> Microsoft 365 Mobility and Security. Would you like to participate on a survey? Basic Mobility and Security can help you secure and manage mobile devices like iPhones, iPads, Androids, and Windows Phones used by licensed Microsoft 365 users in your organization. . It develops one’s technical skills related to mobility and security of the modern Microsoft 365 services. This includes learning how to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how … English. Tampa, FL 33605, 445 Dexter Avenue, Suite 4050 The MS-101: Microsoft 365 Mobility and Security exam consist of 40-60 questions that must be completed within a time frame of 180 minutes. After completing this module, students will be able to: This module examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. The Microsoft 365 Mobility and Security course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role. Instructor-led courses to gain the skills needed to become certified. Online, Self-Paced This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. This module focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. Now that you understand the key aspects of data governance, you will examine how to implement them, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. Reboot the device, then navigate to portal.manage.microsoft.com, sign in with your Microsoft 365 user ID and password, and attempt to install the profile manually. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework. In this module, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. The Microsoft 365 Mobility and Security (MS-101) show is designed for Microsoft 365 Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft 365 services. Day 1: Microsoft 365 Security Management (MS-101T01-A) Learn about Microsoft 365 Security Management, including how to manage your security metrics, how to enable Azure AD Identity Protection, how to configure your Microsoft 365 security services, and user Microsoft 365 … You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. This Microsoft 365 Mobility and Security training course (MS-101) teaches attendees how to manage their security metrics and implement Microsoft 365 Compliance Management. Key Features of this Microsoft 365 Mobility and Security Training: Prepare for Microsoft MS-101 certification exam; Microsoft Official Course content; After-course instructor coaching benefit; Eligible to use with your Microsoft Software Assurance Training Vouchers (SATVs) You Will Learn How To: Microsoft 365 Security Metrics; Microsoft 365 Security Services Course Overview. Microsoft 365 brings together Office 365, Windows 10, and Enterprise Mobility + Security. Get greater protection, detection, and response capabilities for your mobile workforce. A .gov website belongs to an official government organization in the United States. If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov. The exam is available in only two languages. Do note that this course listed is a Microsoft Digital Class (DMOC Class). TechSherpas 365 offers a wide range of Microsoft courses and certifications. Fort Walton Beach, FL 32547, 1320 E 9th Ave, Suite 100 Describe and five steps to implementing a Zero Trust model in your organization. You have been selected to participate in a brief survey about your experience today with National Initiative for Cybersecurity Careers and Studies. Finally, you will be introduced to the various reports that monitor your security health. This module delves deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center. Describe the Zero Trust approach to security in Microsoft 365. In addition, attendees explore the world of Microsoft 365 device management. You will then focus on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. In this 4-day packaged course IT professionals will learn about Office 365 Security Management, including how to manage your security metrics, how to enable Azure AD Identity Protection, how to configure your Microsoft 365 security services, and user Microsoft 365 Threat Intelligence. A proficient understanding of general IT practices. This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In this four-day, instructor-led course, you will learn three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. It combines best-in-class productivity apps with intelligent cloud services to transform the way you work. MS-101. Course Objectives. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. EMS and its products increase the security features of Windows 10 and Microsoft 365 and extend them to your entire environment including investments that aren’t supplied by Microsoft. Microsoft 365 Device Management, Security Management and Compliance Management. this is a secure, official government website, Microsoft 365 Mobility and Security - MS 101, National Centers of Academic Excellence (CAE), CyberCorps®: Scholarship for Service (SFS), Microsoft 365 Mobility and Security MS 101, Data Governance in Microsoft 365 Intelligence. You will conclude this section by learning how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery. Knowledge of cloud-based service concepts. MS-101T00 Microsoft 365 Mobility and Security This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. Course Description. Microsoft 365 Threat Intelligence. This module focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Windows Analytics, and planning your Windows 10 subscription activation service.. This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. You are required to bring your own device. So, make sure that you’re well versed with at least one of the languages mentioned above. Expand your security with EMS. In this module, you will then transition from security services to … This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths. View all courses. The course concludes with an in-depth examination of Microsoft 365 device management. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. List the types of retention tags that can be applied to mailboxes, Know the different Microsoft 365 Encryption Options, Understand how IRM can be used in Exchange, Configure IRM protection for Exchange mails, Explain how IRM can be used in SharePoint, Apply IRM protection to SharePoint documents, Tell the differences between IRM protection and AIP classification, Understand the co-operation of signing and encryption simultaneously, Describe when you can use Office 365 Message Encryption, Explain how Office 365 Message Encryption works, Understand what sensitive information and search patterns are that DLP is using, Know what a DLP policy is and what it contains, Recognize how actions and conditions work together for DLP, Express how actions contain functions to send emails on matches, Show policy tips to the users if a DLP rule applies, Use policy templates to implement DLP policies for commonly used information, Understand how to use DLP to protect documents in Windows Server FCI, In-Place Records Management in SharePoint, Understand the process of records management, Describe two methods for converting active docs to records, Describe the benefits of In-Place Records Management, Configure of In-Place Records Management for your organization, Create retention policies to group retention tags, Allocate permissions and scripts to export and import retention tags, Export all retention policies and tags from an organization, Import all retention policies and tags to an organization, Building Ethical Walls in Exchange Online, Creating a Simple DLP Policy from a Built-in Template, Creating a DLP Policy to Protect Documents, Describe the Microsoft 365 Compliance Center and how to access it, Describe the purpose and function of Compliance score, Explain the components of of how an organization's Compliance score is determined, Explain how assessments are used to formulate compliance scores, Explain how Microsoft 365 helps address Global Data Protection Regulation, Describe insider risk management functionality in Microsoft 365, Configure insider risk management policies, Explain the communication compliance capabilities in Microsoft 365, Describe what an ethical wall in Exchange is and how it works, Explain how to create an ethical wall in Exchange, Identify best practices for building and working with ethical walls in Exchange, Understand the different built-in templates for a DLP policies, Determine how to choose the correct locations for a DLP policy, Configure the correct rules for protecting content, Enable and review the DLP policy correctly, Describe how to modify existing rules of DLP policies, Explain how to add and modify custom conditions and action to a DLP rule, Describe how to change user notifications and policy tips, Configure the user override option to a DLP rule, Explain how incident reports are sent by a DLP rule violation, Describe how to work with managed properties for DLP policies, Explain how SharePoint Online creates crawled properties from documents, Describe how to create a managed property from a crawled property in SharePoint Online, Explain how to create a DLP policy with rules that apply to managed properties via PowerShell, Describe the user experience when a user creates an email or site containing sensitive information, Explain the behavior in Office apps when a user enters sensitive information, Implementing Azure Information Protection, Implementing Windows Information Protection, Determine when and how to use retention tags in mailboxes, Assign retention policy to an email folder, Add optional retention policies to email messages and folders, Remove a retention policy from an email message, Explain how the retention age of elements is calculated, Repair retention policies that do not run as expected, Understand how to systematically troubleshoot when a retention policy appears to fail, Perform policy tests in test mode with policy tips, Describe how to monitor DLP policies through message tracking, Describe the required planning steps to use AIP in your company, Plan a Deployment of the Azure Information Protection client, Configure the advance AIP service settings for Rights Management Services (RMS) templates, Implement automatic and recommended labeling, Activate the Super User feature for administrative tasks, Deploy the AIP scanner for on-premises labeling, Plan RMS connector deployment to connect on-premises servers, Implement WIP policies with Intune and SCCM, Implement WIP policies in Windows desktop apps, Searching for Content in the Security and Compliance Center, Explain how to search for third-party data, Describe when to use scripts for advanced searches, Describe what the audit log is and the permissions that are necessary to search the Office 365 audit, Enter criteria for searching the audit log, Search the unified audit log by using Windows PowerShell, Configure permissions for users in Advanced eDiscovery, Search and prepare data for Advanced eDiscovery, Preparing Your Windows 10 Devices for Co-management, Transitioning from Configuration Manager to Intune, Introduction to Microsoft Store for Business, Planning for Mobile Application Management, Configure the Microsoft Store for Business, Plan your organization's Co-management Strategy, Describe the main features of Configuration Manager, Describe how Azure Active Directory enables co-management, Identify the prerequisites for using Co-management, Configure Configuration Manager for Co-management, Describe the feature and benefits of the Microsoft Store for Business, Manage settings for the Microsoft Store for Business, Implementing and Managing Windows Autopilot, Planning Your Windows 10 Subscription Activation Strategy, Describe Autopilot Self-deployments, White Glove deployments, and User-drive deployments, Deploy BitLocker Encryption for Autopiloted Devices, Understand Windows 10 Enterprise E3 in CSP, Configure VDA for Subscription Activation, Describe common fixes for Windows 10 upgrade errors, Understand the upgrade error codes and resolution procedure, Understand policy settings for mobile devices, Activate Mobile Device Management Services, Configure an APNs Certificate for iOS devices, Define a Corporate Device Enrollment Policy, Understand the Apple Device Enrollment Program, Configure a Device Enrollment Manager Role, Describe Multi-factor Authentication considerations.
2020 microsoft 365 mobility and security training