Microsoft 365 Mobility and Security MS101 Overview

Microsoft 365 Mobility and Security MS101 Course Outline

Within this Microsoft training course, you will learn the following modules:

Module 1: Examine Threat Vectors and Data Breaches

  • Introduction
  • Explore Today's Work and Threat Landscape
  • Examine How Phishing Retrieves Sensitive Information
  • Examine How Spoofing Deceives Users and Compromises Data Security
  • Compare Spam and Malware
  • Examine How an Account Breach Compromises a User Account
  • Examine Elevation of Privilege Attacks
  • Examine How Data Exfiltration Moves Data Out of Your Tenant
  • Examine How Attackers Delete Data from your Tenant
  • Examine How Data Spillage Exposes Data Outside your Tenant
  • Examine Other Types of Attacks

Module 2: Explore the Zero Trust Security Model

  • Introduction
  • Examine the Principles and Components of the Zero Trust Model
  • Plan for a Zero Trust Security Model in your Organisation
  • Examine Microsoft's Strategy for Zero Trust Networking
  • Adopt a Zero Trust Approach

Module 3: Explore Security Solutions in Microsoft 365 Defender

  • Introduction
  • Enhance your Email Security Using Microsoft Defender for Office 365
  • Protect your Organisation's Identities Using Microsoft Defender for Identity
  • Protect your Enterprise Network Against Advanced Threats Using Microsoft Defender For Endpoint
  • Protect Against Cyber Attacks Using Microsoft 365 Threat Intelligence
  • Provide Insight into Suspicious Activity Using Microsoft Defender for Cloud Apps
  • Review the Security Reports in Microsoft 365 Defender

Module 4: Examine Microsoft Secure Score

  • Introduction
  • Explore Microsoft Secure Score
  • Examine the Secure Score Dashboard
  • Collect Secure Score Data Using the Secure Score API
  • Improve your Security Posture

Module 5: Examine Privileged Identity Management

  • Introduction
  • Explore Privileged Identity Management in Azure AD
  • Configure Privileged Identity Management
  • Audit Privileged Identity Management
  • Explore Microsoft Identity Manager
  • Control Privileged Admin Tasks Using Privileged Access Management

Module 6: Examine Azure Identity Protection

  • Introduction
  • Explore Azure Identity Protection
  • Enable the Default Protection Policies in AIP
  • Explore the Vulnerabilities and Risk Events Detected by AIP
  • Plan your Identity Investigation

Module 7: Examine Exchange Online Protection

  • Introduction
  • Examine the Anti-Malware Pipeline
  • Detect Messages with Spam or Malware Using Zero-Hour Auto Purge
  • Explore Anti-Spoofing Protection Provided by Exchange Online Protection
  • Explore Other Anti-Spoofing Protection
  • Examine Outbound Spam Filtering

Module 8: Examine Microsoft Defender for Office 365

  • Introduction
  • Climb the Security Ladder from EOP to Microsoft Defender for Office 365
  • Expand EOP Protections by Using Safe Attachments and Safe Links
  • Protect Users from Malicious Attachments by Using Safe Attachments
  • Protect Users from Malicious Urls by Using Safe Links
  • Manage Spoof Intelligence
  • Configure Outbound Spam Filtering Policies
  • Unblock Users from Sending Email

Module 9: Manage Safe Attachments

  • Introduction
  • Create Safe Attachment Policies Using Microsoft Defender for Office 365
  • Create Safe Attachments Policies Using Powershell
  • Modify an Existing Safe Attachments Policy
  • Create a Transport Rule to Bypass a Safe Attachments Policy
  • Examine the End-User Experience with Safe Attachments

Module 10: Manage Safe Links

  • Introduction
  • Create Safe Links Policies Using Microsoft Defender for Office 365
  • Create Safe Links Policies Using Powershell
  • Modify an Existing Safe Links Policy
  • Create a Transport Rule to Bypass a Safe Links Policy
  • Examine the End-User Experience with Safe Links

Module 11: Explore Threat Intelligence in Microsoft 365 Defender

  • Introduction
  • Explore Microsoft Intelligent Security Graph
  • Explore Alert Policies in Microsoft 365
  • Run Automated Investigations and Responses
  • Explore Threat Hunting with Microsoft Threat Protection
  • Explore Advanced Threat Hunting in Microsoft 365 Defender
  • Explore Threat Analytics in Microsoft 365

Module 12: Implement App Protection by Using Microsoft Defender for Cloud Apps

  • Introduction
  • Explore Microsoft Defender For Cloud Apps
  • Deploy Microsoft Defender For Cloud Apps
  • Configure File Policies in Microsoft Defender For Cloud Apps
  • Manage and Respond to Alerts in Microsoft Defender for Cloud Apps
  • Configure Cloud Discovery in Microsoft Defender for Cloud Apps
  • Troubleshoot Cloud Discovery in Microsoft Defender For Cloud Apps

Module 13: Implement Endpoint Protection by Using Microsoft Defender for Endpoint

  • Introduction
  • Explore Microsoft Defender for Endpoint
  • Configure Microsoft Defender for Endpoint in Microsoft Intune
  • Onboard Devices in Microsoft Defender For Endpoint
  • Manage Endpoint Threats and Vulnerabilities
  • Manage Device Discovery and Vulnerability Assessment
  • Reduce your Threat and Vulnerability Exposure

Module 14: Implement Threat Protection by Using Microsoft Defender for Office 365

  • Introduction
  • Explore the Microsoft Defender for Office 365 Protection Stack
  • Investigate Security Attacks by Using Threat Explorer
  • Prepare for Attacks With Attack Simulation Training

Module 15: Examine Governance and Compliance Solutions In Microsoft Purview

  • Introduction
  • Explore Data Governance and Compliance in Microsoft Purview
  • Protect Sensitive Data with Microsoft Purview Information Protection
  • Govern Organisational Data Using Microsoft Purview Data Lifecycle Management
  • Minimise Internal Risks with Microsoft Purview Insider Risk Management
  • Explore Microsoft Purview Ediscovery Solutions

Module 16: Explore Archiving and Records Management in Microsoft 365

  • Introduction
  • Explore Archive Mailboxes in Microsoft 365
  • Enable Archive Mailboxes in Microsoft 365
  • Explore Records Management in Microsoft 365
  • Implement Records Management in Microsoft 365
  • Restore Deleted Data in Exchange Online
  • Restore Deleted Data in Sharepoint Online

Module 17: Explore Retention in Microsoft 365

  • Introduction
  • Explore Retention by Using Retention Policies and Retention Labels
  • Compare Capabilities in Retention Policies and Retention Labels
  • Define the Scope of a Retention Policy
  • Examine the Principles of Retention
  • Implement Retention Using Retention Policies, Retention Labels, and Ediscovery Holds
  • Restrict Retention Changes by Using Preservation Lock

Module 18: Explore Microsoft Purview Message Encryption

  • Introduction
  • Examine Microsoft Purview Message Encryption
  • Configure Microsoft Purview Message Encryption
  • Define Mail Flow Rules to Encrypt Email Messages
  • Add Organisational Branding to Encrypted Email Messages
  • Explore Microsoft Purview Advanced Message Encryption

Module 19: Explore Compliance in Microsoft 365

  • Introduction
  • Plan for Security And Compliance in Microsoft 365
  • Plan Your Beginning Compliance Tasks in Microsoft Purview
  • Manage your Compliance Requirements with Compliance Manager
  • Examine the Compliance Manager Dashboard
  • Analyse The Microsoft Compliance Score

Module 20: Implement Microsoft Purview Insider Risk Management

  • Introduction
  • Explore Insider Risk Management
  • Plan for Insider Risk Management
  • Explore Insider Risk Management Policies
  • Create Insider Risk Management Policies
  • Investigate Insider Risk Management Activities and Alerts
  • Explore Insider Risk Management Cases

Module 21: Create Information Barriers in Microsoft 365

  • Introduction
  • Explore Information Barriers in Microsoft 365
  • Configure Information Barriers
  • Examine Information Barriers in Microsoft Teams
  • Examine Information Barriers in Onedrive
  • Examine Information Barriers in Sharepoint

Module 22: Explore Data Loss Prevention in Microsoft 365

  • Introduction
  • Examine Data Loss Prevention
  • Explore Endpoint Data Loss Prevention
  • Examine DLP Policies
  • View DLP Policy Results
  • Explore DLP Reports

Module 23: Implement Data Loss Prevention Policies

  • Introduction
  • Plan for Data Loss Prevention
  • Implement the Default DLP Policy
  • Design a Custom DLP Policy
  • Create a Custom DLP Policy from a Template
  • Configure Email Notifications for DLP Policies
  • Configure Policy Tips for DLP Policies

Module 24: Implement Data Classification of Sensitive Information

  • Introduction
  • Explore Data Classification of Sensitive Information
  • Implement Data Classification in Microsoft 365
  • Explore Trainable Classifiers
  • Create and Retrain a Trainable Classifier
  • View Sensitive Data Using Content Explorer and Activity Explorer
  • Detect Sensitive Information Documents Using Document Fingerprinting

Module 25: Explore Sensitivity Labels

  • Introduction
  • Manage Data Protection Using Sensitivity Labels
  • Explore What Sensitivity Labels Can Do
  • Determine A Sensitivity Label's Scope
  • Explore Sensitivity Label Policies

Module 26: Implement Sensitivity Labels

  • Introduction
  • Examine the Requirements to Create a Sensitivity Label
  • Plan Your Deployment Strategy for Sensitivity Labels
  • Create Sensitivity Labels
  • Publish Sensitivity Labels
  • Remove and Delete Sensitivity Labels

Module 27: Search for Content in the Microsoft Purview Compliance Portal

  • Introduction
  • Explore Microsoft Purview Ediscovery Solutions
  • Create a Content Search
  • View the Search Results and Statistics
  • Export the Search Results and Search Report
  • Configure Search Permissions Filtering
  • Search for and Delete Email Messages

Module 28: Manage Microsoft Purview Audit (Standard)

  • Introduction
  • Explore Microsoft Purview Audit Solutions
  • Implement Microsoft Purview Audit (Standard)
  • Search the Audit Log
  • Export, Configure, and View Audit Log Records
  • Use Audit Log Searching to Investigate Common Support Issues

Module 29: Manage Microsoft Purview Audit (Premium)

  • Introduction
  • Explore Microsoft Purview Audit (Premium)
  • Implement Microsoft Purview Audit (Premium)
  • Manage Audit Log Retention Policies
  • Investigate Compromised Email Accounts

Module 30: Manage Microsoft Purview eDiscovery (Standard)

  • Introduction
  • Explore Microsoft Purview Ediscovery Solutions
  • Implement Microsoft Purview Ediscovery (Standard)
  • Create Ediscovery Holds
  • Search for Content in a Case
  • Export Content from a Case
  • Close, Reopen, And Delete a Case

Module 31: Manage Microsoft Purview eDiscovery (Premium)

  • Introduction
  • Explore Microsoft Purview Ediscovery (Premium)
  • Implement Microsoft Purview Ediscovery (Premium)
  • Create and Manage an Ediscovery (Premium) Case
  • Manage Custodians and Non-Custodial Data Sources
  • Analyse Case Content

Module 32: Explore Device Management Using Microsoft Endpoint Manager

  • Introduction
  • Explore Device Management in Microsoft Endpoint Manager
  • Explore Co-Management of Windows Devices
  • Manage Devices Using Configuration Manager
  • Manage Devices Using Microsoft Intune
  • Create Device Profiles in Microsoft Intune

Module 33: Prepare your Windows Devices for Co-Management

  • Introduction
  • Plan your Co-Management Strategy
  • Explore the Prerequisites for Using Co-Management
  • Configure Configuration Manager for Co-Management
  • Enroll Windows 10 Devices to Intune
  • Modify your Co-Management Settings
  • Transfer Workload Management from Configuration Manager to Intune

Module 34: Plan for Mobile Application Management in Microsoft Intune

  • Introduction
  • Explore Mobile Application Management in Microsoft Intune
  • Add Apps to Microsoft Intune
  • Protect Company Data by Using App Protection Policies
  • Explore App Configuration Policies for Intune
  • Troubleshoot App Protection Policy Deployment in Intune

Module 35: Examine Windows Client Deployment Scenarios

  • Introduction
  • Explore Windows as a Service
  • Explore the Windows Client Deployment Models
  • Examine the Modern Deployment Methods
  • Examine the Dynamic Deployment Methods
  • Examine the Traditional Deployment Methods

Module 36: Explore Windows Autopilot Deployment Models

  • Introduction
  • Explore Windows Autopilot
  • Examine the Windows Autopilot Prerequisites
  • Plan the Settings for Windows Autopilot Profiles
  • Examine the Windows Autopilot Self-Deployment Model
  • Examine the Windows Autopilot Pre-Provisioned Deployment Model
  • Examine the Windows Autopilot User-Driven Deployment Model
  • Deploy Bitlocker Encryption for Autopiloted Devices

Module 37: Plan your Windows Client Subscription Activation Strategy

  • Introduction
  • Explore Windows 10/11 Enterprise E3 Availability Through the Cloud Service Provider Channel
  • Configure Virtual Desktop Access for Automatic Subscription Activation on Virtual Machines
  • Deploy Windows 10/11 Enterprise Licenses

Module 38: Explore Mobile Device Management

  • Introduction
  • Explore Mobile Device Management in Microsoft 365
  • Explore the Mobile Device Management Services in Microsoft 365
  • Examine the Mobile Device Management Policy Settings in Microsoft 365
  • Examine How Email and Document Access are Controlled on Mobile Device-Managed Devices

Module 39: Deploy Mobile Device Management

  • Introduction
  • Activate the Mobile Device Management Services in Microsoft 365
  • Configure Domains for Mobile Device Management
  • Obtain an Apple Push Notification Service Certificate for Ios Devices
  • Manage Security Policies for Mobile Device-Managed Devices
  • Define a Corporate Device Enrollment Policy

Module 40: Enroll Devices to Mobile Device Management

  • Introduction
  • Review Device Enrollment Methods
  • Examine Azure AD Registered Devices
  • Explore Azure AD Joined Devices
  • Explore Hybrid Azure AD Joined Devices
  • Examine Device Enrollment in Intune
  • Examine Device Enrollment Capabilities
  • Set Up Enrollment for Windows Devices

Module 41: Manage Device Compliance

  • Introduction
  • Plan for Device Compliance
  • Implement Compliance Policies for Intune Managed Devices
  • Monitor Results of your Intune Device Compliance Policies
  • Implement User and Device Groups to Monitor Device Compliance
  • Explore Conditional Access Policies
  • Build Conditional Access Policies
  • Monitor Enrolled Devices

Module 42: Implement Endpoint Security in Microsoft Intune

  • Introduction
  • Protect Data and Devices with Microsoft Intune
  • Explore Endpoint Security in Microsoft Intune
  • Manage Devices with Endpoint Security in Intune
  • Use Security Baselines to Configure Windows Devices in Intune
  • Manage Security Baseline Profiles in Microsoft Intune
  • Implement Attack Surface Reduction Rules

Show moredowndown

Who should attend this Microsoft 365 Mobility and Security MS101 Training Course?

The Microsoft 365 Mobility and Security MS101 Course is designed for IT professionals and administrators who want to learn how to manage and secure Microsoft 365 services and devices, particularly focusing on mobility and security aspects. A variety of professionals can benefit from this course, such as:

  • Security Administrators
  • IT Security Specialists
  • Cybersecurity Professionals
  • Network Administrators
  • Compliance Officers
  • Technical Consultants
  • Security Analysts

Prerequisites of the Microsoft 365 Mobility and Security MS101 Training Course

Before attending this course, delegates must have:

  • Completed a role-based Administrator Course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

Microsoft 365 Mobility and Security MS101 Course Overview

In an era where digital mobility and security are paramount, the Microsoft Training, specifically the Microsoft 365 Mobility and Security MS101 Course, holds significant relevance. This course delves into the critical aspects of managing and securing enterprise environments within the Microsoft 365 ecosystem, a necessity in today's technologically driven workplace.

Understanding the intricacies of Microsoft 365 Mobility and Security is vital for IT Professionals, Security Analysts, and System Administrators. These professionals are tasked with safeguarding organisational data while facilitating seamless remote work and collaboration. Mastering this subject through Microsoft 365 Courses is essential for ensuring robust security protocols and efficient management of digital workspaces.

The Knowledge Academy's 5-day Course on Mobility and Security is a concentrated effort to empower delegates with practical knowledge and skills. This certification-focused training is designed to equip professionals with the expertise needed to manage and secure a Microsoft 365 environment effectively, ensuring both productivity and compliance.

Course Objectives:

  • To understand the key concepts and functionalities of Microsoft 365 mobility and security solutions
  • To learn how to implement various security strategies within the Microsoft 365 framework
  • To gain insights into threat protection and data governance in a Microsoft 365 environment
  • To develop skills in managing device and application security within an enterprise setting
  • To comprehend compliance protocols and how they apply in Microsoft 365
  • To prepare for the Microsoft 365 Certification by mastering the course content and its practical applications

Upon completing this course, delegates will be well-equipped with the knowledge and practical skills essential for managing mobility and security within a Microsoft 365 setup. This expertise will not only enhance their professional capabilities but also open doors for career advancement in the field of IT security and management.

Show moredowndown

What’s included in this Microsoft 365 Mobility and Security MS101 Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Digital Delegate Pack

Show moredowndown

Why choose us

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Microsoft 365 Mobility and Security MS101. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

Unlock your potential with The Knowledge Academy's Microsoft 365 Mobility and Security MS101, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

Experience the most sought-after learning style with The Knowledge Academy's Microsoft 365 Mobility and Security MS101. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led Microsoft 365 Mobility and Security MS101 sessions.

best_trainers

Highly experienced trainers

Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment

value_for_money

Great value for money

Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value

Streamline large-scale training requirements with The Knowledge Academy’s In-house/Onsite Microsoft 365 Mobility and Security MS101 at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored_learning_experience

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

Our Microsoft 365 Mobility and Security MS101 offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor_progress

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

What our customers are saying

Microsoft 365 Mobility and Security MS101 FAQs

Please arrive at the venue at 8:45am.
There are no pre-requisites for this course.
This course is for IT Professionals who want to learn about Microsoft Technologies.
We are able to provide support via phone & email prior to attending, during and after the course.
Delegate pack consisting of course notes and exercises, Manual, Experienced Instructor, and Refreshments
This course is 5 days.
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts
The training fees for Microsoft 365 Mobility and Security MS101 certification in New Zealand starts from NZD6195
The Knowledge Academy is the Leading global training provider for Microsoft 365 Mobility and Security MS101.
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Trusted & Approved

The Knowledge Academy are a Microsoft Silver Partner and are therefore fully accredited.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Microsoft 365 Training?

Microsoft 365 Mobility And Security MS101 in New Zealand

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +64 98874342 and speak to our training experts, we should be able to help you with your requirements.

cross

Unlock Exceptional Learning at Unbeatable Prices!

Special Discounts

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.