Type and hit enter to Search
×

MS-101T00: Microsoft 365 Mobility And Security

  • 4.8(45,429 Rating)

Course Overview

Microsoft Cloud for Healthcare ILT is a course that is an essential step in your learning journey. It’s designed to empower you to implement Microsoft Cloud for Healthcare. It will give you an initial idea of the main scenarios from the healthcare industry and how the solution solves each scenario. The course will help you to understand each of the Microsoft Cloud for Healthcare solution capabilities and practice configuring them for the scenarios. The course will also give you a jump start on Azure Health Data Service configuration and scenarios.

Target Audiance

  • This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.

Schedule Dates

MS-101T00: Microsoft 365 Mobility And Security
24 December 2024 - 27 December 2024
MS-101T00: Microsoft 365 Mobility And Security
24 March 2025 - 27 March 2025
MS-101T00: Microsoft 365 Mobility And Security
24 June 2025 - 27 June 2025
MS-101T00: Microsoft 365 Mobility And Security
29 September 2025 - 02 October 2025

Course Content

  • Threat Vectors and Data Breaches
  • The Zero Trust Model
  • Security Solutions in Microsoft 365
  • Introduction to Microsoft Secure Score
  • Privileged Identity Management
  • Introduction to Azure Active Directory Identity Protection
  • Lab : Tenant Setup and PIM
  • Initialize your Microsoft 365 Tenant
  • PIM Resource Workflows

  • Introduction to Exchange Online Protection
  • Introduction to Advanced Threat Protection
  • Managing Safe Attachments
  • Managing Safe Links
  • Monitoring and Reports
  • Lab : Manage Microsoft 365 Security Services
  • Implement a Safe Attachments policy
  • Implement a Safe Links policy

  • Overview of Microsoft 365 Threat Intelligence
  • Using the Security Dashboard
  • Configuring Advanced Threat Analytics
  • Implementing Your Cloud Application Security
  • Lab : Implement Threat Intelligence
  • Conduct a Spear Phishing attack using the Attack Simulator
  • Conduct Password attacks using the Attack Simulator
  • Prepare for Alert Policies
  • Implement a Mailbox Permission Alert
  • Implement a SharePoint Permission Alert
  • Test the Default eDiscovery Alert

  • Introduction to Archiving in Microsoft 365
  • Introduction to Retention in Microsoft 365
  • Introduction to Information Rights Management
  • Introduction to Secure Multipurpose Internet Mail Extension
  • Introduction to Office 365 Message Encryption
  • Introduction to Data Loss Prevention
  • Lab : Implement Message Encryption and IRM
  • Configure Microsoft 365 Message Encryption
  • Validate Information Rights Management

  • Lab : Implement Message Encryption and IRM
  • Configure Microsoft 365 Message Encryption
  • Validate Information Rights Management
  • Lab : Implement Archiving and Retention
  • Initialize Compliance
  • Configure Retention Tags and Policies

  • Evaluating Your Compliance Readiness
  • Implementing Compliance Center Solutions
  • Building Ethical Walls in Exchange Online
  • Creating a Simple DLP Policy from a Built-in Template
  • Creating a Custom DLP Policy
  • Creating a DLP Policy to Protect Documents
  • Working with Policy Tips
  • Lab : Implement DLP Policies
  • Manage DLP Policies
  • Test MRM and DLP Policies

  • Managing Retention in Email
  • Troubleshooting Data Governance
  • Implementing Azure Information Protection
  • Implementing Advanced Features of AIP
  • Implementing Windows Information Protection
  • Lab : Implement AIP and WIP
  • Implement Azure Information Protection
  • Implement Windows Information Protection

  • Searching for Content in the Security and Compliance Center A
  • Auditing Log Investigations
  • Managing Advanced eDiscovery
  • Lab : Manage Search and Investigations
  • Implement a Data Subject Request
  • Investigate Your Microsoft 365 Data

  • Introduction to Co-management
  • Preparing Your Windows 10 Devices for Co-management
  • Transitioning from Configuration Manager to Intune
  • Introduction to Microsoft Store for Business
  • Planning for Mobile Application Management
  • Lab : Implement the Microsoft Store for Business
  • Configure the Microsoft Store for Business
  • Manage the Microsoft Store for Business

  • Windows 10 Deployment Scenarios
  • Implementing and Managing Windows Autopilot
  • Planning Your Windows 10 Subscription Activation Strategy
  • Resolving Windows 10 Upgrade Errors
  • Introduction to Windows Analytics

  • Planning Mobile Device Management
  • Deploying Mobile Device Management
  • Enrolling Devices to MDM
  • Managing Device Compliance
  • Lab : Manage Devices with Intune
  • Enable Device Management
  • Configure Azure AD for Intune
  • Create Intune Policies
  • Enroll a Windows 10 Device
  • Manage and Monitor a Device in Intune

FAQs

The course includes best practices for managing mobility, such as implementing mobile device management (MDM), configuring application protection policies, and ensuring secure access to organizational resources.

This course is designed for IT professionals, system administrators, and security specialists responsible for managing and securing Microsoft 365 environments. It is especially useful for those tasked with implementing mobility solutions and safeguarding organizational data.

Participants should have a foundational knowledge of Microsoft 365 services and basic experience with IT administration and security concepts. Prior experience with Microsoft 365 administration is beneficial but not required.

Upon completing the course, participants will be adept at managing Microsoft 365 mobility and security features. They will be able to implement and configure security policies, manage devices and applications, and protect organizational data and resources effectively.

Participants receive access to course materials such as instructional videos, lecture notes, practical exercises, and sample files. Additional resources may include online forums and post-course support.

The course addresses challenges such as managing device compliance, configuring security policies, and implementing data protection measures, as well as providing solutions and best practices to overcome these challenges.

The course addresses strategies and tools for managing and securing remote workforces, including configuring remote access policies, managing remote devices, and ensuring secure collaboration and communication.

The course includes guidance on using Microsoft 365 tools for incident response and threat mitigation, including how to investigate and respond to security alerts, manage security incidents, and implement remediation strategies.

Start learning with 15.8k students around the world.
  • 3.3k
    Courses
  • 100+
    Certified Instructors
  • 99.9%
    Success Rate
Open chat
Hello
How Can We Help You?