Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udemy

Microsoft 365 Security Admin Course with practice SIMs

via Udemy

Overview

Learn how to expertly administer Microsoft 365 Security with lecture and hands on simulations available 24/7

What you'll learn:
  • Learn the concepts and perform hands on activities needed to master Microsoft 365 Security
  • Gain a tremendous amount of knowledge involving Securing Microsoft 365 and Azure Services
  • Get loads of hands on experience with securing Microsoft 365 and Azure AD
  • Utilize hands on simulations that can be access anytime, anywhere!

We really hope you'll agree, this training is way more than the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVEREDINCLUDINGHANDSONLECTUREANDPRACTICETUTORIALS:

Introduction

  • Welcome to the course!

  • Foundation of Active Directory Domains

  • A foundation for Remote Access, DMZs, and Virtualization

  • A foundation of the Microsoft Cloud Services

  • DO NOT SKIP: Azure AD is being renamed

  • Creating a trial Microsoft 365/Azure Account

  • DO NOT SKIP: Using assignments in the course

  • Questions for John Christopher

User Identity administration as well as understanding PowerShell concepts

  • The First Concept of Microsoft's Cloud

  • Introduction to Creating and Managing User Identities

  • Creating and Managing User Identities

  • Working with guest users

  • Understanding the foundational concepts of Microsoft PowerShell Administration

  • Concepts of Microsoft Graph vs Traditional PowerShell

  • Installing and connecting to MS Graph to support cloud services with PowerShell

  • Using PowerShell with MS Graph to manage Entra ID (formerly Azure AD)

Working with Groups in Microsoft 365

  • Concepts of Groups in Microsoft 365 and Azure Entra ID

  • Group management in Microsoft 365

Authentication and Password Management in Microsoft 365

  • Understanding authentication in Microsoft Entra

  • Configure and manage authentication

  • Managing Password Settings

  • Configure self-service password reset (SSPR)

Administrative units, Role Based Access Control and Privileged Identity Management (PIM)

  • Concepts of administrative units

  • Implementing administrative units

  • Introduction to Assigning Roles

  • Role management in Microsoft Azure Entra ID

  • Role management in Microsoft 365

  • Understanding Privileged Identity Management (PIM)

  • Configuring and implementing Privileged Identity Management (PIM)

Multi-Factor Authentication In Microsoft 365

  • Introduction to Multi-Factor Authentication

  • Implementing Multi-Factor Authentication

Entra ID (formerly Azure AD) Identity Protection

  • Intro to Entra Identity Protection

  • Implementing Entra Identity Protection

Managing Conditional Access

  • Introduction to Conditional Access Policies

  • Controlling access using Conditional Access Policies

  • How to test Conditional Access policies

  • How to create a Conditional Access policy from a template

Introduction to Microsoft 365 Defender and Purview

  • Concepts of the Zero Trust Model

  • What is Microsoft 365 Defender?

  • Introduction to the Microsoft Defender portal

  • Protecting sensitive information with Purview

  • Compliance blade renamed to Microsoft Purview

  • Introduction to Microsoft Purview for compliance management

Sensitive information protection and retention with Microsoft Purview

  • Understanding Sensitivity Labels

  • Implementing sensitive info types

  • Working with permissions involving sensitivity labels

  • Configuring sensitivity labels

  • Managing sensitivity label protection settings and content marking

  • How to publish sensitivity labels in Microsoft Purview

  • Applying sensitivity labels manually from the user side

  • Concepts of information retention and disposition

  • Retention Policies vs Retention Labels vs Retention Label Policies

  • Creating adaptive scopes

  • Retention label creation

  • Retention label publishing with a label policy

  • Policy precedence when it comes to conflicts

  • Retention policy creation

Managing Data Loss Prevention (DLP) in Microsoft Purview

  • Introduction to Data Loss Prevention

  • Data loss prevention policy creation

  • Reviewing DLP alerts, events, and reports

Secure endpoints by using Microsoft Defender for Endpoint

  • Plan a Microsoft Defender for Endpoint solution

  • Defender for Endpoint configuration

Implement and manage Microsoft Defender for Office 365

  • Introduction to Microsoft Defender for Office365 formally ATP

  • Implementing Defender for Office 365 policies

  • Reviewing threats identified in Defender for Office 365

  • Using attack simulations

Monitor Microsoft 365 Security with Microsoft Sentinel

  • Understanding Microsoft Sentinel

  • Setting up a log analytics workspace for using Microsoft Sentinel

  • Sentinel log types, log retention and data storage

  • How to connect to data sources with Microsoft Sentinel

Concepts of Microsoft Defender for Cloud Apps

  • Plan Microsoft Defender for Cloud Apps implementation

  • Working with Defender for Cloud app alerts, policies, and Cloud App Discovery

Microsoft Purview audit logs and content searches

  • License concepts for Microsoft Purview Audit (Premium)

  • Microsoft Purview Audit activities

  • Using audit retention policies

  • Utilizing Purview activity explorer

  • Performing content searches in Microsoft 365

Microsoft Purview Communication Compliance and Insider Risk Management

  • Concepts of Microsoft Purview Communication Compliance & Insider Risk Management

  • Using communication compliance in Microsoft Purview

  • Using Insider Risk Management connectors

  • Creating an insider risk policy

Syllabus

  • Introduction to the course
  • User Identity administration as well as understanding PowerShell concepts
  • Working with Groups in Microsoft 365
  • Password Lockout Management in Microsoft 365
  • Administrative units, Role Based Access Control & Privileged Identity Management
  • Multi-Factor Authentication In Microsoft 365
  • Self Service Password Reset (SSPR)
  • Entra Identity Protection (formerly Azure AD Identity Protection)
  • Conditional Access and Compliance Policies
  • Foundations of Microsoft 365 threat concepts and dashboards
  • Microsoft Purview information protection and data lifecycle management
  • Managing Data Loss Prevention (DLP) in Microsoft Purview
  • Secure endpoints by using Microsoft Defender for Endpoint
  • Implement and manage Microsoft Defender for Office 365
  • Monitor Microsoft 365 Security with Microsoft Sentinel
  • Implement and manage Microsoft Defender for Cloud Apps and Defender for Identity
  • Microsoft Purview audit logs and reports
  • Discover and respond to compliance queries in Microsoft 365
  • Microsoft Purview Communication Compliance
  • Implement and manage Microsoft Purview Insider Risk Management
  • FINAL - Where do I go from here?

Taught by

John Christopher | 490,000+ enrollments

Reviews

4.6 rating at Udemy based on 4823 ratings

Start your review of Microsoft 365 Security Admin Course with practice SIMs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.