1. Create, configure, and manage identities
Access to cloud-based workloads needs to be controlled centrally by providing a definitive identity for each user and resource. You can ensure employees and vendors have just-enough access to do their job.
Click here to know more
2. Explore identity synchronization
This module examines identity synchronization using Azure AD Connect and explores the authentication and provisioning options that can be used and the inner workings of directory synchronization.
Click here to know more
3. Implement and manage hybrid identity
Creating a hybrid-identity solution to use your on-premises active directory can be challenging. Explore how to implement a secure hybrid-identity solution.
Click here to know more
4. Implement and manage external identities
Inviting external users to use company Azure resources is a great benefit, but you want to do it in a secure way. Explore how to enable secure external collaboration.
Click here to know more
5. Manage secure user access in Microsoft 365
This module examines various password-related tasks for user and admin accounts, such as creating and configuring password policies, configuring self-service password management, configuring multifactor authentication, and implementing entitlement packages and conditional access policies.
Click here to know more
6. Manage user authentication
There are multiple options for authentication in Azure AD. Learn how to implement and manage the right authentications for users based on business needs.
Click here to know more
7. Plan, implement, and administer Conditional Access
Conditional Access gives a fine granularity of control over which users can do specific activities, access which resources, and how ensure data and systems are safe.
Click here to know more
8. Plan and implement privileged access
Ensuring that administrative roles are protected and managed to increase your Azure solution security is a must. Explore how to use PIM to protect your data and resources.
Click here to know more
9. Plan and implement entitlement management
When new users or external users join your site, quickly assigning them access to Azure solutions is a must. Explore how to entitle users to access your site and resources.
Click here to know more
10. Manage Azure AD Identity Protection
Protecting a user's identity by monitoring their usage and sign-in patterns will ensure a secure cloud solution. Explore how to design and implement Azure AD Identity protection.
Click here to know more
11. Protect against threats with Microsoft Defender for Endpoint
Learn how Microsoft Defender for Endpoint can help your organization stay secure.
Click here to know more
12. Deploy the Microsoft Defender for Endpoint environment
Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security.
Click here to know more
13. Protect against malicious attacks and unauthorized access with Microsoft Edge
Microsoft Edge helps protect your network and devices from malicious attacks and helps prevent unauthorized access to, and leaks of, corporate data with Microsoft Defender SmartScreen and Microsoft Defender Application Guard.
Click here to know more
14. Understand Microsoft 365 encryption
Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
Click here to know more
15. Understand app management using Microsoft Endpoint Manager
As part of application management, Microsoft Endpoint Manager helps you configure apps, protect app data, manage app policy assignments, and implement app security rules.
Click here to know more
16. Manage device compliance
This module examines device compliance policies, how organizations effectively use them, how to create policies and configure conditional users and groups, how to build Conditional Access policies, and how to monitor enrolled devices.
Click here to know more
17. Remediate risks with Microsoft Defender for Office 365
Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender.
Click here to know more
18. Query, visualize, and monitor data in Microsoft Sentinel
This module describes how to query, visualize, and monitor data in Microsoft Sentinel.
Click here to know more
19. Create and manage sensitive information types
Learn how to use sensitive information types to support your information protection strategy.
Click here to know more
20. Apply and manage sensitivity labels
Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate are not hindered.
Click here to know more
21. Prevent data loss in Microsoft Purview
Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.
Click here to know more
22. Manage data loss prevention policies and reports in Microsoft 365
Learn how to manage data loss prevention policies and mitigate data loss prevention policy violations.
Click here to know more
23. Manage the data lifecycle in Microsoft Purview
Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don't.
Click here to know more
24. Manage data retention in Microsoft 365 workloads
Learn how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services.
Click here to know more
25. Manage records in Microsoft Purview
Learn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.
Click here to know more
26. Manage compliance in Microsoft 365 and Exchange Online
Learn how compliance works in an Exchange Online environment. Learn how to use retention and data loss prevention policies to keep the data and communications you're required to maintain, how to find that data and communications, and how to ensure you're ready for an audit.
Click here to know more
27. Manage Microsoft Purview eDiscovery (Premium)
This module explores how to use Microsoft Purview eDiscovery (Premium) to preserve, collect, analyze, review, and export content that's responsive to an organization's internal and external investigations, and communicate with custodians involved in a case.
Click here to know more
28. Manage regulatory and privacy requirements with Microsoft Priva
Learn how to use Microsoft Priva to manage privacy risk policies and subject rights requests.
Click here to know more
29. Prepare Microsoft Purview Communication Compliance
Microsoft Purview Communication Compliance is a solution that helps organizations address code-of-conduct policy violations in company communications, while also assisting organizations in regulated industries meet specific supervisory compliance requirements. Communication Compliance uses machine learning to intelligently detect violations across different communication channels such as Microsoft Teams, Exchange Online, or Yammer messages.
Click here to know more
30. Manage insider risk in Microsoft Purview
Microsoft Purview Insider Risk Management helps organizations address internal risks, such as IP theft, fraud, and sabotage. Learn about insider risk management and how Microsoft technologies can help you detect, investigate, and take action on risky activities in your organization.
Click here to know more
31. Plan information barriers
Information barriers enable administrators to define policies to allow or prevent communications between groups of users in Microsoft Teams chats and channels. When information barrier policies are in place, people who should not communicate with other specific users won't be able to find, select, chat, or call those users. With information barriers, checks are in place to prevent unauthorized communication.
Click here to know more
32. Implement privileged access management
Privileged access management allows granular access control over privileged admin tasks in Office 365. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bound approval workflow. This configuration gives users just enough access to perform the task at hand without risking exposure of sensitive data or critical configuration settings.
Click here to know more
33. Manage Customer Lockbox
Customer Lockbox supports requests to access data in Exchange Online, SharePoint Online, and OneDrive when Microsoft engineers need to access customer content to determine root cause and fix an issue. Customer Lockbox requires the engineer to request access from the customer as a final step in the approval workflow. This gives organizations the option to approve or deny these requests and provide direct-access control to the customer.
Click here to know more