1. Explore identity synchronization
This module examines identity synchronization using Azure AD Connect and explores the authentication and provisioning options that can be used and the inner-workings of directory synchronization.
Click here to know more
2. Manage secure user access in Microsoft 365
This module examines various password-related tasks for user and admin accounts, such as creating and configuring password policies, configuring self-service password management, configuring multifactor authentication, and implementing entitlement packages and conditional access policies.
Click here to know more
3. Protect against threats with Microsoft Defender for Endpoint
Learn how Microsoft Defender for Endpoint can help your organization stay secure.
Click here to know more
4. Deploy the Microsoft Defender for Endpoint environment
Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security.
Click here to know more
5. Protect against malicious attacks and unauthorized access with Microsoft Edge
Microsoft Edge helps protect your network and devices from malicious attacks and helps prevent unauthorized access to, and leaks of, corporate data with Microsoft Defender SmartScreen and Microsoft Defender Application Guard.
Click here to know more
6. Understand Microsoft 365 encryption
Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
Click here to know more
7. Understand app management using Microsoft Endpoint Manager
As part of application management, Microsoft Endpoint Manager helps you configure apps, protect app data, manage app policy assignments, and implement app security rules.
Click here to know more
8. Manage device compliance
This module examines device compliance policies, how organizations effectively use them, how to create policies and configure conditional users and groups, how to build Conditional Access policies, and how to monitor enrolled devices.
Click here to know more
9. Remediate risks with Microsoft Defender for Office 365
Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender.
Click here to know more
10. Query, visualize, and monitor data in Microsoft Sentinel
This module describes how to query, visualize, and monitor data in Microsoft Sentinel.
Click here to know more
11. Create and manage sensitive information types
Learn how to use sensitive information types to support your information protection strategy.
Click here to know more
12. Apply and manage sensitivity labels
Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate are not hindered.
Click here to know more
13. Prevent data loss in Microsoft Purview
Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.
Click here to know more
14. Manage data loss prevention policies and reports in Microsoft 365
Learn how to manage data loss prevention policies and mitigate data loss prevention policy violations.
Click here to know more
15. Manage the data lifecycle in Microsoft Purview
Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don't.
Click here to know more
16. Manage data retention in Microsoft 365 workloads
Learn how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services.
Click here to know more
17. Manage records in Microsoft Purview
Learn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.
Click here to know more
18. MS-101 Manage your security services in Microsoft 365 Defender
This learning path examines how to manage the Microsoft 365 security services, with a special focus on security reporting and managing the Safe Attachments and Safe Links features in Microsoft Defender for Office 365.
Click here to know more
19. Manage compliance in Microsoft 365 and Exchange Online
Learn how compliance works in an Exchange Online environment. Learn how to use retention and data loss prevention policies to keep the data and communications you're required to maintain, how to find that data and communications, and how to ensure you're ready for an audit.
Click here to know more
20. Responding to Data Subject Requests (DSRs)
Learners will know, understand, and be able to describe Data Subject Requests (DSRs). They will also know how to manage DSRs on Azure and Microsoft 365.
Click here to know more
21. Prepare Microsoft Purview Communication Compliance
Microsoft Purview Communication Compliance is a solution that helps organizations address code-of-conduct policy violations in company communications, while also assisting organizations in regulated industries meet specific supervisory compliance requirements. Communication Compliance uses machine learning to intelligently detect violations across different communication channels such as Microsoft Teams, Exchange Online, or Yammer messages.
Click here to know more
22. Manage insider risk in Microsoft Purview
Microsoft Purview Insider Risk Management helps organizations address internal risks, such as IP theft, fraud, and sabotage. Learn about insider risk management and how Microsoft technologies can help you detect, investigate, and take action on risky activities in your organization.
Click here to know more
23. Plan information barriers
Information barriers enable administrators to define policies to allow or prevent communications between groups of users in Microsoft Teams chats and channels. When information barrier policies are in place, people who should not communicate with other specific users won't be able to find, select, chat, or call those users. With information barriers, checks are in place to prevent unauthorized communication.
Click here to know more
24. Implement privileged access management
Privileged access management allows granular access control over privileged admin tasks in Office 365. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bound approval workflow. This configuration gives users just-enough-access to perform the task at hand without risking exposure of sensitive data or critical configuration settings.
Click here to know more