Arrow Electronics, Inc.

SC-400T00: Administering Information Protection and Compliance in Microsoft 365

Kod: MCS_SC-400T00

Czas trwania: 32 Hours (4 days)

Cena netto: Request Price

Opis szkolenia

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

Cel szkolenia

    Uczestnicy

    The information protection administrator translates an organization’s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls.

    Job role: Administrator

     

    Wymagania wstępne

    Before attending this course, students should have:

    • Foundational knowledge of Microsoft security and compliance technologies.
    • Basic knowledge of information protection concepts.
    • Understanding of cloud computing concepts.
    • Understanding of Microsoft 365 products and services.

     

    Program szkolenia

     

    Module 1: Introduction to information protection and data lifecycle management in Microsoft Purview.

    Learn how Microsoft 365 information protection and data lifecycle management solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.

    Upon completion of this module, you should be able to:

    • Discuss information protection and data lifecycle management and why it's important.
    • Describe Microsoft's approach to information protection and data lifecycle management.
    • Define key terms associated with Microsoft's information protection and data lifecycle management solutions.
    • Identify the solutions that comprise information and data lifecycle management in Microsoft Purview.

     

     

    Module 2: Classify data for protection and governance.

    Learn about the information available to help you understand your data landscape and know your data.

    Upon completion of this module, you should be able to:

    • List the components of the Data Classification solution.
    • Identify the cards available on the Data Classification overview tab.
    • Explain the Content explorer and Activity explorer.
    • Describe how to use sensitive information types and trainable classifiers.

     

     

    Module 3: Create and manage sensitive information types.

    Learn how to use sensitive information types to support your information protection strategy.

    After completing this module, you will be able to:

    • Recognize the difference between built-in and custom sensitivity labels
    • Configure sensitive information types with exact data match-based classification
    • Implement document fingerprinting
    • Create custom keyword dictionaries

     

     

    Module 4: Understand Microsoft 365 encryption.

    Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.

    Upon completion of this module, you should be able to:

    • Explain how encryption mitigates the risk of unauthorized data disclosure.
    • Describe Microsoft data-at-rest and data-in-transit encryption solutions.
    • Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
    • Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.

     

     

    Module 5: Deploy Microsoft Purview Message Encryption.

    Learn about the different encryption methods Microsoft Purview provides to protect messages.

    After completing this module, you will be able to:

    • Configure Microsoft Purview Message Encryption for end users
    • Implement Microsoft Purview Advanced Message Encryption

    Test and Certification

    Preparation for exam: SC-400

    Terminy

    We also offer sessions in other countries