Szkolenia Microsoft

Cel szkolenia

This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center. Now that you understand the key aspects of data governance, you will examine how to implement them, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. You will then focus on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection. You will conclude this section by learning how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery. The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management. At this point, you will transition from planning to implementing device management; specifically, your Windows 10 deployment strategy. This includes learning how to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). When examining MDM, you will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.

Audience profile
This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.

At course completion:
By actively participating in this course, you will learn about the following:

  • Microsoft 365 Security Metrics
  • Microsoft 365 Security Services
  • Microsoft 365 Threat Intelligence
  • Data Governance in Microsoft 365
  • Archiving and Retention in Office 365
  • Data Governance in Microsoft 365 Intelligence
  • Search and Investigations
  • Device Management
  • Windows 10 Deployment Strategies
  • Mobile Device Management

Plan szkolenia Rozwiń listę

  1. Introduction to Microsoft 365 Security MetricsLessons
    • Threat Vectors and Data Breaches
    • Security Solutions in Microsoft 365
    • Introduction to the Secure Score
    • Introduction to Azure Active Directory Identity Protection
  2. Managing Your Microsoft 365 Security ServicesLessons
    • Introduction to Exchange Online Protection
    • Introduction to Advanced Threat Protection
    • Managing Safe Attachments
    • Managing Safe Links
    • Monitoring and Reports
  3. Lab 1 - Manage Microsoft 365 Security ServicesLab : Manage Microsoft 365 Security Services
    • Exercise 1 - Set up a Microsoft 365 Trial Tenant
    • Exercise 2 - Implement an ATP Safe Links policy and Safe Attachment policy
  4. Microsoft 365 Threat IntelligenceLessons
    • Overview of Microsoft 365 Threat Intelligence
    • Using the Security Dashboard
    • Configuring Advanced Threat Analytics
    • Implementing Your Cloud Application Security
  5. Lab 2 - Implement Alert Notifications Using the Security DashboardLab : Implement Alert Notifications Using the Security Dashboard
    • Exercise 1 - Prepare for implementing Alert Policies
    • Exercise 2 - Implement Security Alert Notifications
    • Exercise 3 - Implement Group Alerts
    • Exercise 4 - Implement eDiscovery Alerts
  6. Introduction to Data Governance in Microsoft 365Lessons
    • Introduction to Archiving in Microsoft 365
    • Introduction to Retention in Microsoft 365
    • Introduction to Information Rights Management
    • Introduction to Secure Multipurpose Internet Mail Extension
    • Introduction to Office 365 Message Encryption
    • Introduction to Data Loss Prevention
  7. Archiving and Retention in Office 365Lessons
    • In-Place Records Management in SharePoint
    • Archiving and Retention in Exchange
    • Retention Policies in the SCC
  8. Lab 3 - Implement Archiving and RetentionLab : Implement Archiving and Retention
    • Exercise 1 - Initialize Compliance in Your Organization
    • Exercise 2 - Configure Retention Tags and Policies
    • Exercise 3 - Implement Retention Policies
  9. Implementing Data Governance in Microsoft 365 IntelligenceLessons
    • Planning Your Security and Complaince Needs
    • Building Ethical Walls in Exchange Online
    • Creating a Simple DLP Policy from a Built-in Template
    • Creating a Custom DLP Policy
    • Creating a DLP Policy to Protect Documents
    • Working with Policy Tips
  10. Lab 4 - Implement DLP PoliciesLab : Implement DLP Policies
    • Exercise 1 - Manage DLP Policies
    • Exercise 2 - Test MRM and DLP Policies
  11. Managing Data Governance in Microsoft 365Lessons
    • Managing Retention in Email
    • Troubleshooting Data Governance
    • Implementing Azure Information Protection
    • Implementing Advanced Features of AIP
    • Implementing Windows Information Protection
  12. Lab 5 - Implement AIP and WIPLab : Implement AIP and WIP
    • Exercise 1 - Implement Azure Information Protection
    • Exercise 2 - Implement Windows Information Protection
  13. Managing Search and InvestigationsLessons
    • Searching for Content in the Security and Compliance Center
    • Auditing Log Investigations
    • Managing Advanced eDiscovery
  14. Lab 6 - Manage Search and InvestigationsLab : Manage Search and Investigations
    • Exercise 1 - Investigate Your Microsoft 365 Data
    • Exercise 2 - Configure and Deploy a Data Subject Request
  15. Planning for Device ManagementLessons
    • Introduction to Co-management
    • Preparing Your Windows 10 Devices for Co-management
    • Transitioning from Configuration Manager to Intune
    • Introduction to Microsoft Store for Business
    • Planning for Mobile Application Management
  16. Lab 7 - Implement the Microsoft Store for BusinessLab : Implement the Microsoft Store for Business
    • Exercise 1 - Configure the Microsoft Store for Business
    • Exercise 2 - Manage the Microsoft Store for Business
  17. Planning Your Windows 10 Deployment StrategyLessons
    • Windows 10 Deployment Scenarios
    • Implementing Windows Autopilot
    • Planning Your Windows 10 Subscription Activation Strategy
    • Resolving Windows 10 Upgrade Errors
    • Introduction to Windows Analytics
  18. Implementing Mobile Device ManagementLessons
    • Planning Mobile Device Management
    • Deploying Mobile Device Management
    • Enrolling Devices to MDM
    • Managing Device Compliance
  19. Lab 8 - Manage Devices with IntuneLab : Manage Devices with Intune
    • Exercise 1 - Enable Device Management
    • Exercise 2 - Configure Azure AD for Intune
    • Exercise 3 - Create Intune Policies
    • Exercise 4 - Enroll a Windows 10 Device
    • Exercise 5 - Manage and Monitor a Device in Intune
Pobierz konspekt szkolenia w formacie PDF

Dodatkowe informacje

Wymagania
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.
Poziom trudności
Czas trwania 5 dni
Certyfikat

Uczestnicy szkolenia MS-101T00 Microsoft 365 Mobility and Security otrzymują certyfikat ukończenia autoryzowanego kursu Microsoft.

Prowadzący

Microsoft Certified Trainer.

Informacje dodatkowe

Zajęcia prowadzone są w języku polskim, materiały źródłowe oraz oprogramowanie są w języku angielskim.

Pozostałe szkolenia Microsoft | Microsoft 365: Szkolenia Pakietowe

Szkolenia powiązane tematycznie

Bezpieczeństwo IT

Cloud Computing

Formularz kontaktowy

Prosimy o wypełnienie poniższego formularza, jeśli chcą Państwo uzyskać więcej informacji o powyższym szkoleniu.






* pola oznaczone (*) są wymagane

Informacje o przetwarzaniu danych przez Compendium – Centrum Edukacyjne Spółka z o.o.

CENA 3600 PLN NETTO Czy wiesz, że możesz uzyskać do 100% dofinansowania na ten kurs?   Sprawdź jak »

zamknij

Kody rabatowe

Kod rabatowy, może dotyczyć (szkolenia, producenta, terminu). Jeżeli posiadasz kod rabatowy, to wpisz go w odpowiednie pole.
(kolor zielony oznacza wpisanie prawidłowego kodu | kolor czerwony oznacza, że wpisany kod jest nieprawidłowy)

FORMA SZKOLENIA ?

zamknij

Szkolenie stacjonarne

Szkolenia stacjonarne w Compendium CE odbywają się najczęściej w naszych lokalizacjach w Krakowie i Warszawie, ale także w miejscu ustalonym przez klienta. Grupa uczestnicząca w szkoleniu spotyka się w danym miejscu o określonym czasie i wraz z trenerem aktywnie uczestniczy w laboratoriach.

MATERIAŁY SZKOLENIOWE ?

zamknij

Materiały elektroniczne

Materiały elektroniczne: są to materiały szkoleniowe w wersji elektronicznej, które w zależności od dostawcy udostępniane są za pomocą dedykowanych aplikacji: Skillpipe, eVantage itd. lub w postaci dokumentów PDF.

Materiały ctab

Materiały ctab: cena zawiera tablet ctab oraz materiały szkoleniowe w formie elektronicznej bądź tradycyjne materiały szkoleniowe i materiały dodatkowe dostarczone w wersji elektronicznej w zależności od ustaleń z producentem (w postaci dokumentów PDF lub EPUB). Tak dostarczone materiały są przystosowane pod kątem wyświetlania ich na tablecie ctab. Po więcej informacji zajrzyj na stronę ctab.

 

WYBIERZ TERMIN SZKOLENIA

    • Informacje ogólne
    • Termin gwarantowany
    • Last minute (-10%)
    • Język obowiązujący na szkoleniu
    • Język polski
    • Język angielski
    • Informacje ogólne
    • Termin gwarantowany
    • Last minute (-10%)
    • Język obowiązujący na szkoleniu
    • Język polski
    • Język angielski
    • Informacje ogólne
    • Termin gwarantowany
    • Last minute (-10%)
    • Język obowiązujący na szkoleniu
    • Język polski
    • Język angielski
Zarezerwuj termin szkolenia