Duración
20 horas
Temario
- User and Group Management
- Identity and Access Management concepts
- The Zero Trust model
- Plan your identity and authentication solution
- User accounts and roles
- Password Management
- Identity Synchronization and Protection
- Plan directory synchronization
- Configure and manage synchronized identities
- Azure AD Identity Protection
- Identity and Access Management
- Application Management
- Identity Governance
- Manage device access
- Role Based Access Control (RBAC)
- Solutions for external access
- Privileged Identity Management
- Security in Microsoft 365
- Threat vectors and data breaches
- Security strategy and principles
- Microsoft security solutions
- Secure Score
- security posture.
- Threat Protection
- Exchange Online Protection (EOP)
- Microsoft Defender for Office 365
- Manage Safe Attachments
- Manage Safe Links
- Microsoft Defender for Identity
- Microsoft Defender for Endpoint
- Threat Management
- Security dashboard
- Threat investigation and response
- Azure Sentinel
- Advanced Threat Analytics
- Use the attack simulator in Microsoft 365.
- Describe how Azure Sentinel can used for Microsoft 365.
- Microsoft Cloud Application Security
- Deploy Cloud Application Security
- Use cloud application security information
- Mobility
- Mobile Application Management (MAM)
- Mobile Device Management (MDM)
- Deploy mobile device services
- Enroll devices to Mobile Device Management
- Information Protection and Governance
- Governance and Records Management
- Sensitivity labels
- Archiving in Microsoft 365
- Retention in Microsoft 365
- Retention policies in the Microsoft 365 Compliance Center
- Archiving and retention in Exchange
- In-place records management in SharePoint
- Rights Management and Encryption
- Information Rights Management (IRM)
- Secure Multipurpose Internet Mail Extension (S-MIME)
- Office 365 Message Encryption
- Data Loss Prevention
- Data loss prevention fundamentals
- Create a DLP policy
- Customize a DLP policy
- Create a DLP policy to protect documents
- Policy tips
- Compliance Management
- Compliance center
- Insider Risk Management
- Insider Risk
- Privileged Access
- Information barriers
- Building ethical walls in Exchange Online
- Discover and Respond
- Content Search
- Audit Log Investigations
- Advanced eDiscovery