0% found this document useful (0 votes)
256 views2 pages

Microsoft 365 Mobility and Security

This training program helps prepare students for the MS-500 and MS-101 certification exams on Microsoft 365 security and mobility administration. The curriculum covers implementing and managing identity and access, modern device services, security and threat protection, and information protection. It also addresses governance and compliance features in 18 modules, including secure identities, threat intelligence, information protection, access management, and data governance in Microsoft 365.

Uploaded by

Jyothi Prakash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
256 views2 pages

Microsoft 365 Mobility and Security

This training program helps prepare students for the MS-500 and MS-101 certification exams on Microsoft 365 security and mobility administration. The curriculum covers implementing and managing identity and access, modern device services, security and threat protection, and information protection. It also addresses governance and compliance features in 18 modules, including secure identities, threat intelligence, information protection, access management, and data governance in Microsoft 365.

Uploaded by

Jyothi Prakash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Implementing and Managing

Microsoft 365 - Mobility & Security


(Focus on Exam: MS-500, MS-101)

This training program helps you to prepare for Exam MS-500: Microsoft 365 Security
Administration. (Microsoft 365 Certified: Security Administrator Associate). Exam
MS-101: Microsoft 365 Mobility and Security (Part of Microsoft 365 Certified: Enterprise
Administrator Expert).

Course Objective

 Implement and manage identity and access


 Implement modern device services
 Implement and manage security and threat protection
 Implement and manage information protection
 Manage governance and compliance features

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.

Call: +91 40 2339 4150 / 2374 5252 | eMail: [email protected] | www.zoomgroup.com


Course Curriculum

Module 1: Overview of Microsoft 365 & Microsoft Module 10: Implement Cloud App Security (CAS)
365 hybrid environments • Configure Cloud App Security (CAS)
• Overview of Microsoft 365 • Configure Cloud App Security (CAS) policies
• Subscriptions for Microsoft 365 • Configure Connected apps
• Start using Microsoft 365 • Design Cloud App Security (CAS) Solution
Module 2: Secure Identities and Implement Module 11: Advanced Threat Protection
authentication methods • Exchange Online Protection
• Overview of Azure AD Identity and Access • Office 365 Advanced Threat Protection
• Security Groups in Microsoft 365 • Managing Safe Attachments
• Plan Azure AD authentication options • Managing Safe Links
• Password Management in Microsoft 365 • Azure Advanced Threat Protection
• Azure AD Identity Protection • Windows Defender Advanced Threat Protection
Module 3: Identity Synchronization Module 12: Threat Intelligence
• Introduction to Identity Synchronization • Microsoft 365 Threat Intelligence
• Planning for Azure AD Connect • Using the Security Dashboard
• Implementing Azure AD Connect • Configuring Advanced Threat Analytics
• Managing Synchronized Identities Module 13: Information Protection
Module 4: Plan Windows 10 deployment • Information Rights Management
• Plan for Windows as a Service (WaaS) • Secure Multipurpose Internet Mail Extension
• Plan the appropriate Windows 10 Enterprise • Office 365 Message Encryption
deployment method Module 14: Implementing Azure Information
• Analyze upgrade readiness for Windows 10 Protection
• Evaluate and deploy additional Windows 10 • Overview of Azure Information Protection
Enterprise security features • Plan for classification labeling
Module 5: Implement Mobile Device • Deploy AIP Clients
Management (MDM) • implement Azure Information Protection policies
• Plan for MDM • Windows Information Protection
• Configure MDM integration with Azure AD Module 15: Data Loss Prevention
• Set an MDM authority • Overview of Data Loss Prevention
• Set device enrolment limit for users • Data Loss Prevention Policies
Module 6: Plan for devices and apps • Custom DLP Policies
• Create and configure Microsoft Store for Business • Creating a DLP Policy to Protect Documents
• Plan app deployment • Policy Tips
• Plan device co-management Module 16: Archiving and Retention
• Plan device monitoring • Archiving in Microsoft 365
• Plan for device profiles • Retention in Microsoft 365
• Plan for Mobile Application Management • Retention Policies in the Security and Compliance
• Plan mobile device security Center
Module 7: Access Management • Archiving and Retention in Exchange
• Conditional Access • In-place Records Management in SharePoint
• Managing Device Access Module 17: Data Governance in Microsoft 365
• Role Based Access Control (RBAC) • Planning Security and Compliance Needs
• Solutions for External Access • Building Ethical Walls in Exchange Online
Module 8: Security in Microsoft 365 • Manage Retention in Email
• Threat Vectors and Data Breaches • Troubleshooting Data Governance
• Security Solutions for Microsoft 365 Module 18: Managing Search and Investigations
• Microsoft Secure Score • Searching for Content in the Security and
Module 9: Cloud Application Security Compliance Center
• Cloud Application Security Explained • Audit Log Investigations
• Using Cloud Application Security Information • Advanced eDiscovery

Call: +91 40 2339 4150 / 2374 5252 | eMail: [email protected] | www.zoomgroup.com

You might also like