In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats.
You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.
After completing this course, learners should be able to
Microsoft 365 Security Metrics
Microsoft 365 Security Services
Microsoft 365 Threat Intelligence
Data Governance in Microsoft 365
Archiving and Retention in Office 365
Data Governance in Microsoft 365 Intelligence
Search and Investigations
Device Management
Windows 10 Deployment Strategies
Mobile Device Management
Introduction to Microsoft 365 Security Metrics
Threat Vectors and Data Breaches
Zero Trust Model
Security Solutions in Microsoft 365
Microsoft Secure Score
Introduction to Azure Active Directory Identity Protection
Privileged Identity Management
Managing Microsoft 365 Security Services
Security Dashboard Overview
Exchange Online Protection (EOP)
Microsoft Defender for Office 365
Safe Attachments
Safe Links
Advanced Threat Protection Overview
Microsoft 365 Threat Intelligence
Advanced Threat Analytics Configuration
Monitoring and Security Reports
Cloud Application Security Implementation
Data Governance in Microsoft 365
Archiving in Microsoft 365
Retention in Microsoft 365
Information Rights Management (IRM)
S/MIME Introduction
Office 365 Message Encryption
Data Loss Prevention (DLP)
Retention Policies in Compliance Center (SCC)
Archiving and Retention in Exchange
In-Place Records Management in SharePoint
Ethical Walls in Exchange Online
Compliance Center Solutions Overview
Implementing Data Governance Intelligence
Evaluating Compliance Readiness
Custom and Built-in DLP Policies
Policy Tips Configuration
Email Retention Management
Troubleshooting Data Governance
Azure Information Protection (AIP)
Advanced AIP Features
Windows Information Protection
Content Search in Compliance Center
Audit Log Investigations
Advanced eDiscovery Management
Device Management Planning
Co-management Introduction
Transition from Configuration Manager to Intune
Mobile Application Management (MAM)
Mobile Device Management (MDM)
Device Enrollment and Compliance
Windows 10 Deployment Scenarios
Windows Autopilot Implementation
Windows Analytics Introduction
Microsoft Store for Business
Windows Upgrade Troubleshooting
Subscription Activation Strategy