Narrated ‘Ali bin Abi Talib (RA): The Prophet (RA) stood up for a funeral (to show respect) and thereafter he sat down. (Dawud)
This is a five-day instructor-led training (ILT) course that targets the requirements of IT professionals who participate in evaluating, planning, deploying, and operating Microsoft Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to line up an Office 365 tenant, including federation with existing user identities, and skills required to sustain an Office 365 tenant and its users.
This course is meant for IT professionals who are liable for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to possess a reasonably broad understanding of several on-premises technologies like name System (DNS) and Active Directory Domain Services (AD DS). additionally , they ought to have a general understanding of Microsoft Exchange Server, Microsoft Lync Server or Skype for Business Server, and Microsoft SharePoint Server.
Before attending this course, students must have:
This is a three-day Instructor Led Training (ILT) course that targets the requirements of data technology (IT) professionals who participate in administering, configuring, troubleshooting, and operating Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to administer and troubleshoot Office 365 tenant and key services of Office 365, like Exchange Online, SharePoint Online and Skype for Business and Teams. It also covers security and compliance features of Office 365.
This course is meant for IT professionals and system administrators who want to find out about administration and troubleshooting techniques in Office 365. These professionals should have a minimum of three years of experience working within the ir respective fields: ideally in the areas of system administration, network administration, and messaging.
Before attending this course, students must have:
This 1 day course is meant for information workers who are using or will use Office 365. This course will provide students with the knowledge and skills to efficiently use Office 365 on a day-to-day basis. The course is meant with world scenarios in mind. Students will find out how to use Outlook Online, Skype for Business, OneDrive for Business, SharePoint Online, and OneNote. At the top of this course students are going to be ready to effectively navigate Office 365 and make use of all of the features of Office 365.
This course is meant for anyone who is using or will use Office 365. The course is additionally intended for decision makers who try to know the features and benefits of Office 365 and the way it can increase employee productivity.
Before attending this course, students must have:
In this course, students will find out how to support and configure Windows 10 desktops in an organizational environment. Students will develop skills that include learning the way to install, customize, and update Windows 10 operating systems. Students will find out how to managing storage, files, and devices also as the way to configure network connectivity for Windows 10. Students also will find out how to secure the Windows 10 OS and protect the info on the device. Finally, students will find out how to manage and troubleshoot Windows 10.
Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates can also be conversant in enterprise scenarios and cloud-integrated services.
In this course, students will find out how to plan and implement an OS deployment strategy using modern deployment methods, also as the way to implement an update strategy. Students are going to be introduced to key components of recent management and co-management strategies. This course also covers what it takes to include Microsoft Intune into your organization. Students also will study methods for deployment and management of apps and browser-based applications. Students are going to be introduced to the key concepts of security in modern management including authentication, identities, access, and compliance policies. Students are going to be introduced to technologies such Azure Active Directory, Azure Information Protection and Windows Defender Advanced Threat Protection, also as the way to leverage them to guard devices and data.
The Modern Desktop Administrator deploys, configures, secures, manages, and monitors devices and client applications in an enterprise environment. Responsibilities include managing identity, access, policies, updates, and apps. The MDA collaborates with the M365 Enterprise Administrator to style and implement a tool strategy that meets the business needs of a contemporary organization.
The Modern Desktop Administrator must be conversant in M365 workloads and must have strong skills and knowledge of deploying, configuring, and maintaining Windows 10 and non-Windows devices. The MDA role focuses on cloud services instead of on-premises management technologies.
The Modern Desktop Administrator must be conversant in M365 workloads and must have strong skills and knowledge of deploying, configuring, and maintaining Windows 10 and non-Windows devices. The MDA role focuses on cloud services instead of on-premises management technologies. it's recommended students complete course MD-100, Windows 10, before taking this course.
This is a 5-day ILT course that's designed to supply students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices during a Windows Server domain environment. These skills include understanding of Windows 10 features, how they will be utilized in a lively Directory environment and the way to troubleshoot them.
The primary audience for this course is that the Enterprise Desktop Support Technician (EDST), who provides Tier 2 support to users running Windows 10 personal computers (PCs) and devices in medium to large enterprise organizations, within a Windows domain environment. EDSTs specialise in a broad range of technical issues for Windows operating systems (OSs), devices, cloud services, applications, networking, and hardware support. within the overarching scenario, if an enterprise offers the service, the EDST is asked to support it.
The key responsibilities include resolving technical issues concerning Windows 10 installation and migration, activation, performance, profiles, settings; and device synchronization. another key responsibilities include local and remote network access; access to applications, access to data and printers; authentication, Endpoint security and policy; OS and data recovery.
Students who seek certification within the following exams also will enjoy this course:
In addition to their professional experience, students who attend this training should have already got the subsequent technical knowledge:
This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 tenant and repair management, Office 365 management, and Microsoft 365 identity management. In Microsoft 365 tenant and repair management, you'll examine all the key components that has got to be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you'll find out how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you'll find out how to manage your tenant, which incorporates the configuration of tenant roles and managing your tenant health and services.
With your Microsoft 365 tenant now firmly in situ , you'll examine the key components of Office 365 management. This begins with an summary of Office 365 product functionality, including Exchange Online, SharePoint Online, Microsoft Teams, Microsoft Power Platform, additional product resources, and device management. you'll then transition to configuring Office 365, with a primary specialise in configuring Office client connectivity. Finally, you'll examine the way to manage Microsoft 365 Apps for enterprise (formerly Office 365 ProPlus) deployments, from user-driven client installations to centralized deployments. you'll conclude this section by learning the way to configure Office Telemetry and Microsoft Analytics.
The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with attention on Azure Active Directory Connect. you'll find out how to plan for and implement Azure AD Connect, the way to manage synchronized identities, and the way to implement password management in Microsoft 365 using multi-factor authentication and self-service password management. This section wraps up with a comprehensive check out implementing application and external access. you'll find out how to feature and manage applications in Azure Active Directory, including the way to configure multi-tenant applications. you'll then examine the way to configure Azure AD Application Proxy, including the way to install and register a connector and the way to publish an on-premises app for remote access. Finally, you'll examine the way to design and manage solutions for external access. This includes licensing guidance for Azure AD B2B collaboration, creating a collaborative user, and troubleshooting a B2B collaboration.
This course is meant for persons who are meaning to the Microsoft 365 Enterprise Admin role and have completed one among the Microsoft 365 role-based administrator certification paths.
This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you'll examine all the common sorts of threat vectors and data breaches facing organizations today, and you'll find out how Microsoft 365’s security solutions address these security threats. you'll be introduced to the Microsoft Secure Score, also on Azure Active Directory Identity Protection. you'll then find out how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you'll be introduced to the varied reports that monitor your security health. you'll then transition from security services to threat intelligence; specifically, using the safety Dashboard and Advanced Threat Analytics to remain before potential security breaches.
With your Microsoft 365 security components now firmly in situ , you'll examine the key components of Microsoft 365 compliance management. This begins with an summary of all key aspects of knowledge governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP). you'll then delve deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies within the Security and Compliance Center.
Now that you simply understand the key aspects of knowledge governance, you'll examine the way to implement them, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to guard documents, and creating policy tips. you'll then specialise in managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, also as troubleshooting sensitive data. you'll then find out how to implement Azure Information Protection and Windows Information Protection. you'll conclude this section by learning the way to manage search and investigation, including checking out content within the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.
The course concludes with an in-depth examination of Microsoft 365 device management. you'll begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. you'll find out how to transition from Configuration Manager to Intune, and you'll be introduced to the Microsoft Store for Business and Mobile Application Management. At now , you'll transition from getting to implementing device management; specifically, your Windows 10 deployment strategy. This includes learning the way to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). When examining MDM, you'll find out how to deploy it, the way to enroll devices to MDM, and the way to manage device compliance.
This course is meant for persons who are meaning to the Microsoft 365 Enterprise Admin role and have completed one among the Microsoft 365 role-based administrator certification paths.
In this course you'll find out how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, the way to enable Azure Identity Protection, the way to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. you'll study threat protection technologies that help protect your Microsoft 365 environment. Specifically, you'll study threat vectors and Microsoft’s security solutions to mitigate threats. you'll study Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. within the course you'll study information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, also as labels, policies and rules that support data loss prevention and knowledge protection. Lastly, you'll study archiving and retention in Microsoft 365 also as data governance and the way to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and the way to conduct content searches that support eDiscovery investigations.
The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions suits the policies and regulations of the organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They answer incidents, investigations and enforcement of knowledge governance. The Microsoft 365 Security administrator is conversant in Microsoft 365 workloads and hybrid environments. This role has strong skills and knowledge with identity protection, information protection, threat protection, security management and data governance.
Learners should start this course already having the subsequent skills:
This course covers five central elements of Microsoft 365 platform – implementing Microsoft Identity, working with Microsoft Graph, extending and customizing SharePoint, extending Teams, and increasing Office. during this course, students will find out how to implement Microsoft Identity and work with Microsoft Graph. Students also will gain the knowledge on UI elements (including Adaptive Cards and UI Fabric), Integration Points (including Microsoft Teams, Office Add-ins, SharePoint Framework, Actionable Messages), and determining workload platform targets. In implementing Microsoft Identity, students will learn to implement Microsoft identity including registering an application, implanting authentication, configuring permissions to consume an API, and creating a service to access Microsoft Graph. In working with Microsoft Graph, students will find out how to access user data, explore query parameters, manage a gaggle lifecycle, access files, and optimize network traffic using Microsoft Graph. In extending and customizing SharePoint, students will study SharePoint Framework web parts, extensions, and the way to package and deploy a SPFx solution. In extending Teams, students will check out the components of a Teams App, work with webhooks, tabs, and conversational bots. In extending Office, students work with Office Add-ins, task pane add-ins, JavaScript APIs, Office UI Fabric, and actionable messages with adaptive cards.
Students during this course have an interest in Microsoft 365 development platform or en passant the Microsoft 365 Developer Associate certification exam. Students should even have 1-2 years experience as a developer. This course assumes students skills to code and have a basic understanding of REST APIs, JSON, OAuth2, OData, OpenID Connect, Microsoft identities including Azure AD and Microsoft accounts, Azure AD B2C, and permission/consent concepts.
The Managing Microsoft Teams course is meant for persons who are meaning to the Microsoft 365 Teams Admin role. Microsoft Teams admins configure, deploy, and manage Office 365 workloads for Microsoft Teams that specialise in efficient and effective collaboration and communication in an enterprise environment. This course covers six central elements - Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the environment for a Microsoft Teams deployment, deploying and managing teams, managing collaboration and managing communication in Microsoft Teams. In Microsoft Teams overview, you'll get an summary of Microsoft Teams including Teams architecture and related Office 365 workloads. you'll be provided an summary of security and compliance in Microsoft Teams and eventually get an summary of the way to manage Microsoft Teams. In implementing governance, security and compliance for Microsoft Teams, you'll plan and configure governance for Office 365 groups including expiration and naming policies. Then you'll implement security by configuring conditional access, MFA or Threat Management for Microsoft Teams. Finally, you'll implement compliance for Teams by using DLP policies, eDiscovery cases or supervision policies. In preparing the environment for a Microsoft Teams deployment, you propose an upgrade from Skype for Business to Microsoft Teams by evaluating upgrade paths with coexistence and upgrade modes, manage meeting migrations and configuring coexistence and upgrade settings. Then you propose and configure network settings for Microsoft Teams, and eventually you'll deploy and manage Microsoft Teams endpoints. In deploying and managing teams, you'll find out how to make and manage teams, manage membership and access for both, internal and external users. In managing collaboration in Microsoft Teams, you'll manage chat and collaboration experiences like team settings or private channel creation policies. Finally, you'll manage settings for Teams apps like app setup policies, Apps, bots & connectors in Microsoft Teams or publish a custom app in Microsoft Teams. This course concludes with managing communication in Microsoft Teams. you'll find out how to manage Live event and meetings experiences, manage phone numbers or telephone system for Microsoft Teams and eventually the way to troubleshoot audio, video, and client issues.
Students during this course have an interest in Microsoft Teams or en passant the Microsoft Teams Administrator Associate certification exam.
No prior certifications are required to attend this course.
The Trainer’s extensive background is excellently complimented by hands-on experience in Microsoft 365 right from inception to completion.
The Trainer provides complete freedom to the candidates to explore the subject and learn based on real-time examples. The trainer helps the candidates in completing their projects and prepares them for interview questions and answers. Candidates are free to ask any questions at any time.
Connect Online from Anywhere
Deliver at your Work Location
Customized to your Team’s needs