Course Details
LU1 Configure your Microsoft 365 tenant
Topic 1 Configure your Microsoft 365 experience
- Explore your Microsoft 365 cloud environment
- Configure your Microsoft 365 organizational profile
- Manage your tenant subscriptions in Microsoft
- Integrate Microsoft 365 with customer engagement apps
- Complete your tenant configuration in Microsoft 365
Topic 2 Manage users, licenses, and mail contacts in Microsoft 365
- Examine groups in Microsoft
- Create and manage groups in Microsoft
- Create dynamic groups using Microsoft Entra rule builder
- Create a Microsoft 365 group naming policy
- Create groups in Exchange Online and SharePoint Online
Topic 3 Add a custom domain in Microsoft 365
- Plan a custom domain for your Microsoft 365 deployment
- Plan the DNS zones for a custom domain
- Plan the DNS record requirements for a custom domain
- Create a custom domain in Microsoft 365
Topic 4 Configure client connectivity to Microsoft 365
- Examine how automatic client configuration works
- Explore the DNS records required for client configuration
- Configure Outlook clients
- Troubleshoot client connectivity
LU2 Manage your Microsoft 365 tenant
Topic 5 Configure administrative roles in Microsoft 365
- Explore the Microsoft 365 permission model
- Explore the Microsoft 365 admin roles
- Assign admin roles to users in Microsoft
- Delegate admin roles to partners
- Manage permissions using administrative units in Microsoft Entra ID
- Elevate privileges using Microsoft Entra Privileged Identity Management
- Examine best practices when configuring administrative roles
Topic 6 Manage tenant health and services in Microsoft 365
- Monitor the health of your Microsoft 365 services
- Monitor tenant health using Microsoft 365 Adoption Score
- Monitor tenant health using Microsoft 365 usage analytics
- Develop an incident response plan
- Request assistance from Microsoft
Topic 7 Deploy Microsoft 365 Apps for enterprise
- Explore Microsoft 365 Apps for enterprise functionality
- Complete a self-service installation of Microsoft 365 Apps for enterprise
- Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager
- Deploy Microsoft 365 Apps for enterprise from the cloud
- Deploy Microsoft 365 Apps for enterprise from a local source
- Manage updates to Microsoft 365 Apps for enterprise
- Explore the update channels for Microsoft 365 Apps for enterprise
- Manage your cloud apps using the Microsoft 365 Apps admin center
Topic 8 Analyze your Microsoft 365 workplace data using Microsoft Viva Insights
- Examine the analytical features of Microsoft Viva Insights
- Explore Personal insights
- Explore Team insights
- Explore Organization insights
- Explore Advanced insights
LU3 Implement identity synchronization
Topic 9 Explore identity synchronization
- Examine identity models for Microsoft
- Examine authentication options for the hybrid identity model
- Explore directory synchronization
Topic 10 Prepare for identity synchronization to Microsoft 365
- Plan your Microsoft Entra ID deployment
- Prepare for directory synchronization
- Choose your directory synchronization tool
- Plan for directory synchronization using Microsoft Entra Connect Sync
- Plan for directory synchronization using Microsoft Entra Cloud Sync
Topic 11 Implement directory synchronization tools
- Configure Microsoft Entra Connect Sync prerequisites
- Configure Microsoft Entra Connect Sync
- Monitor synchronization services using Microsoft Entra Connect Health
- Configure Microsoft Entra Cloud Sync prerequisites
- Configure Microsoft Entra Cloud Sync
Topic 12 Manage synchronized identities
- Manage users with directory synchronization
- Manage groups with directory synchronization
- Maintain directory synchronization using Microsoft Entra Connect Sync security groups
- Configure object filters for directory synchronization
- Explore Microsoft Identity Manager
- Troubleshoot directory synchronization
Topic 13 Manage secure user access in Microsoft 365
- Manage user passwords
- Enable pass-through authentication
- Enable multifactor authentication
- Enable passwordless sign-in with Microsoft Authenticator
- Explore self-service password management
- Explore Windows Hello for Business
- Implement Microsoft Entra Smart Lockout
- Implement conditional access policies
- Explore Security Defaults in Microsoft Entra ID
- Investigate authentication issues using sign-in logs
LU4 Explore security metrics in Microsoft Defender XDR
Topic 14 Examine threat vectors and data breaches
- Explore today's work and threat landscape
- Examine how phishing retrieves sensitive information
- Examine how spoofing deceives users and compromises data security
- Compare spam and malware
- Examine account breaches
- Examine elevation of privilege attacks
- Examine how data exfiltration moves data out of your tenant
- Examine how attackers delete data from your tenant
- Examine how data spillage exposes data outside your tenant
- Examine other types of attacks
Topic 15 Explore the Zero Trust security model
- Examine the principles and components of the Zero Trust model
- Plan for a Zero Trust security model in your organization
- Examine Microsoft's strategy for Zero Trust networking
- Adopt a Zero Trust approach
Topic 16 Explore security solutions in Microsoft Defender XDR
- Enhance Exchange Online Protection with Microsoft Defender for Office
- Protect your organization's identities using Microsoft Defender for Identity
- Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint
- Protect against cyber attacks using Microsoft 365 Threat Intelligence
- Provide insight into suspicious activity using Microsoft Defender for Cloud App Security
- Review the security reports in Microsoft Defender XDR
Topic 17 Examine Microsoft Secure Score
- Explore Microsoft Secure Score
- Assess your security posture with Microsoft Secure Score
- Improve your secure score
- Track your Microsoft Secure Score history and meet your goals
Topic 18 Examine Privileged Identity Management
- Explore Privileged Identity Management in Microsoft Entra ID
- Configure Privileged Identity Management
- Audit Privileged Identity Management
- Control privileged admin tasks using Privileged Access Management
Topic 19 Examine Microsoft Entra ID Protection
- Explore Microsoft Entra ID Protection
- Enable the default protection policies in Microsoft Entra ID Protection
- Explore the vulnerabilities and risk events detected by Microsoft Entra ID Protection
- Plan your identity investigation
LU5 Manage your security services in Microsoft Defender XDR
Topic 20 Examine email protection in Microsoft 365
- Examine the anti-malware pipeline
- Detect messages with spam or malware using Zero-hour auto purge
- Explore anti-spoofing protection provided by Exchange Online Protection
- Explore other anti-spoofing protection
- Examine outbound spam filtering
Topic 21 Enhance your email protection using Microsoft Defender for Office 365
- Climb the security ladder from EOP to Microsoft Defender for Office
- Expand EOP protections by using Safe Attachments and Safe Links
- Manage spoofed intelligence
- Configure outbound spam filtering policies
- Unblock users from sending email
Topic 22 Manage Safe Attachments
- Protect users from malicious attachments by using Safe Attachments
- Create Safe Attachment policies using Microsoft Defender for Office
- Create Safe Attachments policies using PowerShell
- Modify an existing Safe Attachments policy
- Create a transport rule to bypass a Safe Attachments policy
- Examine the end-user experience with Safe Attachments
Topic 23 Manage Safe Links
- Protect users from malicious URLs by using Safe Links
- Create Safe Links policies using Microsoft 365 Defender
- Create Safe Links policies using PowerShell
- Modify an existing Safe Links policy
- Create a transport rule to bypass a Safe Links policy
- Examine the end-user experience with Safe Links
LU6 Implement threat protection by using Microsoft Defender XDR
Topic 24 Explore threat intelligence in Microsoft Defender XDR
- Explore Microsoft Intelligent Security Graph
- Explore alert policies in Microsoft
- Run automated investigations and responses
- Explore threat hunting with Microsoft Threat Protection
- Explore advanced threat hunting in Microsoft Defender XDR
- Explore threat analytics in Microsoft
- Identify threat issues using Microsoft Defender reports
Topic 25 Implement app protection by using Microsoft Defender for Cloud Apps
- Explore Microsoft Defender Cloud Apps
- Deploy Microsoft Defender for Cloud Apps
- Configure file policies in Microsoft Defender for Cloud Apps
- Manage and respond to alerts in Microsoft Defender for Cloud Apps
- Configure Cloud Discovery in Microsoft Defender for Cloud Apps
- Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps
Topic 26 Implement endpoint protection by using Microsoft Defender for Endpoint
- Explore Microsoft Defender for Endpoint
- Configure Microsoft Defender for Endpoint in Microsoft Intune
- Onboard devices in Microsoft Defender for Endpoint
- Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management
- Manage device discovery and vulnerability assessment
- Reduce your threat and vulnerability exposure
Topic 27 Implement threat protection by using Microsoft Defender for Office 365
- Explore the Microsoft Defender for Office 365 protection stack
- Investigate security attacks by using Threat Explorer
- Identify cybersecurity issues by using Threat Trackers
- Prepare for attacks with Attack simulation training
LU7 Explore data governance in Microsoft 365
Topic 28 Examine data governance solutions in Microsoft Purview
- Explore data governance and compliance in Microsoft Purview
- Protect sensitive data with Microsoft Purview Information Protection
- Govern organizational data using Microsoft Purview Data Lifecycle Management
- Minimize internal risks with Microsoft Purview Insider Risk Management
- Explore Microsoft Purview eDiscovery solutions
Topic 29 Explore archiving and records management in Microsoft 365
- Explore archive mailboxes in Microsoft
- Enable archive mailboxes in Microsoft
- Explore Microsoft Purview Records Management
- Implement Microsoft Purview Records Management
- Restore deleted data in Exchange Online
- Restore deleted data in SharePoint Online
Topic 30 Explore retention in Microsoft 365
- Explore retention by using retention policies and retention labels
- Compare capabilities in retention policies and retention labels
- Define the scope of a retention policy
- Examine the principles of retention
- Implement retention using retention policies, retention labels, and eDiscovery holds
- Restrict retention changes by using Preservation Lock
Topic 31 Explore Microsoft Purview Message Encryption
- Examine Microsoft Purview Message Encryption
- Configure Microsoft Purview Message Encryption
- Define mail flow rules to encrypt email messages
- Add organizational branding to encrypted email messages
- Explore Microsoft Purview Advanced Message Encryption
LU8 Implement compliance in Microsoft 365
Topic 32 Explore compliance in Microsoft 365
- Plan for security and compliance in Microsoft
- Plan your beginning compliance tasks in Microsoft Purview
- Manage your compliance requirements with Compliance Manager
- Examine the Compliance Manager dashboard
- Analyze the Microsoft Compliance score
Topic 33 Implement Microsoft Purview Insider Risk Management
- Explore insider risk management
- Plan for insider risk management
- Explore insider risk management policies
- Create insider risk management policies
- Investigate insider risk management activities and alerts
- Explore insider risk management cases
Topic 34 Implement Microsoft Purview Information Barriers
- Explore Microsoft Purview Information Barriers
- Configure information barriers in Microsoft Purview
- Examine information barriers in Microsoft Teams
- Examine information barriers in OneDrive
- Examine information barriers in SharePoint
Topic 35 Explore Microsoft Purview Data Loss Prevention
- Examine Data Loss Prevention
- Explore Endpoint data loss prevention
- Examine DLP policies
- View DLP policy results
- Explore DLP reports
Topic 36 Implement Microsoft Purview Data Loss Prevention
- Plan to implement Microsoft Purview Data Loss Protection
- Implement Microsoft Purview's default DLP policies
- Design a custom DLP policy
- Create a custom DLP policy from a template
- Configure email notifications for DLP policies
- Configure policy tips for DLP policies
LU9 Manage compliance in Microsoft 365
Topic 37 Implement data classification of sensitive information
- Explore data classification
- Implement data classification in Microsoft
- Explore trainable classifiers
- Create and retrain a trainable classifier
- View sensitive data using Content explorer and Activity explorer
- Detect sensitive information documents using Document Fingerprinting
Topic 38 Explore sensitivity labels
- Manage data protection using sensitivity labels
- Explore what sensitivity labels can do
- Determine a sensitivity label's scope
- Apply sensitivity labels automatically
- Explore sensitivity label policies
Topic 39 Implement sensitivity labels
- Plan your deployment strategy for sensitivity labels
- Examine the requirements to create a sensitivity label
- Create sensitivity labels
- Publish sensitivity labels
- Remove and delete sensitivity labels
Course Info
Promotion Code
Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Age Group: 18-65 years old
Minimum Software/Hardware Requirement
Software:
TBD
Hardware: Window or Mac Laptops
.Job Roles
- Systems Administrator
- IT Manager
- Cloud Solutions Architect
- IT Consultant
- IT Director
- Network Administrator
- IT Security Specialist
- IT Support Specialist
- IT Project Manager
- Microsoft 365 Enterprise Administrator
- Microsoft 365 Teams Administrator
- Microsoft 365 Security Administrator
- Compliance Manager
- Information Systems Auditor
- Information Security Analyst
Trainers
Agus Salim : I am professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus Salam is AWS cloud practitioner certified. I am also ACLP certied trainer.
Quah Chee Yong : Start-up experience in the field of Data Analytics and Digital Assistant/Chatbot. Blockchain Enthusiast. Lead Trainer (ACLP) in the field of AI/Data Science. General Management experience in Sales, Marketing, Business Development, Technical Services, Shipping/Marine & Supply Chain, HSSE/Risk Management and Support Functions Combination of Commercial, Operational and Technical background in MNCs covering the Asia Pacific region Staff/Stakeholders Management in a virtual matrix organizational setup spanning diverse cultures globally. I have obtained AWS certification.