Microsoft 365 Mobility and Security (Live Virtual Class)

Blended learning

À qui s'adresse la formation?

Administrateurs, Administrateurs de bases de données, Administrateurs de Cloud, Administrateurs de data warehouse, Database Developers, Experienced IT Professionals, Web Designer, Ingénieurs Sécurité, IT Professionals, IT Security Officers

Durée

5,00 jour(s)

Langues(s) de prestation

EN FR

Prochaine session

Objectifs

1 - Explore security metrics in Microsoft 365 Defender

2 - Manage your security devices in Microsoft 365 Defender

3 - Implement threat protection by using Microsoft 365 Defender

4 - Explore data governance and compliance in Microsoft 365

5 - Implement compliance in Microsoft 365

6 - Manage compliance in Microsoft 365

7 - Manage content search and investigations in Microsoft 365

8 - Prepare for device management in Microsoft 365

9 - Plan your deployment strategy for Windows devices

10 - Implement Mobile Device Management in Microsoft 365

Contenu

1 - Explore security metrics in Microsoft 365 Defender
  • Module 1: Examine threat vectors and data breaches
  • Module 2: Explore the Zero Trust security model
  • Module 3: Explore security solutions in Microsoft 365 Defender
  • Module 4: Examine Microsoft Secure Score
  • Module 5: Examine Privileged Identity Management
  • Module 6: Examine Azure Identity Protection
2 - Manage your security devices in Microsoft 365 Defender
  • Module 1: Examine Exchange Online Protection
  • Module 2: Examine Microsoft Defender for Office 365
  • Module 3: Manage Safe Attachments
  • Module 4: Manage Safe Links
3 - Implement threat protection by using Microsoft 365 Defender
  • Module 1: Explore threat intelligence in Microsoft 365 Defender
  • Module 2: Implement app protection by using Microsoft Defender for Cloud Apps
  • Module 3: Implement endpoint protection by using Microsoft Defender for Endpoint
  • Module 4: Implement threat protection by using Microsoft Defender for Office 365
4 - Explore data governance and compliance in Microsoft 365
  • Module 1: Examine governance and compliance solutions in Microsoft Purview
  • Module 2: Explore archiving and records management in Microsoft 365
  • Module 3: Explore retention in Microsoft 365
  • Module 4: Explore Microsoft Purview Message Encryption
5 - Implement compliance in Microsoft 365
  • Module 1: Explore compliance in Microsoft 365
  • Module 2: Implement Microsoft Purview Insider Risk Management
  • Module 3: Create information barriers in Microsoft 365
  • Module 4: Explore Data Loss Prevention in Microsoft 365
  • Module 5: Implement Data Loss Prevention policies
6 - Manage compliance in Microsoft 365
  • Module 1: Implement data classification of sensitive information
  • Module 2: Explore sensitivity labels
  • Module 3: Implement sensitivity labels
7 - Manage content search and investigations in Microsoft 365
  • Module 1: Search for content in the Microsoft Purview compliance portal
  • Module 2: Manage Microsoft Purview Audit (Standard)
  • Module 3: Manage Microsoft Purview Audit (Premium)
  • Module 4: Manage Microsoft Purview eDiscovery (Standard)
  • Module 5: Manage Microsoft Purview eDiscovery (Premium)
8 - Prepare for device management in Microsoft 365
  • Module 1: Explore device management using Microsoft Endpoint Manager
  • Module 2: Prepare your Windows devices for Co-management
  • Module 3: Plan for mobile application management in Microsoft Intune
9 - Plan your deployment strategy for Windows devices
  • Module 1: Examine Windows client deployment scenarios
  • Module 2: Explore Windows Autopilot deployment models
  • Module 3: Plan your Windows client Subscription Activation strategy
10 - Implement Mobile Device Management in Microsoft 365
  • Module 1: Explore Mobile Device Management
  • Module 2: Deploy Mobile Device Management
  • Module 3: Enroll devices in Mobile Device Management
  • Module 4: Manage device compliance
  • Module 5: Implement endpoint security in Microsoft Intune

Certificat, diplôme

Une attestation de participation sera transmise aux participants

Contact pour cette formation

Nathalie Thielemans / Nassera Aici

Ces formations pourraient vous intéresser

EN
Journée
Sur demande
Informatique et systèmes d'information - Virtualisation