Microsoft 365 Security Administration Certification Training (MS-500T00-A)

MS-500: Microsoft 365 Security Administration Certification Training Course Overview

The MS-500: Microsoft 365 Security Administration training and certification course will give you a detailed overview of the implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. During this MS-500T02-A training, you will also learn the planning and implementing security strategies and ensures that the solutions comply with the policies and regulations of the organization. This course is a part of Microsoft 365 Certified: Security Administrator Associate certification.

Who should do MS-500: Microsoft 365 Security Administration training?

  • Microsoft Security Administrators
  • Network Administrators
  • Server Administrators
This course prepares you for Exam MS-500. Test your current knowledge Qubits42

Microsoft 365 Security Administration Certification Training (MS-500T00-A) (Duration : 32 Hours) Download Course Contents

Live Virtual Classroom
Group Training 1400
20 - 23 Sep 09:00 AM - 05:00 PM CST
(8 Hours/Day)

04 - 07 Oct 09:00 AM - 05:00 PM CST
(8 Hours/Day)

01 - 04 Nov 09:00 AM - 05:00 PM CST
(8 Hours/Day)

1-on-1 Training (GTR) 1650
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here
Hire Our Trainers! Click here

Course Modules

Module 1: User and Group Protection
  • Identity and Access Management Concepts
  • Zero Trust Security
  • User Accounts in Microsoft 365
  • Administrator Roles and Security Groups in Microsoft 365
  • Password Management in Microsoft 365
  • Azure AD Identity Protection
  • Lab : Initialize your trial tenant
  • Set up your Microsoft 365 tenant
  • Lab : Configure Privileged Identity Management
  • Discover and Manage Azure Resources
  • Assign Directory Roles
  • Activate and Deactivate PIM Roles
  • Directory Roles (General)
  • PIM Resource Workflows
  • View audit history for Azure AD roles in PIM
Module 2: Identity Synchronization
  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities
  • Introduction to Federated Identities
  • Lab : Implement Identity Synchronization
  • Set up your organization for identity synchronization
Module 3: Access Management
  • Conditional access
  • Manage device access
  • Role Based Access Control (RBAC)
  • Solutions for external access
  • Lab : Use Conditional Access to enable MFA
  • MFA Authentication Pilot (require MFA for specific apps)
  • MFA Conditional Access (complete an MFA roll out)
Module 4: Security in Microsoft 365
  • Threat vectors and data breaches
  • Security strategy and principles
  • Security solutions in Microsoft 365
  • Microsoft Secure Score
  • Lab : Use Microsoft Secure Score
  • Improve your secure score in the Microsoft 365 Security Center
Module 5: Advanced Threat Protection
  • Exchange Online Protection
  • Office 365 Advanced Threat Protection
  • Manage Safe Attachments
  • Manage Safe Links
  • Azure Advanced Threat Protection
  • Microsoft Defender Advanced Threat Protection
  • Lab : Manage Microsoft 365 Security Services
  • Implement ATP Policies
Module 6: Threat Management
  • Use the Security dashboard
  • Microsoft 365 threat investigation and response
  • Azure Sentinel for Microsoft 365
  • Configuring Advanced Threat Analytics
  • Lab : Using Attack Simulator
  • Conduct a simulated Spear phishing attack
  • Conduct simulated password attacks
Module 7: Mobility
  • Plan for Mobile Application Management
  • Plan for Mobile Device Management
  • Deploy Mobile Device Management
  • Enroll Devices to Mobile Device Management
  • Lab : Configure Azure AD for Intune
  • Enable Device Management
  • Configure Azure AD for Intune
  • Create Intune Policies
Module 8: Information Protection
  • Information Protection Concepts
  • Azure Information Protection
  • Advanced Information Protection
  • Windows Information Protection
  • Lab : Implement Azure Information Protection and Windows Information Protection
  • Implement Azure Information Protection
  • Implement Windows Information Protection
Module 9: Rights Management and Encryption
  • Information Rights Management
  • Secure Multipurpose Internet Mail Extension
  • Office 365 Message Encryption
  • Lab : Configure Office 365 Message Encryption
  • Configure Office 365 Message Encryption
  • Validate Information Rights Management
Module 10: Data Loss Prevention
  • Data Loss Prevention Explained
  • Data Loss Prevention Policies
  • Custom DLP Policies
  • Creating a DLP Policy to Protect Documents
  • Policy Tips
  • Lab : Implement Data Loss Prevention policies
  • Manage DLP Policies
  • Test MRM and DLP Policies
Module 11: Cloud Application Security
  • Cloud App Security Explained
  • Using Cloud Application Security Information
Module 12: Compliance in Microsoft 365
  • Plan for compliance requirements
  • Build ethical walls in Exchange Online
  • Manage Retention in Email
  • Troubleshoot Data Governance
Module 13: Archiving and Retention
  • Archiving in Microsoft 365
  • Retention in Microsoft 365
  • Retention policies in the Microsoft 365 Compliance Center
  • Archiving and Retention in Exchange
  • In-place Records Management in SharePoint
  • Lab : Compliance and Retention
  • Initialize Compliance
  • Configure retention tags and policies
Module 14: Content Search and Investigation
  • Content Search
  • Audit Log Investigations
  • Advanced eDiscovery
  • Lab : Manage Search and Investigation
  • Investigate your Microsoft 365 Data
  • Conduct a Data Subject Request
Download Course Contents

Request More Information

Course Prerequisites
  • Basic conceptual understanding of Microsoft Azure.
  • Experience with Windows 10 devices.
  • Experience with Office 365.
  • Basic understanding of authorization and authentication.
  • Basic understanding of computer networks.
  • Working knowledge of managing mobile devices.

 

On completion of this training, you will know:

  • Managing Microsoft 365 Identity and Access
  • Implementing Microsoft 365 Threat Protection
  • Implementing Microsoft 365 Information Protection
  • Administering Microsoft 365 Built-in Compliance