Introduction to Microsoft 365 Security Metrics

A Part of MD-101.

Beginner 4(1 Ratings)
English
What will you learn?
  • Administration of Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management.
  • Common types of threat vectors and how Microsoft 365’s security solutions address these security threats.
  • How to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links.
  • Introduced to the various reports that monitor your security health.
  • Using of Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.
  • How to implement Azure Information Protection and Windows Information Protection.

Live training
  • Date : June 21, 2021
  • Time (GMT) : 14:00:00
  • Time (EST) : 09:00:00
  • Duration : 120 Minutes
Prerequisites
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.
Description

This session is a part of MD-101. In this, you will study about all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365's security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Active Directory Identity Protection.

Framework

Introduction to Microsoft 365 Security Metrics

  • Threat Vectors and Data Breaches.
  • The Zero Trust Model.
  • Security Solutions in Microsoft 365.
  • Introduction to Microsoft Secure Score.
  • Privileged Identity Management.
  • Introduction to Azure Active Directory Identity Protection.

Demo: Tenant Setup and PIM

    • Describe several techniques hackers use to compromise user accounts through email.
    • Describe techniques hackers use to compromise data.
    • Describe and five steps to implementing a Zero Trust model in your organization.
    • Explain Privileged Access Management in Microsoft 365
    • Plan your investigation in protecting cloud-based identities
    • Plan how to protect your Azure Active Directory environment from security breaches
    • Describe the Zero Trust approach to security in Microsoft 365.
    • Describe and five steps to implementing a Zero Trust model in your organization.

    Benefits

    •  Implement security solutions in Microsoft 365.
    • Plan and configure Azure AD identity protection.
    • Implement Exchange Online Protection.
    • Implement Advanced Threat Protection.
    • Manage Safe Attachments and Safe Links.
    • Implement Microsoft 365 Threat Intelligence.
    • Configure Advanced Threat Analytics.
    • Implement cloud application security.


    + View more
    Other related courses
    Student feedback
    4
    Average rating
    • 0%
    • 0%
    • 0%
    • 100%
    • 0%
    $7
    Buy now
    Includes:
    • Learn from Industry Experts
    • Ask Question to Trainer
    • 100% Online Courses
    • Certificate of Completion