Skip to content
Latest Courses

Microsoft 365 Security Administration


Course
For information on how to enroll in this course, click below.
Contact us

Duration: 20 Hours
Level: Intermediate
Learning Mode : Live Online Instructor-Led Training
This course is designed for IT Professional working with the task of a M365 security administrator role. This course will help you implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. This exam will measure your ability to accomplish the following technical tasks: implement and manage identity and access; implement and manage threat protection; implement and manage information protection; and manage governance and compliance features in Microsoft 365."

Audience Profile

Microsoft 365 Security Administration is aimed at IT Professional working with the task of a M365 security administrator role. This role collaborates with the M365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization

  Skills Gained

Skills you gain with this exam are to implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. The Microsoft 365 Security Administrator proactively secures Microsoft 365 enterprise environments, responds to threats, performs investigations, and enforces data governance. The Microsoft 365 Security Administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders, and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization.
This exam measures your ability to accomplish the following technical tasks: implement and manage identity and access; implement and manage threat protection; implement and manage information protection; and manage governance and compliance features in Microsoft 365."

Pre-requisites

Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance. This role focuses on the Microsoft 365 environment and includes hybrid environments.

Course Agenda

Module 1: Microsoft 365 Built-in Compliance

Lessons

  • Compliance Manager
  • Service Trust Portal
  • Security and Compliance Center
  • Office 365 Secure Score
  • Office 365 Data Governance
  • Retention policies
  • Unified Labelling
  • Advanced Data Governance in Office 365

Module 2: Advanced Compliance in Microsoft 365

Lessons

  • Handling Third Party Data
  • Data Loss Prevention
  • Information Protection
  • eDiscovery and Litigation hold
  • Handling Data Subject Requests (DSR)

Module 3: Implementing Threat Protection using Microsoft Defender Solutions for Office 365 and Azure

Lessons

  • Microsoft Defender for Office 365 (O365 ATP)
  • Cloud App Security for Office 365 Overview

Module 4: Implementing Microsoft Cloud App Security

Lessons

  • Deploying Cloud App Security
  • Controlling your cloud apps with Policies
  • Troubleshooting Cloud App Security
  • Manage cloud app security alerts.
  • Describe the risk score in Cloud App Security.
  • Use the Cloud App Catalog.
  • Use the Cloud Discovery DashboardCloud App Security Overview

Module 5: Implementing Endpoint security using Microsoft Intune

Lessons

  • Protecting company data using application management
  • Deploy Mobile Device management
  • Manage Devices with MDM

Module 6: Protecting Windows 10 using Microsoft Defender for Windows

Lessons

  • Device Guard
  • Application Guard
  • Attack Surface Reduction
  • Endpoint Detection and Response

Module 7: Introduction to Azure Sentinel and Deep Dive on Correlation Rules, Threat Intelligence and KQL (Kusto Query Language)

Lessons

  • Azure sentinel architecture
  • Features and functionalities
  • Custom connectors
  • Correlation rules
  • Threat Intelligence
  • Kusto Query Language

Module 8: Investigating identity actions and Deep Dive into Threat Hunting

Lessons

  • Identity overview
  • Tackling identity with SIEM
  • Out of box identity analytics
  • Threat hunting process
  • Building Detections
  • SOC Incident Workflow
  • Triage and investigate an incident

Module 9: Cloud Security Posture Management with Azure Security Center

Lessons

  • Asset inventory and management tools
  • Secure score in Azure Security Center
  • Security Recommendations
  • Security policies
  • Azure security baseline
  • Cross-tenant management

Module 10: Managing and Responding to Security Incidents and Alerts in Azure Security Center

Lessons

  • Managing Security Incidents
  • Security alerts in Azure Security Center
  • Manage and respond to security alerts
  • Automate Responses to Recommendations

Here is the course outline:

1. Microsoft 365 Built-in Compliance

Here in this module we will discuss about compliance manager, security and compliance center also learn about Office 365 data governance and how to secure score.

2. Advanced Compliance in Microsoft 365

Here we will learn more about handling third party data, how to handle third party data and prevent them from loss. We will also learn how to handle Data Subject Requests (DSR).

3. Implementing Threat Protection using Microsoft Defender Solutions for Office 365 and Azure

Here in this module we will discuss about Microsoft Defender and Cloud App Security for Office 365.

4. Implementing Microsoft Cloud App Security

Here in this module we will learn about deploying Cloud App Security also how to control your cloud apps. Manage alerts and use the Cloud App catalog.

5. Implementing Endpoint security using Microsoft Intune

Here in this module we will learn how to protect company data using application management and manage Device with MDM.

6. Protecting Windows 10 using Microsoft Defender for Windows

Here in this module we will learn about Device Guard and Application Guard. We will also learn to use Microsoft Defender to protect your data in Windows 10.

7. Introduction to Azure Sentinel and Deep Dive on Correlation Rules, Threat Intelligence and KQL (K...

In this module we will discuss about Azure Sentinel Architecture. We will also learn about all the features and functionality which includes Threat Intelligence.

8. Investigating identity actions and Deep Dive into Threat Hunting

Here in this module we will learn about tackling identity with SIEM, threat hunting process, SOC Incident Workflow and also about triage. Learn to investigate an incident.

9. Cloud Security Posture Management with Azure Security Center

Here in this module we will discuss about Asset inventory and management tools. Look at ways to secure score in Azure Security Center. How to manage Cross-tenant.

10. Managing and Responding to Security Incidents and Alerts in Azure Security Center

Here in this module we will learn to manage and respond to Security Incidents and Alerts in Azure Security Center.

Back to top