Call +65 6100 0613 Email: enquiry@tertiaryinfotech.com

Enhance Your Employability with Certified Skills and Courses in Singapore - WSQ , IBF-STS, Skills Certification

SC-400 Microsoft Certified Information Protection and Compliance Administrator Associate Exam Prep

Dive into the essential realms of information protection and compliance with our SC-400 Microsoft Certified Information Protection and Compliance Administrator Associate Exam Preparation Course. This course offers an in-depth exploration of Microsoft 365 compliance solutions, focusing on data governance, rights management, and regulatory compliance standards. Participants will gain hands-on experience with implementing information protection, data loss prevention, and compliance management solutions across their organizations. Designed to empower professionals to ace the SC-400 certification exam, the curriculum is structured around real-world scenarios and current compliance regulations, ensuring you have the practical knowledge to implement and manage a comprehensive compliance and security strategy effectively.

As cybersecurity threats evolve, the demand for skilled compliance administrators has never been higher. This course equips you with the knowledge to navigate the complexities of information protection, data governance, and compliance in Microsoft 365 environments. Through expert instruction and practical exercises, you'll be prepared to take on the SC-400 exam confidently and embark on a rewarding career in information security and compliance.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant Applications

No funding is available for this course

Course Code: C482

Course Booking

The course fee listed below is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

$1,200.00 (GST-exclusive)
$1,308.00 (GST-inclusive)

Course Date

Course Time

* Required Fields

Post-Course Support

We provide free consultation related to the subject matter after the course. Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Topic 1 Introduction to information protection and data lifecycle management in Microsoft Purview

  • Introduction to information protection and data lifecycle management
  • Know your data
  • Protect your data
  • Prevent data loss
  • Govern your data

Topic 2 Classify data for protection and governance

  • Data classification overview
  • Classify data using sensitive information types
  • Classify data using trainable classifiers
  • Review sensitive information and label usage
  • Explore labeled and sensitive content
  • Understand activities related to your data

Topic 3 Create and manage sensitive information types

  • Compare built-in versus custom sensitive information types
  • Create and manage custom sensitive information types
  • Describe custom sensitive information types with exact data match
  • Implement document fingerprinting
  • Describe named entities
  • Create keyword dictionary

Topic 4 Understand Microsoft 365 encryption

  • Introduction to Microsoft 365 encryption
  • Learn how Microsoft 365 data is encrypted at rest
  • Understand service encryption in Microsoft Purview
  • Explore customer key management using Customer Key
  • Learn how data is encrypted in-transit

Topic 5 Deploy Microsoft Purview Message Encryption

  • Implement Microsoft Purview Message Encryption
  • Implement Microsoft Purview Advanced Message Encryption
  • Use Microsoft Purview Message Encryption templates in mail flow rules

Topic 6 Create and configure sensitivity labels with Microsoft Purview

  • Sensitivity label overview
  • Create and configure sensitivity labels and label policies
  • Configure encryption with sensitivity labels
  • Implement auto-labeling policies
  • Use the data classification dashboard to monitor sensitivity labels

Topic 7 Apply sensitivity labels for data protection

  • Foundations of sensitivity label integration in Microsoft 365
  • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
  • Protect meetings with sensitivity labels
  • Apply protections and restrictions to email and files
  • Manage sensitivity labels in Office apps

Topic 8 Prevent data loss in Microsoft Purview

  • Data loss prevention overview
  • Identify content to protect
  • Identify sensitive data with optical character recognition (preview)
  • Define policy settings for your DLP policy
  • Test and create your DLP policy
  • Prepare Endpoint DLP
  • Manage DLP alerts in the Microsoft Purview compliance portal
  • View data loss prevention reports
  • Implement the Microsoft Purview Extension

Topic 9 Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform

  • Configure data loss prevention policies for Power Platform
  • Integrate data loss prevention in Microsoft Defender for Cloud Apps
  • Configure policies in Microsoft Defender for Cloud Apps
  • Manage data loss prevention violations in Microsoft Defender for Cloud Apps

Topic 10 Manage data loss prevention policies and reports in Microsoft 365

  • Configure data loss prevention for policy precedence
  • Implement data loss prevention policies in test mode
  • Explain data loss prevention reporting capabilities
  • Manage permissions for data loss prevention reports
  • Manage and respond to data loss prevention policy violations

Topic 11 Manage the data lifecycle in Microsoft Purview

  • Data Lifecycle Management overview
  • Configure retention policies
  • Configure retention labels
  • Configure manual retention label policies
  • Configure auto-apply retention label policies
  • Import data for Data Lifecycle Management
  • Manage, monitor, and remediate Data Lifecycle Management

Topic 12 Manage data retention in Microsoft 365 workloads

  • Explain retention in Exchange Online
  • Explain retention in SharePoint Online and OneDrive
  • Explain retention in Microsoft Teams
  • Explain retention in Microsoft Yammer
  • Recover content in Microsoft 365 workloads
  • Activate archive mailboxes in Microsoft Exchange
  • Apply mailbox holds in Microsoft Exchange
  • Recover content in Microsoft Exchange

Topic 13 Manage records in Microsoft Purview

  • Records management overview
  • Import a file plan
  • Configure retention labels
  • Configure event driven retention
  • Manage, monitor, and remediate records

Topic 14 Explore compliance in Microsoft 365

  • Plan for security and compliance in Microsoft 365
  • Plan your beginning compliance tasks in Microsoft Purview
  • Manage your compliance requirements with Compliance Manager
  • Examine the Compliance Manager dashboard
  • Analyze the Microsoft Compliance score

Topic 15 Search for content in the Microsoft Purview compliance portal

  • Explore Microsoft Purview eDiscovery solutions
  • Create a content search
  • View the search results and statistics
  • Export the search results and search report
  • Configure search permissions filtering
  • Search for and delete email messages

Topic 16 Manage Microsoft Purview eDiscovery (Standard)

  • Explore Microsoft Purview eDiscovery solutions
  • Implement Microsoft Purview eDiscovery (Standard)
  • Create eDiscovery holds
  • Search for content in a case
  • Export content from a case
  • Close, reopen, and delete a case

Topic 17 Manage Microsoft Purview eDiscovery (Premium)

  • Explore Microsoft Purview eDiscovery (Premium)
  • Implement Microsoft Purview eDiscovery (Premium)
  • Create and manage an eDiscovery (Premium) case
  • Manage custodians and non-custodial data sources
  • Analyze case content

Topic 18 Manage Microsoft Purview Audit (Standard)

  • Explore Microsoft Purview Audit solutions
  • Implement Microsoft Purview Audit (Standard)
  • Search the audit log
  • Export, configure, and view audit log records
  • Use audit log searching to investigate common support issues

Topic 19 Prepare Microsoft Purview Communication Compliance

  • Introduction to communication compliance
  • Plan for communication compliance
  • Identify and resolve communication compliance workflow
  • Introduction to communication compliance policies
  • Investigate and remediate communication compliance alerts

Topic 20 Manage insider risk in Microsoft Purview

  • Insider risk management overview
  • Introduction to managing insider risk policies
  • Create and manage insider risk policies
  • Investigate insider risk alerts
  • Take action on insider risk alerts through cases
  • Manage insider risk management forensic evidence
  • Create insider risk management notice templates

Topic 21 Implement Microsoft Purview Information Barriers

  • Explore Microsoft Purview Information Barriers
  • Configure information barriers in Microsoft Purview
  • Examine information barriers in Microsoft Teams
  • Examine information barriers in OneDrive
  • Examine information barriers in SharePoint

Topic 22 Manage regulatory and privacy requirements with Microsoft Priva

  • Create and manage risk management policies
  • Investigate and remediate risk management alerts
  • Create rights requests
  • Manage data estimate and retrieval for rights requests
  • Review data from rights requests
  • Get reports from rights requests

Topic 23 Implement privileged access management

  • Introduction to privileged access management
  • Implementing privileged access management

Topic 24 Manage Customer Lockbox

  • Introduction to Customer Lockbox
  • Manage Customer Lockbox requests

Course Info

Promotion Code

Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.

Minimum Entry Requirement

Knowledge and Skills

  • Able to operate using computer functions
  • Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

Attitude

  • Positive Learning Attitude
  • Enthusiastic Learner

Experience

  • Minimum of 1 year of working experience.

Target Age Group: 18-65 years old

Minimum Software/Hardware Requirement

Software:

TBD

Hardware: Window or Mac Laptops

Job Roles

  • Compliance Manager
  • Information Protection Specialist
  • Data Governance Officer
  • Security Compliance Analyst
  • Microsoft 365 Compliance Administrator
  • Risk Management Officer
  • Data Privacy Officer
  • Cybersecurity Consultant
  • Information Security Auditor
  • Regulatory Compliance Advisor
  • Corporate Compliance Officer
  • IT Security Manager
  • Data Protection Manager
  • Compliance Policy Manager
  • Information Assurance Analyst
  • Cloud Security Compliance Specialist
  • Information Systems Security Officer
  • Governance, Risk, and Compliance (GRC) Consultant
  • Privacy and Compliance Legal Advisor
  • Enterprise Risk Management Specialist

Trainers

Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.

Customer Reviews (2)

will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Fine atm and nothing much to improve

Good but need to include a simple project as part of the course to have a very good handson (Posted on 4/5/2021)
will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Perhaps can send the slides in soft copy prior to actual day (Posted on 9/3/2020)

Write Your Own Review

You're reviewing: SC-400 Microsoft Certified Information Protection and Compliance Administrator Associate Exam Prep

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

You May Be Interested In These Courses

WSQ - Microsoft Security Operations Analyst (SC-200)

WSQ - Microsoft Security Operations Analyst (SC-200)

8 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)
WSQ - Microsoft Cybersecurity Architect (SC-100) Training

WSQ - Microsoft Cybersecurity Architect (SC-100) Training

$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)
WSQ - ISC2 Information Systems Security Professional (CISSP) Training

WSQ - ISC2 Information Systems Security Professional (CISSP) Training

$3,500.00 (GST-exclusive)
$3,815.00 (GST-inclusive)
WSQ - Cyber Security Awareness Course for Personal and Businesses

WSQ - Cyber Security Awareness Course for Personal and Businesses

109 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
WSQ - CompTIA Security+ Training

WSQ - CompTIA Security+ Training

$2,500.00 (GST-exclusive)
$2,725.00 (GST-inclusive)
WSQ - Microsoft Azure Security Engineer Associate (AZ-500)

WSQ - Microsoft Azure Security Engineer Associate (AZ-500)

$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)