What you'll learn:
- Learn the concepts and perform hands on activities needed to master Microsoft 365 Security
- Gain a tremendous amount of knowledge involving Securing Microsoft 365 and Azure Services
- Get loads of hands on experience with securing Microsoft 365 and Azure AD
- Utilize hands on simulations that can be access anytime, anywhere!
We really hope you'll agree, this training is way more than the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVEREDINCLUDINGHANDSONLECTUREANDPRACTICETUTORIALS:
Introduction
Welcome to the course!
Foundation of Active Directory Domains
A foundation for Remote Access, DMZs, and Virtualization
A foundation of the Microsoft Cloud Services
DO NOT SKIP: Azure AD is being renamed
Creating a trial Microsoft 365/Azure Account
DO NOT SKIP: Using assignments in the course
Questions for John Christopher
User Identity administration as well as understanding PowerShell concepts
The First Concept of Microsoft's Cloud
Introduction to Creating and Managing User Identities
Creating and Managing User Identities
Working with guest users
Understanding the foundational concepts of Microsoft PowerShell Administration
Concepts of Microsoft Graph vs Traditional PowerShell
Installing and connecting to MS Graph to support cloud services with PowerShell
Using PowerShell with MS Graph to manage Entra ID (formerly Azure AD)
Working with Groups in Microsoft 365
Concepts of Groups in Microsoft 365 and Azure Entra ID
Group management in Microsoft 365
Authentication and Password Management in Microsoft 365
Understanding authentication in Microsoft Entra
Configure and manage authentication
Managing Password Settings
Configure self-service password reset (SSPR)
Administrative units, Role Based Access Control and Privileged Identity Management (PIM)
Concepts of administrative units
Implementing administrative units
Introduction to Assigning Roles
Role management in Microsoft Azure Entra ID
Role management in Microsoft 365
Understanding Privileged Identity Management (PIM)
Configuring and implementing Privileged Identity Management (PIM)
Multi-Factor Authentication In Microsoft 365
Introduction to Multi-Factor Authentication
Implementing Multi-Factor Authentication
Entra ID (formerly Azure AD) Identity Protection
Intro to Entra Identity Protection
Implementing Entra Identity Protection
Managing Conditional Access
Introduction to Conditional Access Policies
Controlling access using Conditional Access Policies
How to test Conditional Access policies
How to create a Conditional Access policy from a template
Introduction to Microsoft 365 Defender and Purview
Concepts of the Zero Trust Model
What is Microsoft 365 Defender?
Introduction to the Microsoft Defender portal
Protecting sensitive information with Purview
Compliance blade renamed to Microsoft Purview
Introduction to Microsoft Purview for compliance management
Sensitive information protection and retention with Microsoft Purview
Understanding Sensitivity Labels
Implementing sensitive info types
Working with permissions involving sensitivity labels
Configuring sensitivity labels
Managing sensitivity label protection settings and content marking
How to publish sensitivity labels in Microsoft Purview
Applying sensitivity labels manually from the user side
Concepts of information retention and disposition
Retention Policies vs Retention Labels vs Retention Label Policies
Creating adaptive scopes
Retention label creation
Retention label publishing with a label policy
Policy precedence when it comes to conflicts
Retention policy creation
Managing Data Loss Prevention (DLP) in Microsoft Purview
Introduction to Data Loss Prevention
Data loss prevention policy creation
Reviewing DLP alerts, events, and reports
Secure endpoints by using Microsoft Defender for Endpoint
Plan a Microsoft Defender for Endpoint solution
Defender for Endpoint configuration
Implement and manage Microsoft Defender for Office 365
Introduction to Microsoft Defender for Office365 formally ATP
Implementing Defender for Office 365 policies
Reviewing threats identified in Defender for Office 365
Using attack simulations
Monitor Microsoft 365 Security with Microsoft Sentinel
Understanding Microsoft Sentinel
Setting up a log analytics workspace for using Microsoft Sentinel
Sentinel log types, log retention and data storage
How to connect to data sources with Microsoft Sentinel
Concepts of Microsoft Defender for Cloud Apps
Plan Microsoft Defender for Cloud Apps implementation
Working with Defender for Cloud app alerts, policies, and Cloud App Discovery
Microsoft Purview audit logs and content searches
License concepts for Microsoft Purview Audit (Premium)
Microsoft Purview Audit activities
Using audit retention policies
Utilizing Purview activity explorer
Performing content searches in Microsoft 365
Microsoft Purview Communication Compliance and Insider Risk Management
Concepts of Microsoft Purview Communication Compliance & Insider Risk Management
Using communication compliance in Microsoft Purview
Using Insider Risk Management connectors
Creating an insider risk policy