Schedule

Training Course Schedule
SC-400: Implement Information Protection in Microsoft 365

Code: ED24B15
Type: IT InstructorLed Courses
Category: Microsoft Exchange Server 2007 and 2010
Course: SC-400: Implement Information Protection in Microsoft 365
Date: 6 Nov 2024 08:15 - 23 Nov 2024 16:00

Organizations require information protection solutions to protect their data against theft and accidental loss. Learn how to protect your sensitive information. This learning path aligns with exam SC-400: Microsoft Information Protection Administrator.



Duration: 42 hours
Location: Webinar by EDITC
Language: Greek
Attendance: 4-16
Speaker: Maria Knais
 

Price: €1,190.00
Subsidy: €840.00
Total: €350.00
Topics

Module 1: Introduction to Information

Protection and Data

Lifecycle Management in Microsoft Purview

Module 1: Introduction to Information Protection and Data Lifecycle Management in Microsoft Purview

• Introduction to Information Protection and Data Lifecycle Management

• Know Your Data

• Protect Your Data

• Prevent Data Loss

• Govern Your Data

Module 2: Classify Data for Protection and Governance

• Data Classification Overview

• Classify Data Using Sensitive Information Types

• Classify Data Using Trainable Classifiers

• Review Sensitive Information and Label Usage

• Explore Labelled and Sensitive Content

• Understand Activities Related to Your Data

Module 3: Create and Manage Sensitive Information Types

• Introduction

• Compare Built-In Versus Custom Sensitive Information Types

• Create and Manage Custom Sensitive Information Types

• Describe Custom Sensitive Information Types with Exact Data Match

• Implement Document Fingerprinting

• Create Keyword Dictionary

Module 4: Understand Microsoft 365 Encryption

• Introduction to Microsoft 365 Encryption

• Learn How Microsoft 365 Data Is Encrypted at Rest

• Understand Service Encryption in Microsoft Purview

• Explore Customer Key Management Using Customer Key

• Learn How Data Is Encrypted In-Transit

Module 5: Deploy Microsoft Purview Message Encryption

• Introduction to Microsoft 365 Encryption

• Learn How Microsoft 365 Data Is Encrypted at Rest

• Understand Service Encryption in Microsoft Purview

• Explore Customer Key Management Using Customer Key

• Learn How Data Is Encrypted In-Transit

Module 6: Protect Information in Microsoft Purview

• Information Protection Overview

• Configure Sensitivity Labels

• Configure Sensitivity Label Policies

• Configure Auto-Labelling Policies

• Manage, Monitor, and Remediate Information Protection

Module 7: Apply and Manage Sensitivity Labels

• Introduction

• Apply Sensitivity Labels to Microsoft Teams, Microsoft 365 Groups, and SharePoint Sites

• Plan On-Premises Labelling

• Configure On-Premises Labelling for the Unified Labelling Scanner

• Apply Protections and Restrictions to Email and Files

• Monitor Label Performance Using Label Analytics

Module 8: Prevent Data Loss in Microsoft Purview

• Introduction

• Data Loss Prevention Overview

• Identify Content to Protect

• Define Policy Settings for Your DLP Policy

• Test and Create Your DLP Policy

• Prepare Endpoint DLP

• Manage DLP Alerts in the Microsoft Purview Compliance Portal

• View Data Loss Prevention Reports

• Implement the Microsoft Purview Extension

Module 9: Configure DLP Policies for Microsoft Defender for Cloud Apps and Power Platform

• Introduction

• Configure Data Loss Prevention Policies for Power Platform

• Integrate Data Loss Prevention in Microsoft Defender for Cloud Apps

• Configure Policies in Microsoft Defender for Cloud Apps

• Manage Data Loss Prevention Violations in Microsoft Defender for Cloud Apps

Module 10: Manage Data Loss Prevention Policies and Reports in Microsoft 365

• Introduction

• Configure Data Loss Prevention for Policy Precedence

• Implement Data Loss Prevention Policies in Test Mode

• Explain Data Loss Prevention Reporting Capabilities

• Manage Permissions for Data Loss Prevention Reports

• Manage and Respond to Data Loss Prevention Policy Violations

Module 11: Manage the Data Lifecycle in Microsoft Purview

• Data Lifecycle Management Overview

• Configure Retention Policies

• Configure Retention Labels

• Configure Manual Retention Label Policies

• Configure Auto-Apply Retention Label Policies

• Import Data for Data Lifecycle Management

• Manage, Monitor, and Remediate Data Lifecycle Management

Module 12: Manage Data Retention in Microsoft 365 Workloads

• Introduction

• Explain Retention in Exchange Online

• Explain Retention in SharePoint Online and OneDrive

• Explain Retention in Microsoft Teams

• Explain Retention in Microsoft Yammer

• Recover Content in Microsoft 365 Workloads

• Activate Archive Mailboxes in Microsoft Exchange

• Apply Mailbox Holds in Microsoft Exchange

• Recover Content in Microsoft Exchange

Module 13: Manage Records in Microsoft Purview

• Introduction

• Records Management Overview

• Import a File Plan

• Configure Retention Labels

• Configure Event-Driven Retention

• Manage, Monitor, and Remediate Records

Module 14: Explore Compliance in Microsoft 365

• Introduction

• Plan for Security and Compliance in Microsoft 365

• Plan Your Beginning Compliance Tasks in Microsoft Purview

• Manage Your Compliance Requirements with Compliance Manager

• Examine the Compliance Manager Dashboard

• Analyse the Microsoft Compliance Score

Module 15: Search for Content in the Microsoft Purview Compliance Portal

• Introduction

• Explore Microsoft Purview eDiscovery Solutions

• Create a Content Search

• View the Search Results and Statistics

• Export the Search Results and Search Report

• Configure Search Permissions Filtering

• Search for and Delete Email Messages

Module 16: Manage Microsoft Purview eDiscovery (Standard)

• Introduction

• Explore Microsoft Purview eDiscovery Solutions

• Implement Microsoft Purview eDiscovery (Standard)

• Create eDiscovery Holds

• Search for Content in a Case

• Export Content from a Case

• Close, Reopen, and Delete a Case

Module 17: Manage Microsoft Purview eDiscovery (Premium)

• Introduction

• Explore Microsoft Purview eDiscovery (Premium)

• Implement Microsoft Purview eDiscovery (Premium)

• Create and Manage an eDiscovery (Premium) Case

• Manage Custodians and Non-Custodial Data Sources

• Analyse Case Content

Module 18: Manage Microsoft Purview Audit (Standard)

• Introduction

• Explore Microsoft Purview Audit Solutions

• Implement Microsoft Purview Audit (Standard)

• Search the Audit Log

• Export, Configure, and View Audit Log Records

• Use Audit Log Searching to Investigate Common Support Issues

Module 19: Prepare Microsoft Purview Communication Compliance

• Introduction to Communication Compliance

• Plan for Communication Compliance

• Identify and Resolve Communication Compliance Workflow

• Introduction to Communication Compliance Policies

• Knowledge Check

• Case Study: Configure an Offensive Language Policy

• Investigate and Remediate Communication Compliance Alerts

Module 20: Manage Insider Risk in Microsoft Purview

• Insider Risk Management Overview

• Introduction to Managing Insider Risk Policies

• Create and Manage Insider Risk Policies

• Knowledge Check

• Investigate Insider Risk Alerts

• Take Action on Insider Risk Alerts Through Cases

• Manage Insider Risk Management Forensic Evidence

• Create Insider Risk Management Notice Templates

Module 21: Implement Microsoft Purview Information Barriers

• Introduction

• Explore Microsoft Purview Information Barriers

• Configure Information Barriers in Microsoft Purview

• Examine Information Barriers in Microsoft Teams

• Examine Information Barriers in OneDrive

• Examine Information Barriers in SharePoint

Module 22: Manage Regulatory and Privacy Requirements with Microsoft Priva

• Introduction

• Create and Manage Risk Management Policies

• Investigate and Remediate Risk Management Alerts

• Create Rights Requests

• Manage Data Estimate and Retrieval for Rights Requests

• Review Data from Rights Requests

• Get Reports from Rights Requests

Module 23: Implement Privileged Access Management

• Introduction to Privileged Access Management

• Case Study: Implementing Privileged Access Management

• Introduction to Customer Lockbox

• Manage Customer Lockbox Requests



Who Should Attend

 

• Risk Practitioners

• Administrator

• Security Engineer



Objectives

After completing this course, students will be able to:

In terms of knowledge
• Describe information protection solutions to protect their data against theft and accidental loss

In terms of skills

• Implement information protection

• Implement DLP

• Implement data lifecycle and records management

• Monitor and investigate data and activities by using Microsoft Purview

• Manage insider and privacy risk in Microsoft 365

In terms of attitudes
• Adopt best practices for information protection



Methodology
1. Training
2.Discusions
3. Labs
4.Exercises


Equipment
1.Microsoft Official training material in english language
2. Personal Computers
3.Video Projector
4. Printer
5. Whiteboard and flip charts


TimeTable

ΚΩΔΙΚΟΣ ΕΡΜΗ: 358025 

 

Wednesday, 6th of November 2024, 08:15 - 16:00
Saturday, 9th of Novemberr 2024, 08:15 - 16:00
Wednesday, 13th of November 2024, 08:15 - 16:00
Saturday, 16th of Novemberr 2024, 08:15 - 16:00
Wednesday, 20th of November 2024, 08:15 - 16:00
Saturday, 23th of Novemberr 2024, 08:15 - 16:00




Find Training Programmes
Name
Type
v
Category
v
Period
v
-
v
 

© EDUCATION & INFORMATION TECHNOLOGY CENTRE (EDITC). All Rights Reserved. Developed by CMP POLYMEDIA LTD