• Classroom
  • Online, Instructor-Led
Course Description

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

Learning Objectives

After completing this course, students will be able to: Describe Microsoft’s approach to information protection and governance. List the components of the Data Classification solution. Describe how to use sensitive information types and trainable classifiers. Implement document fingerprinting Create custom keyword dictionaries Deploy message encryption in Office 365 Describe the information protection configuration process. Articulate deployment and adoption best practices. Describe the integration of DLP with Microsoft Cloud App Security (MCAS). Configure policies in Microsoft Cloud App Security. Review and analyze DLP reports. Identify and mitigate DLP policy violations. Mitigate DLP violations in MCAS. Describe the information governance configuration process. Articulate deployment and adoption best practices. Describe the retention features in Microsoft 365 workloads. Configure retention settings in Microsoft Teams and SharePoint Online. Implement retention for Exchange Mailbox items. Recover content protected by retention settings. Regain protected items from Exchange Mailboxes. Describe the records management configuration process.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis
  • Network Services
  • Risk Management
  • Software Development
  • Test and Evaluation
  • Threat Analysis
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management