TOIT Training

Intermediate

MS-500: Microsoft 365 Security Administration

Overview
Curriculum

 

This instructor led, online training course includes how to secure user access to your organization’s resources. We will also discuss user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365 / Office 365.

Students will also learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management.

 

Curriculum

  • 14 Sections
  • 149 Lessons
  • 9h Duration
Expand All
Initial Security Steps
17 Lessons
  1. Create User accounts
  2. Secure User Accounts by
  3. Implementing a zero-trust security model
  4. Be able to describe zero trust security concepts
  5. How does zero trust security apply to hosts inside the network
  6. How does zero trust security apply to hosts outside the network
  7. Implementing a password policy for authentication
  8. What is multifactor authentication
  9. How to implement multi-factor authentication for O365
  10. Identity and Access management in Azure
  11. What is the purpose of Identity and Access management?
  12. Enabling Azure Identity Protection
  13. Assign Roles / Configure Privileged Identity Management
  14. Configure Directory Roles
  15. Activate Privileged Identity Management Roles
  16. Configure PIM Resource workflows
  17. Pull up an audit history for AZURE AD roles in PIM
Manage Directory Synchronization
11 Lessons
  1. Go in depth on authentication options for O365
  2. Directory Synchronization
  3. Explain what Directory Synchronization is
  4. Plan a scheme for Directory Synchronization
  5. Manage users and groups with directory synchronization
  6. AD Connect
  7. Be able to describe what AD connect is
  8. How to utilize Az AD connect
  9. Configure prerequisites
  10. Manage users
  11. Ability to describe what AD federation is and how it is used
Identity Access Management and RBAC
11 Lessons
  1. Conditional Access as a tool to manage device access
  2. Be able to explain Conditional Access
  3. Be able to explain Conditional Access Policies
  4. Be able to configure Conditional Access
  5. Manage Device Access to the network
  6. Be able to configure Multifactor Authentication Pilot for specific apps
  7. Be able to configure Multifactor Authentication Conditional Access
  8. How does a host from an external network gain access?
  9. RBAC
  10. Explain Role Based Access Control
  11. Configure RBAC
Microsoft 365: Threats & Mitigation
12 Lessons
  1. What techniques are used by attackers
  2. Via email
  3. To control resources
  4. Utilize Security Center to improve a Secure Score
  5. Describe the purpose of a Secure Score
  6. Describe the benefits of a Secure Score
  7. Detail secure score services
  8. Detail analysis of secure score services and how the helps threat mitigation
  9. How is secure score used to locate network security weaknesses?
  10. O365 ATP & Exchange Online Protection
  11. What protections do these services afford
  12. What threats are they set to avoid?
Microsoft 365 Exchange Online and ATP
10 Lessons
  1. Be able to describe message protection via:
  2. Exchange Online Protection
  3. Anti-malware pipeline during email analysis
  4. Azure Advanced Threat Protection
  5. Be able to configure Azure ATP
  6. Windows Defender Advance Threat Protection
  7. Be able to configure Defender ATP
  8. Be able to implement ATP Policies
  9. How to manage safe attachments
  10. How to manage safe links
Mitigating Threats via Microsoft Threat Management
13 Lessons
  1. Utilize the security dashboard & Azure Sentinel to mitigate threats
  2. Discuss Security Dashboards ability to give executives analytics
  3. On threats
  4. On trends
  5. How is azure Sentinel utilized in Microsoft 365?
  6. Advance Threat analytics
  7. What are the requirements for deployment?
  8. What is its function
  9. How to protect your tenant using threat explorer
  10. Investigating threats using threat explorer
  11. Be able to conduct simulated attacks
  12. Phishing
  13. Passwords
RM services & Encryption
10 Lessons
  1. Describe Information Rights
  2. Why does it need to be managed?
  3. Being able to validate information rights management
  4. Message encryption
  5. What options exist for encryption for M365
  6. What options exist for encryption of O365
  7. How are these enabled
  8. How is S/MIME utilized
  9. What is its purpose
  10. How is it configured
How to mitigate Data loss
10 Lessons
  1. What is data loss
  2. What is data loss prevention?
  3. How are policies utilized
  4. Be able to configure and implement DLP policies
  5. New rules
  6. Modify rules
  7. User Override a rule
  8. Manage policies
  9. Test MRM / DLP policies
  10. How are SharePoint Online properties created from documents
INFOSEC
8 Lessons
  1. Implementing AZ and/or Windows Information Protection
  2. What is information protection?
  3. How is it configured in Azure?
  4. Configure labels
  5. Configure polices
  6. How is it configured in Windows?
  7. Planning deployments of policies
  8. Configure AIP settings for services
Security in the Cloud
6 Lessons
  1. Be able to describe the function / purpose of Cloud App Security
  2. How is it deployed
  3. Enforcing control over apps with policies
  4. How it the Cloud App Catalogue used to increase Cloud App security
  5. Managing permissions
  6. How to interact with the Cloud Discovery dashboard
Archiving data related to Retention
13 Lessons
  1. Archiving and Retaining Data in Exchange and SharePoint
  2. Be able to start the compliance process
  3. Set policies
  4. How do policies function
  5. Set retention tags
  6. How to configure a useful retention tag
  7. What makes a retention tag not useful?
  8. Describe data retention functions in Exchange and SharePoint
  9. Define in place Archive
  10. Configure in-place archiving
  11. Enable
  12. Disable
  13. Define Records management
Data Governance
7 Lessons
  1. What is Data Governance
  2. What is the Compliance Manager?
  3. Plan requirements for compliance
  4. What capabilities does Compliance Manager provide
  5. What are Global Data Protection Regulations & Reading a report
  6. Considerations for DGPR implementation
  7. Managing DSR
Utilizing eDiscovery to search data
9 Lessons
  1. What is eDiscovery software and what are its purposes/ uses
  2. Describe advance eDiscovery
  3. Steps of eDiscovery configuration
  4. Searches
  5. How is a search of content exported?
  6. Audits
  7. Purpose of an Audit
  8. What components make up the audit log
  9. How to use log data to investigate
Mobile Device Management
12 Lessons
  1. Plan / Enroll / and Deploy:
  2. Mobile device management
  3. Be able to enable device management
  4. Be able to configure the management of Devices with MDM
  5. Establish domains
  6. Configure domains
  7. Manage policies for security
  8. Enroll devices into an MDM system / Intune
  9. Configure roles for managers
  10. Mobile app management
  11. Configure Intune / MAM deployment
  12. Considerations for securing a deployment

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

MS-500: Microsoft 365 Security Administration
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)