Module 1: Introduction to Microsoft 365 Security Metrics
- Threat vectors and data breaches
- Security solutions in Microsoft 365
- Introduction to Secure Score
- Introduction to identity protection in Azure Active Directory
Module 2: Managing Your Microsoft 365 Security Services
- Introduction to Exchange Online Protection
- Introduction to Advanced Threat Protection
- Management of secure attachments
- Management of secure links
- Monitoring and reporting
Module 3: Managing Microsoft 365 Security Services
- Define a Microsoft 365 test tenant
- Implementation of an ATP Safe Links policy and Safe Attachment policy
Module 4: Microsoft 365 Threat Intelligence
- Microsoft 365 Threat Intelligence overview
- Using the security dashboard
- Configuring Advanced Threat Analytics
- Implementing security for your cloud application
Module 5: Implementing alert notifications using the security dashboard
- Implementation of alert notifications using the security dashboard
Module 6: Introduction to Data Governance in Microsoft 365
- Introduction to archiving in Microsoft 365
- Introduction to conservation in Microsoft 365
- Introduction to information rights management
- Introduction to the Secure Multipurpose Internet Mail Extension
- Introduction to message encryption in Office 365
- Introduction to preventing data loss
Module 7: Archiving and retaining in Office 365
- On-site record management in SharePoint
- Archiving and retention in Exchange
- Conservation policies in SSC
Module 8: Implement archiving and retention
- Implement archiving and retention
Module 9: Implementing Data Governance in Microsoft 365 Intelligence
- Plan your security and compliance needs
- Build ethical walls in Exchange Online
- Create a simple DLP policy from an integrated template
- Create a custom DLP policy
- Create a DLP policy to protect documents
- Working with policy advice
Module 10: Implementing DLP policies
Module 11: Managing Data Governance in Microsoft 365
- Manage retention in email
- Troubleshoot data governance
- Implement Azure information protection
- Implement advanced features of AIP
- Implement Windows Information Protection
Module 12: Implementing AIP and WIP
- Implement AIP and WIP
- Implement Azure Information Protection
- Implement Windows Information Protection
Module 13: Managing research and investigations
- Search for content in the Security and Compliance Center
- Audit journal investigations
- Manage advanced eDiscovery
Module 14: Managing Search and Examination
Module 15: Planning Device Management
- Introduction to co-management
- Prepare your Windows 10 devices for co-management
- Configuration Manager Transition to Intune
- Introduction to Microsoft Store for Business
- Plan mobile application management
Module 16: Implementing the Microsoft Store for Business
- Implement the Microsoft Store for Business
Module 17: Planning the deployment strategy for your Windows 10
- Windows 10 deployment scenarios
- Implement Windows Autopilot
- Plan your Windows 10 subscription activation strategy
- Troubleshoot Windows 10 upgrade errors
- Introduction to Windows Analytics
Module 18: Implementing mobile device management
- Plan mobile device management
- Deploy mobile device management
- Register devices in mobile device management
- Manage device compliance
Module 19: Managing devices with Intune
- Manage devices with Intune
ITTA is a partner of Temptraining, the continuing education fund for temporary workers. This training fund can subsidize continuing education for anyone who works for an employer subject to the Collective Work Agreement (CCT) Rental of services.