Exclusively: Would you like to learn more about the security and compliance functions of Microsoft 365? Our course will give you a comprehensive introduction to the essential tools and methods that IT professionals and security officers need. From information protection and data loss prevention to data lifecycle management and the use of Microsoft Purview, we'll show you how to effectively protect and manage data and information in your organization.
NOTE:
To access your e-learning course with us, you need a Golem Karrierewelt customer account. To purchase your e-learning course, simply use the same e-mail address that you want to use to access the e-learning course. Your customer account is of course free of charge for you.
Disclaimer:
This e-learning course was fully translated with AI support. Subtitles are based on the original German version (see here). The video modules display the German user interface, but the spoken language is English, including English captions. Minor discrepancies may occur, with the German version being the authoritative reference.
What you will learn:
- Information protection: Using sensitivity labels to classify and secure data.
- Data Loss Prevention (DLP): Creation and management of DLP policies.
- Data lifecycle management: Managing retention policies and labels.
- Microsoft Purview: Monitoring user activity and data access, performing investigations and reporting.
Requirements:
- Basic knowledge of Microsoft 365: familiarity with the basic features and services of Microsoft 365, including Exchange Online, SharePoint Online and OneDrive for Business.
- Basic understanding of IT security concepts: Knowledge of basic security principles, such as authentication, authorization and encryption.
- Experience with IT administration: Practical experience in the administration of IT infrastructures and services, ideally in a Microsoft environment.
- Basic knowledge of compliance and data protection: Understanding of the basic principles of compliance and data protection, including the importance of data security and legal requirements.
Who is this course suitable for?
- IT administrators
- Security officers
- Compliance managers
- Information protection professionals
- Those responsible for data protection regulations in Microsoft 365
After your purchase:
a.) Log in to your Golem Career World account and click on the corresponding order. Then simply click on “view online” and off you go.
b.) You will receive an order confirmation after purchase. Simply click on “View order” and you will be redirected to the checkout page, which will then show you the button “To my courses”. Click on this button and off you go.
c.) You can click on this link directly after purchase: “My e-learning courses”
d.) Have you used the price advantage and purchased access for several people? Please inform all authorized persons that a free Golem Karrierewelt account is required to access the e-learning courses. Those entitled to access will automatically receive an invitation to their account from us and must activate it once in order to access the courses.
Course Description:
This course provides an introduction to the security and compliance features of Microsoft 365 that are required to protect and manage information and data in an organization. It is aimed at IT professionals and security officers who are responsible for implementing and managing information protection measures in Microsoft 365.
The course is divided into four main topics:
1. Implementing information protection: introduction to the concepts and principles of information protection. Use of sensitivity labels to classify and protect data.
2. implementing data loss prevention (DLP): introduction to data loss prevention and its importance. Create and manage DLP policies to prevent data loss
3. implementing data lifecycle and records management: understanding data lifecycle management and its importance. Create and manage retention policies and designations.
4. monitor and examine data and activities using Microsoft Purview: Introduction to Microsoft Purview and its monitoring capabilities. Using Microsoft Purview to monitor user activity and data access. Performing investigations and generating reports to support compliance.
Course details: 11 sections - 65 lessons - Total duration: 4 hrs. 59 min.
1. Introduction and information about the course
01_01 Trailer
01_02 Info about the course
01_03 My test environment
2. Understanding sensitive information and data classification
02_01 People and processes
02_02 The challenge of protecting data
02_03 Protecting data
02_04 The different classifiers
02_05 Assigning the Compliance Admin role
02_06 Creating a confidential information type
02_07 Creating an EDM classifier
02_08 Upload hash and source table
02_09 Trainable classifiers
02_10 A lot of time to create a trainable classifier
02_11 Publishing the trainable classifier
02_12 Testing the classifier
3. Management of sensitivity labels and data protection
03_01 Introduction to confidentiality designations
03_02 Meaning of confidentiality designations
03_03 Effect of confidentiality designations
03_04 Effect of designation guidelines
03_05 Creating confidentiality identifiers
03_06 Creating a sub-designator
03_07 Publishing an identifier
03_08 Working with an identifier
4. Planning and managing the encryption of e-mail messages in Microsoft Purview
04_01 Introduction Purview Message Encryption
04_02 Encrypting e-mail
04_03 Creating a message rule
04_04 Testing the message rule
04_05 Standard template for Message Encryption
04_06 User-defined template for Message Encryption
04_07 Using a custom template for Message Encryption
5. Implementing Data Loss Prevention with Microsoft Purview
05_01 Introduction to Microsoft Purview Data Loss Prevention (DLP)
05_02 Planning Data Loss Prevention (DLP)
05_03 Creating an initial DLP policy
05_04 Creating a customized DLP policy
05_05 Testing the two DLP policies
6. Implementation of Data Loss Prevention for Microsoft Defender for Cloud Apps and Endpoints
06_01 Introduction DLP Endpoint
06_02 Device onboarding
06_03 DLP policy for endpoints
06_04 Defender for Cloud Apps
06_05DLP for Amazon Web Services S3 Bucket
7. Implementation of data loss prevention reports and alerts
07_01 Activities Explorer
07_02 Warnings
07_03 Unblocking
8. Data retention with retention policies
08_01 Introduction to retention policies
08_02 Creating an initial retention policy
08_03 Retention policy for teams
08_04 Retention policy with an adaptive area
9. Manage retention in Microsoft 365 workloads
09_01 Introduction to retention labels
09_02 Creating a retention identifier
09_03 Publishing a retention identifier
09_04 Applying a retention identifier automatically
09_05 Checking retention in OneDrive and SharePoint
09_06 Retention policies versus retention labels
09_07 Priority of retention policies
09_08 Opening an eDiscovery case and searching for content
09_09 Content Search Live in action
10. Implementation of Microsoft Purview Records Management
10_01 Introduction to records management
10_02 What is a filing plan
10_03 Creating a new filing plan
10_04 Publishing a filing plan
10_05 Records management versus retention designations
10_06 Creating a new search
10_07 Knowledge Center
11. Summary
11_01 GitHub
11_02 Summary
11_03 Download course files and materials