1. Examine the Copilot for Microsoft 365 design
This module examines the Microsoft Copilot for Microsoft 365 design, how it works, its service and tenant logical architecture, and how you can extend it using Microsoft Graph connectors.
Click here to know more
2. Implement Copilot for Microsoft 365
This module examines the key tasks that administrators must complete when implementing Microsoft Copilot for Microsoft 365, such as completing prerequisites, preparing data for searches, and assigning Copilot for Microsoft 365 licenses.
Click here to know more
3. Examine data security and compliance in Copilot for Microsoft 365
This module examines how Microsoft Copilot for Microsoft 365 adheres to existing privacy and compliance obligations, how it ensures data residency and compliance boundary, and how it protects sensitive business data.
Click here to know more
4. Manage secure user access in Microsoft 365
This module examines the various features provided in the Microsoft 365 ecosystem for securing user access, such as Conditional Access policies, multifactor authentication, self-service password management, Smart Lockout policies, and security defaults.
Click here to know more
5. Manage permissions, roles, and role groups in Microsoft 365
This module examines the use of roles and role groups in the Microsoft 365 permission model, including role management, best practices when configuring admin roles, delegating roles, and elevating privileges.
Click here to know more
6. Implement data classification of sensitive information
This module introduces you to data classification in Microsoft 365, including how to create and train classifiers, view sensitive data using Content explorer and Activity explorer, and implement Document Fingerprinting.
Click here to know more
7. Explore sensitivity labels
This module examines how sensitivity labels from the Microsoft Information Protection solution let you classify and protect your organization's data, while making sure that user productivity and collaboration isn't hindered.
Click here to know more
8. Implement sensitivity labels
This module examines the process for implementing sensitivity labels, including applying proper administrative permissions, determining a deployment strategy, creating, configuring, and publishing labels, and removing and deleting labels.
Click here to know more