem;">A foundation of the Microsoft Cloud Services</span></li><li><span style="font-size: 1rem;">DO NOT SKIP: Azure AD is being renamed</span></li><li><span style="font-size: 1rem;">Creating a trial Microsoft 365/Azure Account</span></li><li><span style="font-size: 1rem;">DO NOT SKIP: Using assignments in the course</span></li><li><span style="font-size: 1rem;">Questions for John Christopher</span></li></ul></div><div><span style="font-size: 1rem;">User Identity administration as well as understanding PowerShell concepts</span></div><div><ul><li><span style="font-size: 1rem;">The First Concept of Microsoft's Cloud</span></li><li><span style="font-size: 1rem;">Introduction to Creating and Managing User Identities</span></li><li><span style="font-size: 1rem;">Creating and Managing User Identities</span></li><li><span style="font-size: 1rem;">Working with guest users</span></li><li><span style="font-size: 1rem;">Understanding the foundational concepts of Microsoft PowerShell Administration</span></li><li><span style="font-size: 1rem;">Concepts of Microsoft Graph vs Traditional PowerShell</span></li><li><span style="font-size: 1rem;">Installing and connecting to MS Graph to support cloud services with PowerShell</span></li><li><span style="font-size: 1rem;">Using PowerShell with MS Graph to manage Entra ID (formerly Azure AD)</span></li></ul></div><div><span style="font-size: 1rem;">Working with Groups in Microsoft 365</span></div><div><ul><li><span style="font-size: 1rem;">Concepts of Groups in Microsoft 365 and Azure Entra ID</span></li><li><span style="font-size: 1rem;">Group management in Microsoft 365</span></li></ul></div><div><span style="font-size: 1rem;">Authentication and Password Management in Microsoft 365</span></div><div><ul><li><span style="font-size: 1rem;">Understanding authentication in Microsoft Entra</span></li><li><span style="font-size: 1rem;">Configure and manage authentication</span></li><li><span style="font-size: 1rem;">Managing Password Settings</span></li><li><span style="font-size: 1rem;">Configure self-service password reset (SSPR)</span></li></ul></div><div><span style="font-size: 1rem;">Administrative units, Role Based Access Control and Privileged Identity Management (PIM)</span></div><div><ul><li><span style="font-size: 1rem;">Concepts of administrative units</span></li><li><span style="font-size: 1rem;">Implementing administrative units</span></li><li><span style="font-size: 1rem;">Introduction to Assigning Roles</span></li><li><span style="font-size: 1rem;">Role management in Microsoft Azure Entra ID</span></li><li><span style="font-size: 1rem;">Role management in Microsoft 365</span></li><li><span style="font-size: 1rem;">Understanding Privileged Identity Management (PIM)</span></li><li><span style="font-size: 1rem;">Configuring and implementing Privileged Identity Management (PIM)</span></li></ul></div><div><span style="font-size: 1rem;">Multi-Factor Authentication In Microsoft 365</span></div><div><ul><li><span style="font-size: 1rem;">Introduction to Multi-Factor Authentication</span></li><li><span style="font-size: 1rem;">Implementing Multi-Factor Authentication</span></li></ul></div><div><span style="font-size: 1rem;">Entra ID (formerly Azure AD) Identity Protection</span></div><div><ul><li><span style="font-size: 1rem;">Intro to Entra Identity Protection</span></li><li><span style="font-size: 1rem;">Implementing Entra Identity Protection</span></li></ul></div><div><span style="font-size: 1rem;">Managing Conditional Access</span></div><div><ul><li><span style="font-size: 1rem;">Introduction to Conditional Access Policies</span></li><li><span style="font-size: 1rem;">Controlling access using Conditional Access Policies</span></li><li><span style="font-size: 1rem;">How to test Conditional Access policies</span></li><li><span style="font-size: 1rem;">How to create a Conditional Access policy from a template</span></li></ul></div><div><span style="font-size: 1rem;">Introduction to Microsoft 365 Defender and Purview</span></div><div><ul><li><span style="font-size: 1rem;">Concepts of the Zero Trust Model</span></li><li><span style="font-size: 1rem;">What is Microsoft 365 Defender?</span></li><li><span style="font-size: 1rem;">Introduction to the Microsoft Defender portal</span></li><li><span style="font-size: 1rem;">Protecting sensitive information with Purview</span></li><li><span style="font-size: 1rem;">Compliance blade renamed to Microsoft Purview</span></li><li><span style="font-size: 1rem;">Introduction to Microsoft Purview for compliance management</span></li></ul></div><div><span style="font-size: 1rem;">Sensitive information protection and retention with Microsoft Purview</span></div><div><ul><li><span style="font-size: 1rem;">Understanding Sensitivity Labels</span></li><li><span style="font-size: 1rem;">Implementing sensitive info types</span></li><li><span style="font-size: 1rem;">Working with permissions involving sensitivity labels</span></li><li><span style="font-size: 1rem;">Configuring sensitivity labels</span></li><li><span style="font-size: 1rem;">Managing sensitivity label protection settings and content marking</span></li><li><span style="font-size: 1rem;">How to publish sensitivity labels in Microsoft Purview</span></li><li><span style="font-size: 1rem;">Applying sensitivity labels manually from the user side</span></li><li><span style="font-size: 1rem;">Concepts of information retention and disposition</span></li><li><span style="font-size: 1rem;">Retention Policies vs Retention Labels vs Retention Label Policies</span></li><li><span style="font-size: 1rem;">Creating adaptive scopes</span></li><li><span style="font-size: 1rem;">Retention label creation</span></li><li><span style="font-size: 1rem;">Retention label publishing with a label policy</span></li><li><span style="font-size: 1rem;">Policy precedence when it comes to conflicts</span></li><li><span style="font-size: 1rem;">Retention policy creation</span></li></ul></div><div><span style="font-size: 1rem;">Managing Data Loss Prevention (DLP) in Microsoft Purview</span></div><div><ul><li><span style="font-size: 1rem;">Introduction to Data Loss Prevention</span></li><li><span style="font-size: 1rem;">Data loss prevention policy creation</span></li><li><span style="font-size: 1rem;">Reviewing DLP alerts, events, and reports</span></li></ul></div><div><span style="font-size: 1rem;">Secure endpoints by using Microsoft Defender for Endpoint</span></div><div><ul><li><span style="font-size: 1rem;">Plan a Microsoft Defender for Endpoint solution</span></li><li><span style="font-size: 1rem;">Defender for Endpoint configuration</span></li></ul></div><div><span style="font-size: 1rem;">Implement and manage Microsoft Defender for Office 365</span></div><div><ul><li><span style="font-size: 1rem;">Introduction to Microsoft Defender for Office365 formally ATP</span></li><li><span style="font-size: 1rem;">Implementing Defender for Office 365 policies</span></li><li><span style="font-size: 1rem;">Reviewing threats identified in Defender for Office 365</span></li><li><span style="font-size: 1rem;">Using attack simulations</span></li></ul></div><div><span style="font-size: 1rem;">Monitor Microsoft 365 Security with Microsoft Sentinel</span></div><div><ul><li><span style="font-size: 1rem;">Understanding Microsoft Sentinel</span></li><li><span style="font-size: 1rem;">Setting up a log analytics workspace for using Microsoft Sentinel</span></li><li><span style="font-size: 1rem;">Sentinel log types, log retention and data storage</span></li><li><span style="font-size: 1rem;">How to connect to data sources with Microsoft Sentinel</span></li></ul></div><div><span style="font-size: 1rem;">Concepts of Microsoft Defender for Cloud Apps</span></div><div><ul><li><span style="font-size: 1rem;">Plan Microsoft Defender for Cloud Apps implementation</span></li><li><span style="font-size: 1rem;">Working with Defender for Cloud app alerts, policies, and Cloud App Discovery</span></li></ul></div><div><span style="font-size: 1rem;">Microsoft Purview audit logs and content searches</span></div><div><ul><li><span style="font-size: 1rem;">License concepts for Microsoft Purview Audit (Premium)</span></li><li><span style="font-size: 1rem;">Microsoft Purview Audit activities</span></li><li><span style="font-size: 1rem;">Using audit retention policies</span></li><li><span style="font-size: 1rem;">Utilizing Purview activity explorer</span></li><li><span style="font-size: 1rem;">Performing content searches in Microsoft 365</span></li></ul></div><div><span style="font-size: 1rem;">Microsoft Purview Communication Compliance and Insider Risk Management</span></div><div><ul><li><span style="font-size: 1rem;">Concepts of Microsoft Purview Communication Compliance &amp; Insider Risk Management</span></li><li><span style="font-size: 1rem;">Using communication compliance in Microsoft Purview</span></li><li><span style="font-size: 1rem;">Using Insider Risk Management connectors</span></li><li><span style="font-size: 1rem;">Creating an insider risk policy</span></li></ul></div>

What you'll learn:

  • Learn the concepts and perform hands on activities needed to master Microsoft 365 Security
  • Gain a tremendous amount of knowledge involving Securing Microsoft 365 and Azure Services
  • Get loads of hands on experience with securing Microsoft 365 and Azure AD
  • Utilize hands on simulations that can be access anytime, anywhere!