Module 1: User and Group Management
- The Zero Trust model
- Plan your identity and authentication solution
- Identity and Access Management concepts
- User accounts and roles
- Password Management
Module 2: Identity Synchronization and Protection
- Configure and manage synchronized identities
- Azure AD Identity Protection
- Plan directory synchronization
Module 3: Identity and Access Management
- Identity Governance
- Manage device access
- Application Management
- Role Based Access Control (RBAC)
- Privileged Identity Management
- Solutions for external access
Module 4: Security in Microsoft 365
- Microsoft security solutions
- Secure Score
- Threat vectors and data breaches
- Security strategy and principles
Module 5: Threat Protection
- Manage Safe Attachments
- Manage Safe Links
- Microsoft Defender for Identity
- Exchange Online Protection (EOP)
- Microsoft Defender for Office 365
- Microsoft Defender for Endpoint
Module 6: Threat Management
- Security dashboard
- Threat investigation and response
- Azure Sentinel
- Advanced Threat Analytics
Module 7: Microsoft Cloud Application Security
- Deploy Cloud Application Security
- Use cloud application security information
Module 8: Mobility
- Deploy mobile device services
- Mobile Device Management (MDM)
- Mobile Application Management (MAM)
- Enroll devices to Mobile Device Management
Module 9: Information Protection and Governance
- Sensitivity labels
- Archiving in Microsoft 365
- Information protection concepts
- Governance and Records Management
- Retention in Microsoft 365
- In-place records management in SharePoint
- Retention policies in the Microsoft 365 Compliance Center
- Archiving and retention in Exchange
Module 10: Rights Management and Encryption
- Office 365 Message Encryption
- Secure Multipurpose Internet Mail Extension (S-MIME)
- Information Rights Management (IRM)
Module 11: Data Loss Prevention
- Create a DLP policy
- Customize a DLP policy
- Create a DLP policy to protect documents
- Data loss prevention fundamentals
- Policy tips
Module 12: Compliance Management
- Compliance center
Module 13: Insider Risk Management
- Insider Risk
- Privileged Access
- Building ethical walls in Exchange Online
- Information barriers
Module 14: Discover and Respond
- Audit Log Investigations
- Advanced eDiscovery
- Content Search