Duración

20 horas

Temario

  1. User and Group Management
  • Identity and Access Management concepts
  • The Zero Trust model
  • Plan your identity and authentication solution
  • User accounts and roles
  • Password Management
  1. Identity Synchronization and Protection
  • Plan directory synchronization
  • Configure and manage synchronized identities
  • Azure AD Identity Protection
  1. Identity and Access Management
  • Application Management
  • Identity Governance
  • Manage device access
  • Role Based Access Control (RBAC)
  • Solutions for external access
  • Privileged Identity Management
  1. Security in Microsoft 365
  • Threat vectors and data breaches
  • Security strategy and principles
  • Microsoft security solutions
  • Secure Score
  • security posture.
  1. Threat Protection
  • Exchange Online Protection (EOP)
  • Microsoft Defender for Office 365
  • Manage Safe Attachments
  • Manage Safe Links
  • Microsoft Defender for Identity
  • Microsoft Defender for Endpoint
  1. Threat Management
  • Security dashboard
  • Threat investigation and response
  • Azure Sentinel
  • Advanced Threat Analytics
  • Use the attack simulator in Microsoft 365.
  • Describe how Azure Sentinel can used for Microsoft 365.
  1. Microsoft Cloud Application Security
  • Deploy Cloud Application Security
  • Use cloud application security information
  1. Mobility
  • Mobile Application Management (MAM)
  • Mobile Device Management (MDM)
  • Deploy mobile device services
  • Enroll devices to Mobile Device Management
  1. Information Protection and Governance
  • Governance and Records Management
  • Sensitivity labels
  • Archiving in Microsoft 365
  • Retention in Microsoft 365
  • Retention policies in the Microsoft 365 Compliance Center
  • Archiving and retention in Exchange
  • In-place records management in SharePoint
  1. Rights Management and Encryption
  • Information Rights Management (IRM)
  • Secure Multipurpose Internet Mail Extension (S-MIME)
  • Office 365 Message Encryption
  1. Data Loss Prevention
  • Data loss prevention fundamentals
  • Create a DLP policy
  • Customize a DLP policy
  • Create a DLP policy to protect documents
  • Policy tips
  1. Compliance Management
  • Compliance center
  1. Insider Risk Management
  • Insider Risk
  • Privileged Access
  • Information barriers
  • Building ethical walls in Exchange Online
  1. Discover and Respond
  • Content Search
  • Audit Log Investigations
  • Advanced eDiscovery

Solicita  información

    Política de Privacidad