MS-500: Microsoft 365 Security Administration

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Introduction to the course
-
1. Creating a free Microsoft 365/Azure account for practice6m
Creating and Managing User Identities
-
1. Introduction to Creating and Managing User Identities8m
-
2. Demonstration of Creating and Managing User Identities6m
-
3. Stepping through the hands on tutorial for User Identities1m
Group Creation in Microsoft 365
-
1. Introduction to Group Creation in Microsoft 3654m
-
2. Demonstration of Creating Groups in Microsoft 3654m
-
3. Stepping through the hands on tutorial for Dynamic Group Creation2m
Password Expiration Management in Microsoft 365
-
1. Introduction to Password Expiration Management in Microsoft 3654m
-
2. Demonstration of configuring Password Expiration in Microsoft 3652m
-
3. Stepping through the hands on tutorial for configuring password expiration1m
Password Lockout Management in Microsoft 365
-
1. Introduction to Password Lockout Management in Microsoft 3654m
-
2. Demonstration of configuring the Password Lockout settings3m
-
3. Stepping through the hands on tutorial for Password Lockout in Microsoft 3652m
Role Based Access Control and Privileged Identity Management (PIM)
-
1. Introduction to Assigning Roles12m
-
2. Demonstration on role permissions as well as assigning roles to identities6m
-
3. Stepping through the hands on tutorial for assigning roles1m
-
4. Understanding Privileged Identity Management (PIM)14m
-
5. Configuring Privileged Identity Management (PIM)9m
-
6. Activating a PIM role as a user5m
-
7. Stepping through the tutorial for PIM1m
Multi-Factor Authentication In Microsoft 365
-
1. Introduction to Multi-Factor Authentication9m
-
2. Demonstration on how to implement Multi-Factor Authentication6m
-
3. Stepping through the tutorial for implementing Multi-Factor Authentication1m
Self Service Password Reset
-
1. Introduction to SSPR (Self Service Password Reset)5m
-
2. Demonstration on how to implement and configure SSPR5m
-
3. Stepping through the hands on tutorial for SSPR1m
Azure AD Identity Protection
-
1. Introduction to Azure AD Identity Protection7m
-
2. Demonstration of using Azure AD Identity Protection6m
-
3. Stepping through the hands on tutorial for Azure AD Identity Protection Policies2m
Conditional Access and Compliance Policies
-
1. Introduction to Conditional Access Policies10m
-
2. Demonstration of controlling access using Conditional Access Policies11m
-
3. Stepping through the hands on tutorial for Conditional Access Policies2m
-
4. Understanding Device Compliance Policies6m
-
5. Implementing Device Compliance Policies using Enpoint Manager10m
AIP (Azure Information Protection)
-
1. Introduction to Azure Information Protection7m
-
2. Demonstration on creating and managing AIP Sensitivity Labels10m
-
3. Stepping through the hands on tutorial for creating AIP Sensitivity Labels2m
-
4. Publishing AIP Labels in Microsoft 3654m
-
5. Demonstration on publishing AIP Labels4m
-
6. Stepping through the hands on tutorial for publishing AIP Labels2m
-
7. Demonstration for using keyword based AIP Policies5m
-
8. Stepping through the hands on tutorial for using keyword based AIP Policies1m
-
9. Using AIP to block actions based upon keywords5m
-
10. Stepping through the tutorial for using AIP to block actions based on keywords2m
Data Governance with DLP (Data Loss Prevention)
-
1. Introduction to Data Loss Prevention7m
-
2. Demonstration of implementing Data Loss Prevention7m
-
3. Stepping through the first hands on tutorial for creating a DLP policy2m
-
4. Demonstration for editing an existing DLP Policy to apply an exception rule9m
-
5. Stepping through the tutorial for editing an existing DLP Policy2m
-
6. Demonstration in editing a DLP Policy to add incident report support for a user4m
-
7. Stepping through the tutorial for adding incident report support to a DLP Policy2m
-
8. Data Governance and Retention using Security and Compliance3m
ATP (Advance Threat Protection)
-
1. Introduction to ATP (Advanced Threat Protection)9m
-
2. Demonstration on configuring and creating ATP Safe Attachments and Safe Links9m
-
3. Stepping through the hands on tutorial for creating an ATP Safe Links Policy2m
-
4. Windows Defender ATP Guard Technologies7m
eDiscovery, Reporting, Auditing and Alerts
-
1. Introduction to eDiscovery in Microsoft 3656m
-
2. Demonstration for adding privileges to a user to manage eDiscovery2m
-
3. Stepping through the hands on tutorial for assigning eDiscovery Manager rights1m
-
4. Demonstration using eDiscovery and placing a hold on a user4m
-
5. Stepping through the hands on tutorial for placing an eDiscovery Hold2m
-
6. Working with Security Reports in Microsoft 3656m
-
7. Working with Auditing Alerts and Content Searches in Microsoft 3656m
Microsoft Intune with Endpoint Manager
-
1. Introduction to Microsoft Intune12m
-
2. Using Intune with the Endpoint Manager Portal13m
-
3. Understanding how Device Configuration Profiles can help secure devices6m
-
4. Implementing a Device Configuration Profile with Intune6m
-
5. Using App Protection Policies to help protect Office 365 Apps8m
Securing Microsoft 365 Hybrid Environments
-
1. Foundation of Active Directory Domains13m
-
2. A foundation for Remote Access, DMZs, and Virtualization8m
-
3. A foundation of the Microsoft Cloud Services12m
-
4. Setting up custom domain settings toprepare for Azure AD Connect6m
-
5. Setting up custom domain name setting in AzureAD5m
-
6. Performing cleanup to prepare for Azure AD connect6m
-
7. Setting up a Hybrid environment using AzureAD Connect17m
-
8. Verifying Azure AD Connect Health4m
Cloud App Security
-
1. Understanding Cloud App Security9m
-
2. Utilizing Cloud App Security12m