MS-500T02-A: Implementing Microsoft 365 Threat Protection


MS-500T02-A: Implementing Microsoft 365 Threat Protection Certification Training Course Overview

Enroll for 1 day MS-500T02-A: Implementing Microsoft 365 Threat Protection training course from Koenig Solutions accredited by Microsoft. In this course you will learn about about threat protection technologies that help protect your Microsoft 365 environment. Specifically, students will learn about threat vectors and Microsoft’s security solutions for them.

Through a blend of hands-on labs and interactive lectures, you will learn about  Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and how to use Microsoft 365 Threat Intelligence. It also discusses securing mobile devices and applications.

Target Audience:

This course is designed for persons who are aspiring to the Microsoft 365 Security Admin role.

Learning Objectives:

After completing this course, you will be able to:

  • Describe cyber-attack threat vectors.
  • Describe security solutions for Microsoft 365
  • Use Microsoft Secure Score to evaluate your security posture.
  • Use the Security Dashboard in the Microsoft Security & Compliance center.
  • Configure various advanced threat protection services for Microsoft 365.
  • Configure Advanced Threat Analytics.
  • Plan and deploy Mobile Device Management.

 

 


MS-500T02-A: Implementing Microsoft 365 Threat Protection (8 Hours) Download Course Contents

Live Virtual Classroom

Fee : On Request
9 AM - 5 PM (Flexible Time Slots for 4 hours option)




Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

  • Basic conceptual understanding of Microsoft Azure
  • Experience with Windows 10 devices
  • Experience with Office 365
  • Basic understanding of authorization and authentication
  • Basic understanding of computer networks
  • Working knowledge of managing mobile devices