Course Details
Topic 1 Introduction to information protection and data lifecycle management in Microsoft Purview
- Introduction to information protection and data lifecycle management
- Know your data
- Protect your data
- Prevent data loss
- Govern your data
Topic 2 Classify data for protection and governance
- Data classification overview
- Classify data using sensitive information types
- Classify data using trainable classifiers
- Review sensitive information and label usage
- Explore labeled and sensitive content
- Understand activities related to your data
Topic 3 Create and manage sensitive information types
- Compare built-in versus custom sensitive information types
- Create and manage custom sensitive information types
- Describe custom sensitive information types with exact data match
- Implement document fingerprinting
- Describe named entities
- Create keyword dictionary
Topic 4 Understand Microsoft 365 encryption
- Introduction to Microsoft 365 encryption
- Learn how Microsoft 365 data is encrypted at rest
- Understand service encryption in Microsoft Purview
- Explore customer key management using Customer Key
- Learn how data is encrypted in-transit
Topic 5 Deploy Microsoft Purview Message Encryption
- Implement Microsoft Purview Message Encryption
- Implement Microsoft Purview Advanced Message Encryption
- Use Microsoft Purview Message Encryption templates in mail flow rules
Topic 6 Create and configure sensitivity labels with Microsoft Purview
- Sensitivity label overview
- Create and configure sensitivity labels and label policies
- Configure encryption with sensitivity labels
- Implement auto-labeling policies
- Use the data classification dashboard to monitor sensitivity labels
Topic 7 Apply sensitivity labels for data protection
- Foundations of sensitivity label integration in Microsoft 365
- Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
- Protect meetings with sensitivity labels
- Apply protections and restrictions to email and files
- Manage sensitivity labels in Office apps
Topic 8 Prevent data loss in Microsoft Purview
- Data loss prevention overview
- Identify content to protect
- Identify sensitive data with optical character recognition (preview)
- Define policy settings for your DLP policy
- Test and create your DLP policy
- Prepare Endpoint DLP
- Manage DLP alerts in the Microsoft Purview compliance portal
- View data loss prevention reports
- Implement the Microsoft Purview Extension
Topic 9 Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
- Configure data loss prevention policies for Power Platform
- Integrate data loss prevention in Microsoft Defender for Cloud Apps
- Configure policies in Microsoft Defender for Cloud Apps
- Manage data loss prevention violations in Microsoft Defender for Cloud Apps
Topic 10 Manage data loss prevention policies and reports in Microsoft 365
- Configure data loss prevention for policy precedence
- Implement data loss prevention policies in test mode
- Explain data loss prevention reporting capabilities
- Manage permissions for data loss prevention reports
- Manage and respond to data loss prevention policy violations
Topic 11 Manage the data lifecycle in Microsoft Purview
- Data Lifecycle Management overview
- Configure retention policies
- Configure retention labels
- Configure manual retention label policies
- Configure auto-apply retention label policies
- Import data for Data Lifecycle Management
- Manage, monitor, and remediate Data Lifecycle Management
Topic 12 Manage data retention in Microsoft 365 workloads
- Explain retention in Exchange Online
- Explain retention in SharePoint Online and OneDrive
- Explain retention in Microsoft Teams
- Explain retention in Microsoft Yammer
- Recover content in Microsoft 365 workloads
- Activate archive mailboxes in Microsoft Exchange
- Apply mailbox holds in Microsoft Exchange
- Recover content in Microsoft Exchange
Topic 13 Manage records in Microsoft Purview
- Records management overview
- Import a file plan
- Configure retention labels
- Configure event driven retention
- Manage, monitor, and remediate records
Topic 14 Explore compliance in Microsoft 365
- Plan for security and compliance in Microsoft 365
- Plan your beginning compliance tasks in Microsoft Purview
- Manage your compliance requirements with Compliance Manager
- Examine the Compliance Manager dashboard
- Analyze the Microsoft Compliance score
Topic 15 Search for content in the Microsoft Purview compliance portal
- Explore Microsoft Purview eDiscovery solutions
- Create a content search
- View the search results and statistics
- Export the search results and search report
- Configure search permissions filtering
- Search for and delete email messages
Topic 16 Manage Microsoft Purview eDiscovery (Standard)
- Explore Microsoft Purview eDiscovery solutions
- Implement Microsoft Purview eDiscovery (Standard)
- Create eDiscovery holds
- Search for content in a case
- Export content from a case
- Close, reopen, and delete a case
Topic 17 Manage Microsoft Purview eDiscovery (Premium)
- Explore Microsoft Purview eDiscovery (Premium)
- Implement Microsoft Purview eDiscovery (Premium)
- Create and manage an eDiscovery (Premium) case
- Manage custodians and non-custodial data sources
- Analyze case content
Topic 18 Manage Microsoft Purview Audit (Standard)
- Explore Microsoft Purview Audit solutions
- Implement Microsoft Purview Audit (Standard)
- Search the audit log
- Export, configure, and view audit log records
- Use audit log searching to investigate common support issues
Topic 19 Prepare Microsoft Purview Communication Compliance
- Introduction to communication compliance
- Plan for communication compliance
- Identify and resolve communication compliance workflow
- Introduction to communication compliance policies
- Investigate and remediate communication compliance alerts
Topic 20 Manage insider risk in Microsoft Purview
- Insider risk management overview
- Introduction to managing insider risk policies
- Create and manage insider risk policies
- Investigate insider risk alerts
- Take action on insider risk alerts through cases
- Manage insider risk management forensic evidence
- Create insider risk management notice templates
Topic 21 Implement Microsoft Purview Information Barriers
- Explore Microsoft Purview Information Barriers
- Configure information barriers in Microsoft Purview
- Examine information barriers in Microsoft Teams
- Examine information barriers in OneDrive
- Examine information barriers in SharePoint
Topic 22 Manage regulatory and privacy requirements with Microsoft Priva
- Create and manage risk management policies
- Investigate and remediate risk management alerts
- Create rights requests
- Manage data estimate and retrieval for rights requests
- Review data from rights requests
- Get reports from rights requests
Topic 23 Implement privileged access management
- Introduction to privileged access management
- Implementing privileged access management
Topic 24 Manage Customer Lockbox
- Introduction to Customer Lockbox
- Manage Customer Lockbox requests
Course Info
Promotion Code
Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Age Group: 18-65 years old
Minimum Software/Hardware Requirement
Software:
TBD
Hardware: Window or Mac Laptops
Job Roles
- Compliance Manager
- Information Protection Specialist
- Data Governance Officer
- Security Compliance Analyst
- Microsoft 365 Compliance Administrator
- Risk Management Officer
- Data Privacy Officer
- Cybersecurity Consultant
- Information Security Auditor
- Regulatory Compliance Advisor
- Corporate Compliance Officer
- IT Security Manager
- Data Protection Manager
- Compliance Policy Manager
- Information Assurance Analyst
- Cloud Security Compliance Specialist
- Information Systems Security Officer
- Governance, Risk, and Compliance (GRC) Consultant
- Privacy and Compliance Legal Advisor
- Enterprise Risk Management Specialist
Trainers
Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.
Customer Reviews (2)
- will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment
Good but need to include a simple project as part of the course to have a very good handson (Posted on 4/5/2021) - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment