MS-101 Microsoft 365 Identity and Services

MS-101 Microsoft 365 Mobility and Security Online Courses in Malawi

The MS-101 course is designed for individuals and office professionals who need to master the capabilities of the latest edition of Microsoft Office. 2KO Africa is a professional training company, delivering cutting edge programs in the IT space and in selected business applications. Our training is offered online, live online and also by instructor led classes. 2KO Africa's business courses are available world-wide, many of them leading to European Certification.

 

Overview
Candidates have a working knowledge of Microsoft 365 workloads and should have been an administrator for at least one Microsoft 365 workload (Exchange, SharePoint, Skype for Business, or Windows as a Service). Candidates also have a working knowledge of networking, server administration, and IT fundamentals such as DNS, Active Directory, and PowerShell.The Microsoft 365 Mobility and Security (MS-101) show is designed for Microsoft 365 Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft 365 services. They perform Microsoft 365 tenant management tasks for an enterprise, including its identities, security, compliance, and supporting technologies.

Objectives
Data Governance in Microsoft 365 Intelligence
Search and Investigations
Device Management
Windows 10 Deployment Strategies
Mobile Device Management

Prerequisites
Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
A proficient understanding of general IT practices.

 

Course Curriculum


IMPLEMENT THREAT MANAGEMENT
ATA Architecture and Components
Configure Microsoft 365 ATP Policies
Azure ATP Architecture, Components - Prerequisites

CONFIGURE DATA LOSS PREVENTION (DLP)
Configure DLP Policies - PowerShell
Configure DLP Policies - Overview

IMPLEMENT AZURE INFORMATION PROTECTION (AIP)
Configure Super User
Deploy AIP Clients
Plan for Classification Labeling
Plan for Windows Information Protection (WIP)
Plan AIP Solution
Information Rights Management (IRM) for Workloads
Implement AIP Tenant Key
Implement Azure Information Protection Policies
Deploy On-Prem Rights Management Connector

MANAGE SECURITY REPORTS AND ALERTS
Manage Service Assurance Dashboard
Manage DLP Policy Matches
Configure and Manage Microsoft 365 Security Alerts

MANAGE EDISCOVERY
Search Content Security Compliance Center Roles
Plan for In-place and Legal Hold
Configure eDiscovery
Search Content Security Compliance Center

IMPLEMENT THREAT MANAGEMENT
Plan a Threat Management Solution
Design Azure Advanced Threat Protection Policies
ATA Architecture and Components
Configure Microsoft 365 ATP Policies
Azure ATP Architecture, Components - Prerequisites
Design Microsoft 365 ATP Policies
Azure ATP Architecture, Components - Overview
Monitor Advanced Threat Analytics (ATA) Incidents

CONFIGURE DATA LOSS PREVENTION (DLP)
Design Data Retention Policies in Microsoft 365
Manage Azure AD Identity Protection
Configure DLP Policies - PowerShell
Configure DLP Policies - Overview
Configure DLP Policies - O365 Security Compliance
Manage DLP Exceptions
Monitor DLP Policy Matches
What is Data Loss Prevention, How Does It Work

MANAGE AUDITING
Monitoring Unified Audit Logs
Configuring Audit Logging

MANAGE DATA GOVERNANCE
Configure Information Retention
Plan for Microsoft 365 Backup
Plan Information Retention Policies
Plan for Restoring Deleted Content

IMPLEMENT MOBILE DEVICE MANAGEMENT (MDM)
Overview
So You Want to Build a Lab
Plan for MDM - O365 vs. Intune
Plan for MDM Planning Infrastructure Requirements
Configure MDM Integration with Azure AD - Overview
Configure MDM Integration with Azure AD - SCCM
Set an MDM Authority
Set Device Enrollment Limit for Users

MANAGE DEVICE COMPLIANCE
Plan for Device Compliance
Determine Use Cases for Device Compliance
Design Conditional Access Policies
Create Conditional Access Policies
Configure Device Compliance Policy
Manage Conditional Access Policies

PLAN FOR DEVICES AND APPS
Create and Configure Microsoft Store for Business
Plan App Deployment
Plan Device Co-management
Plan Device Monitoring
Plan for Device Profiles
Plan for Mobile Application Management
Plan Mobile Device Security

PLAN WINDOWS 10 DEPLOYMENT
Plan for Windows as a Service (WaaS)
Plan Win10 Ent. Deployment Method - Know
Plan Win10 Ent. Deployment Method - Consider
Plan Deployment Method - In-Place Upgrade SCCM
Plan Deployment Method Modern Servicing Intune
Plan Win10 Deployment Method Modern Servicing GPO
Plan Deployment Method Modern Servicing SCCM
Analyze Upgrade Readiness for Windows 10 - Know
Analyze Upgrade Readiness for Windows 10 Do
Evaluate Deploy Win10 Ent Security Features

CONFIGURE CLOUD APP SECURITY (CAS)
Cloud App Security Overview
Configure Cloud App Security (CAS)
Configure Cloud App Security (CAS) Policies
Cloud App Security (CAS) Policies Activity Policy
Cloud App Security - Anomaly Detection Policy 

 

Details about this course
Over 9 and a half
hours of learning
Includes video, presentations, workbooks, quizzes, flashcards & games
Receive a Certificate of Excellence on successful completion
Presented by highly qualified, industry leading experts
12 Months access (Unless indicated otherwise)