Microsoft 365 Security Administrator (MS-500) – Outline

Detailed Course Outline

User and Group Security
  • User Accounts in Microsoft 365
  • Administrator Roles and Security Groups in Microsoft 365
  • Password Management in Microsoft 365
  • Azure AD Identity Protection
Identity Synchronization
  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities
Federated Identities
  • Introduction to Federated Identities
  • Planning an AD FS Deployment
  • Implementing AD FS
Access Management
  • Conditional Access
  • Managing Device Access
  • Role Based Access Control (RBAC)
  • Solutions for External Access
Security in Microsoft 365
  • Threat Vectors and Data Breaches
  • Security Solutions for Microsoft 365
  • Microsoft Secure Score
Advanced Threat Protection
  • Exchange Online Protection
  • Office 365 Advanced Threat Protection
  • Managing Safe Attachments
  • Managing Safe Links
  • Azure Advanced Threat Protection
  • Windows Defender Advanced Threat Protection
Threat Intelligence
  • Microsoft 365 Threat Intelligence
  • Using the Security Dashboard
  • Configuring Advanced Threat Analytics
Mobility
  • Plan for Mobile Application Management
  • Plan for Mobile Device Management
  • Deploy Mobile Device Management
  • Enroll Devices to Mobile Device Management
Information Protection
  • Information Rights Management
  • Secure Multipurpose Internet Mail Extension
  • Office 365 Message Encryption
  • Azure Information Protection
  • Advanced Information Protection
  • Windows Information Protection
Data Loss Prevention
  • Data Loss Prevention Explained
  • Data Loss Prevention Policies
  • Custom DLP Policies
  • Creating a DLP Policy to Protect Documents
  • Policy Tips
Cloud Application Security
  • Cloud Application Security Explained
  • Using Cloud Application Security Information
  • Office 365 Cloud App Security
Archiving and Retention
  • Archiving in Microsoft 365
  • Retention in Microsoft 365
  • Retention Policies in the Security and Compliance Center
  • Archiving and Retention in Exchange
  • In-place Records Management in SharePoint
Data Governance in Microsoft 365
  • Planning Security and Compliance Needs
  • Building Ethical Walls in Exchange Online
  • Manage Retention in Email
  • Troubleshooting Data Governance
  • Analytics and Telemetry
Managing Search and Investigations
  • Searching for Content in the Security and Compliance Center
  • Audit Log Investigations
  • Advanced eDiscovery