cross

BIGGEST CHRISTMAS SALE !

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Microsoft 365 Mobility and Security MS101 Course Outline

Within this Microsoft training course, you will learn the following modules:

Module 1: Examine Threat Vectors and Data Breaches

  • Introduction
  • Explore Today's Work and Threat Landscape
  • Examine How Phishing Retrieves Sensitive Information
  • Examine How Spoofing Deceives Users and Compromises Data Security
  • Compare Spam and Malware
  • Examine How an Account Breach Compromises a User Account
  • Examine Elevation of Privilege Attacks
  • Examine How Data Exfiltration Moves Data Out of Your Tenant
  • Examine How Attackers Delete Data from your Tenant
  • Examine How Data Spillage Exposes Data Outside your Tenant
  • Examine Other Types of Attacks

Module 2: Explore the Zero Trust Security Model

  • Introduction
  • Examine the Principles and Components of the Zero Trust Model
  • Plan for a Zero Trust Security Model in your Organisation
  • Examine Microsoft's Strategy for Zero Trust Networking
  • Adopt a Zero Trust Approach

Module 3: Explore Security Solutions in Microsoft 365 Defender

  • Introduction
  • Enhance your Email Security Using Microsoft Defender for Office 365
  • Protect your Organisation's Identities Using Microsoft Defender for Identity
  • Protect your Enterprise Network Against Advanced Threats Using Microsoft Defender For Endpoint
  • Protect Against Cyber Attacks Using Microsoft 365 Threat Intelligence
  • Provide Insight into Suspicious Activity Using Microsoft Defender for Cloud Apps
  • Review the Security Reports in Microsoft 365 Defender

Module 4: Examine Microsoft Secure Score

  • Introduction
  • Explore Microsoft Secure Score
  • Examine the Secure Score Dashboard
  • Collect Secure Score Data Using the Secure Score API
  • Improve your Security Posture

Module 5: Examine Privileged Identity Management

  • Introduction
  • Explore Privileged Identity Management in Azure AD
  • Configure Privileged Identity Management
  • Audit Privileged Identity Management
  • Explore Microsoft Identity Manager
  • Control Privileged Admin Tasks Using Privileged Access Management

Module 6: Examine Azure Identity Protection

  • Introduction
  • Explore Azure Identity Protection
  • Enable the Default Protection Policies in AIP
  • Explore the Vulnerabilities and Risk Events Detected by AIP
  • Plan your Identity Investigation

Module 7: Examine Exchange Online Protection

  • Introduction
  • Examine the Anti-Malware Pipeline
  • Detect Messages with Spam or Malware Using Zero-Hour Auto Purge
  • Explore Anti-Spoofing Protection Provided by Exchange Online Protection
  • Explore Other Anti-Spoofing Protection
  • Examine Outbound Spam Filtering

Module 8: Examine Microsoft Defender for Office 365

  • Introduction
  • Climb the Security Ladder from EOP to Microsoft Defender for Office 365
  • Expand EOP Protections by Using Safe Attachments and Safe Links
  • Protect Users from Malicious Attachments by Using Safe Attachments
  • Protect Users from Malicious Urls by Using Safe Links
  • Manage Spoof Intelligence
  • Configure Outbound Spam Filtering Policies
  • Unblock Users from Sending Email

Module 9: Manage Safe Attachments

  • Introduction
  • Create Safe Attachment Policies Using Microsoft Defender for Office 365
  • Create Safe Attachments Policies Using Powershell
  • Modify an Existing Safe Attachments Policy
  • Create a Transport Rule to Bypass a Safe Attachments Policy
  • Examine the End-User Experience with Safe Attachments

Module 10: Manage Safe Links

  • Introduction
  • Create Safe Links Policies Using Microsoft Defender for Office 365
  • Create Safe Links Policies Using Powershell
  • Modify an Existing Safe Links Policy
  • Create a Transport Rule to Bypass a Safe Links Policy
  • Examine the End-User Experience with Safe Links

Module 11: Explore Threat Intelligence in Microsoft 365 Defender

  • Introduction
  • Explore Microsoft Intelligent Security Graph
  • Explore Alert Policies in Microsoft 365
  • Run Automated Investigations and Responses
  • Explore Threat Hunting with Microsoft Threat Protection
  • Explore Advanced Threat Hunting in Microsoft 365 Defender
  • Explore Threat Analytics in Microsoft 365

Module 12: Implement App Protection by Using Microsoft Defender for Cloud Apps

  • Introduction
  • Explore Microsoft Defender For Cloud Apps
  • Deploy Microsoft Defender For Cloud Apps
  • Configure File Policies in Microsoft Defender For Cloud Apps
  • Manage and Respond to Alerts in Microsoft Defender for Cloud Apps
  • Configure Cloud Discovery in Microsoft Defender for Cloud Apps
  • Troubleshoot Cloud Discovery in Microsoft Defender For Cloud Apps

Module 13: Implement Endpoint Protection by Using Microsoft Defender for Endpoint

  • Introduction
  • Explore Microsoft Defender for Endpoint
  • Configure Microsoft Defender for Endpoint in Microsoft Intune
  • Onboard Devices in Microsoft Defender For Endpoint
  • Manage Endpoint Threats and Vulnerabilities
  • Manage Device Discovery and Vulnerability Assessment
  • Reduce your Threat and Vulnerability Exposure

Module 14: Implement Threat Protection by Using Microsoft Defender for Office 365

  • Introduction
  • Explore the Microsoft Defender for Office 365 Protection Stack
  • Investigate Security Attacks by Using Threat Explorer
  • Prepare for Attacks With Attack Simulation Training

Module 15: Examine Governance and Compliance Solutions In Microsoft Purview

  • Introduction
  • Explore Data Governance and Compliance in Microsoft Purview
  • Protect Sensitive Data with Microsoft Purview Information Protection
  • Govern Organisational Data Using Microsoft Purview Data Lifecycle Management
  • Minimise Internal Risks with Microsoft Purview Insider Risk Management
  • Explore Microsoft Purview Ediscovery Solutions

Module 16: Explore Archiving and Records Management in Microsoft 365

  • Introduction
  • Explore Archive Mailboxes in Microsoft 365
  • Enable Archive Mailboxes in Microsoft 365
  • Explore Records Management in Microsoft 365
  • Implement Records Management in Microsoft 365
  • Restore Deleted Data in Exchange Online
  • Restore Deleted Data in Sharepoint Online

Module 17: Explore Retention in Microsoft 365

  • Introduction
  • Explore Retention by Using Retention Policies and Retention Labels
  • Compare Capabilities in Retention Policies and Retention Labels
  • Define the Scope of a Retention Policy
  • Examine the Principles of Retention
  • Implement Retention Using Retention Policies, Retention Labels, and Ediscovery Holds
  • Restrict Retention Changes by Using Preservation Lock

Module 18: Explore Microsoft Purview Message Encryption

  • Introduction
  • Examine Microsoft Purview Message Encryption
  • Configure Microsoft Purview Message Encryption
  • Define Mail Flow Rules to Encrypt Email Messages
  • Add Organisational Branding to Encrypted Email Messages
  • Explore Microsoft Purview Advanced Message Encryption

Module 19: Explore Compliance in Microsoft 365

  • Introduction
  • Plan for Security And Compliance in Microsoft 365
  • Plan Your Beginning Compliance Tasks in Microsoft Purview
  • Manage your Compliance Requirements with Compliance Manager
  • Examine the Compliance Manager Dashboard
  • Analyse The Microsoft Compliance Score

Module 20: Implement Microsoft Purview Insider Risk Management

  • Introduction
  • Explore Insider Risk Management
  • Plan for Insider Risk Management
  • Explore Insider Risk Management Policies
  • Create Insider Risk Management Policies
  • Investigate Insider Risk Management Activities and Alerts
  • Explore Insider Risk Management Cases

Module 21: Create Information Barriers in Microsoft 365

  • Introduction
  • Explore Information Barriers in Microsoft 365
  • Configure Information Barriers
  • Examine Information Barriers in Microsoft Teams
  • Examine Information Barriers in Onedrive
  • Examine Information Barriers in Sharepoint

Module 22: Explore Data Loss Prevention in Microsoft 365

  • Introduction
  • Examine Data Loss Prevention
  • Explore Endpoint Data Loss Prevention
  • Examine DLP Policies
  • View DLP Policy Results
  • Explore DLP Reports

Module 23: Implement Data Loss Prevention Policies

  • Introduction
  • Plan for Data Loss Prevention
  • Implement the Default DLP Policy
  • Design a Custom DLP Policy
  • Create a Custom DLP Policy from a Template
  • Configure Email Notifications for DLP Policies
  • Configure Policy Tips for DLP Policies

Module 24: Implement Data Classification of Sensitive Information

  • Introduction
  • Explore Data Classification of Sensitive Information
  • Implement Data Classification in Microsoft 365
  • Explore Trainable Classifiers
  • Create and Retrain a Trainable Classifier
  • View Sensitive Data Using Content Explorer and Activity Explorer
  • Detect Sensitive Information Documents Using Document Fingerprinting

Module 25: Explore Sensitivity Labels

  • Introduction
  • Manage Data Protection Using Sensitivity Labels
  • Explore What Sensitivity Labels Can Do
  • Determine A Sensitivity Label's Scope
  • Explore Sensitivity Label Policies

Module 26: Implement Sensitivity Labels

  • Introduction
  • Examine the Requirements to Create a Sensitivity Label
  • Plan Your Deployment Strategy for Sensitivity Labels
  • Create Sensitivity Labels
  • Publish Sensitivity Labels
  • Remove and Delete Sensitivity Labels

Module 27: Search for Content in the Microsoft Purview Compliance Portal

  • Introduction
  • Explore Microsoft Purview Ediscovery Solutions
  • Create a Content Search
  • View the Search Results and Statistics
  • Export the Search Results and Search Report
  • Configure Search Permissions Filtering
  • Search for and Delete Email Messages

Module 28: Manage Microsoft Purview Audit (Standard)

  • Introduction
  • Explore Microsoft Purview Audit Solutions
  • Implement Microsoft Purview Audit (Standard)
  • Search the Audit Log
  • Export, Configure, and View Audit Log Records
  • Use Audit Log Searching to Investigate Common Support Issues

Module 29: Manage Microsoft Purview Audit (Premium)

  • Introduction
  • Explore Microsoft Purview Audit (Premium)
  • Implement Microsoft Purview Audit (Premium)
  • Manage Audit Log Retention Policies
  • Investigate Compromised Email Accounts

Module 30: Manage Microsoft Purview eDiscovery (Standard)

  • Introduction
  • Explore Microsoft Purview Ediscovery Solutions
  • Implement Microsoft Purview Ediscovery (Standard)
  • Create Ediscovery Holds
  • Search for Content in a Case
  • Export Content from a Case
  • Close, Reopen, And Delete a Case

Module 31: Manage Microsoft Purview eDiscovery (Premium)

  • Introduction
  • Explore Microsoft Purview Ediscovery (Premium)
  • Implement Microsoft Purview Ediscovery (Premium)
  • Create and Manage an Ediscovery (Premium) Case
  • Manage Custodians and Non-Custodial Data Sources
  • Analyse Case Content

Module 32: Explore Device Management Using Microsoft Endpoint Manager

  • Introduction
  • Explore Device Management in Microsoft Endpoint Manager
  • Explore Co-Management of Windows Devices
  • Manage Devices Using Configuration Manager
  • Manage Devices Using Microsoft Intune
  • Create Device Profiles in Microsoft Intune

Module 33: Prepare your Windows Devices for Co-Management

  • Introduction
  • Plan your Co-Management Strategy
  • Explore the Prerequisites for Using Co-Management
  • Configure Configuration Manager for Co-Management
  • Enroll Windows 10 Devices to Intune
  • Modify your Co-Management Settings
  • Transfer Workload Management from Configuration Manager to Intune

Module 34: Plan for Mobile Application Management in Microsoft Intune

  • Introduction
  • Explore Mobile Application Management in Microsoft Intune
  • Add Apps to Microsoft Intune
  • Protect Company Data by Using App Protection Policies
  • Explore App Configuration Policies for Intune
  • Troubleshoot App Protection Policy Deployment in Intune

Module 35: Examine Windows Client Deployment Scenarios

  • Introduction
  • Explore Windows as a Service
  • Explore the Windows Client Deployment Models
  • Examine the Modern Deployment Methods
  • Examine the Dynamic Deployment Methods
  • Examine the Traditional Deployment Methods

Module 36: Explore Windows Autopilot Deployment Models

  • Introduction
  • Explore Windows Autopilot
  • Examine the Windows Autopilot Prerequisites
  • Plan the Settings for Windows Autopilot Profiles
  • Examine the Windows Autopilot Self-Deployment Model
  • Examine the Windows Autopilot Pre-Provisioned Deployment Model
  • Examine the Windows Autopilot User-Driven Deployment Model
  • Deploy Bitlocker Encryption for Autopiloted Devices

Module 37: Plan your Windows Client Subscription Activation Strategy

  • Introduction
  • Explore Windows 10/11 Enterprise E3 Availability Through the Cloud Service Provider Channel
  • Configure Virtual Desktop Access for Automatic Subscription Activation on Virtual Machines
  • Deploy Windows 10/11 Enterprise Licenses

Module 38: Explore Mobile Device Management

  • Introduction
  • Explore Mobile Device Management in Microsoft 365
  • Explore the Mobile Device Management Services in Microsoft 365
  • Examine the Mobile Device Management Policy Settings in Microsoft 365
  • Examine How Email and Document Access are Controlled on Mobile Device-Managed Devices

Module 39: Deploy Mobile Device Management

  • Introduction
  • Activate the Mobile Device Management Services in Microsoft 365
  • Configure Domains for Mobile Device Management
  • Obtain an Apple Push Notification Service Certificate for Ios Devices
  • Manage Security Policies for Mobile Device-Managed Devices
  • Define a Corporate Device Enrollment Policy

Module 40: Enroll Devices to Mobile Device Management

  • Introduction
  • Review Device Enrollment Methods
  • Examine Azure AD Registered Devices
  • Explore Azure AD Joined Devices
  • Explore Hybrid Azure AD Joined Devices
  • Examine Device Enrollment in Intune
  • Examine Device Enrollment Capabilities
  • Set Up Enrollment for Windows Devices

Module 41: Manage Device Compliance

  • Introduction
  • Plan for Device Compliance
  • Implement Compliance Policies for Intune Managed Devices
  • Monitor Results of your Intune Device Compliance Policies
  • Implement User and Device Groups to Monitor Device Compliance
  • Explore Conditional Access Policies
  • Build Conditional Access Policies
  • Monitor Enrolled Devices

Module 42: Implement Endpoint Security in Microsoft Intune

  • Introduction
  • Protect Data and Devices with Microsoft Intune
  • Explore Endpoint Security in Microsoft Intune
  • Manage Devices with Endpoint Security in Intune
  • Use Security Baselines to Configure Windows Devices in Intune
  • Manage Security Baseline Profiles in Microsoft Intune
  • Implement Attack Surface Reduction Rules

Show moredowndown

Who should attend this Microsoft 365 Mobility and Security MS101 Training Course?

The Microsoft 365 Mobility and Security MS101 Course is designed for IT professionals and administrators who want to learn how to manage and secure Microsoft 365 services and devices, particularly focusing on mobility and security aspects. A variety of professionals can benefit from this course, such as:

  • Security Administrators
  • IT Security Specialists
  • Cybersecurity Professionals
  • Network Administrators
  • Compliance Officers
  • Technical Consultants
  • Security Analysts

Prerequisites of the Microsoft 365 Mobility and Security MS101 Training Course

Before attending this course, participants must have:

  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

Microsoft 365 Mobility and Security MS101 Course Overview

This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management.

This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center. Now that you understand the key aspects of data governance, you will examine how to implement them, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. You will then focus on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection. You will conclude this section by learning how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery. The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management. At this point, you will transition from planning to implementing device management; specifically, your Windows 10 deployment strategy. This includes learning how to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). When examining MDM, you will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.

What will you learn from taking this Microsoft training course?

  • Microsoft 365 Security Metrics
  • Microsoft 365 Security Services
  • Microsoft 365 Threat Intelligence
  • Data Governance in Microsoft 365
  • Data Governance in Microsoft 365 Intelligence
  • Search and Investigations
  • Device Management
  • Windows 10 Deployment Strategies
  • Mobile Device Management

Show moredowndown

 

What’s included in this Microsoft 365 Mobility and Security MS101 Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Digital Delegate Pack

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.

best_trainers

Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience

value_for_money

Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.

tailored_learning_experience

Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.

monitor_progress

Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

Microsoft 365 Mobility and Security MS101 FAQs

Please arrive at the venue at 8:45am.
There are no pre-requisites for this course.
This course is for IT Professionals who want to learn about Microsoft Technologies.
We are able to provide support via phone & email prior to attending, during and after the course.
Delegate pack consisting of course notes and exercises, Manual, Experienced Instructor, and Refreshments
This course is 5 days.
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts
The price for Microsoft 365 Mobility and Security MS101 certification in the United Kingdom starts from £3295
The Knowledge Academy is the Leading global training provider for Microsoft 365 Mobility and Security MS101.

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Trusted & Approved

The Knowledge Academy are a Microsoft Silver Partner and are therefore fully accredited.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Microsoft 365 Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on 01344203999 and speak to our training experts, we should be able to help you with your requirements.