MS-500 Microsoft 365 Security Administration Lectures & Sims
- Description
- Curriculum
- FAQ
- Reviews
This course is way more then the average training course on Udemy! Have access to the following:
-
Training from an instructor of over 20 years who has helped thousands on their certification journey
-
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
-
Instructor led hands on that can be followed using a Microsoft 365 account
-
Hands on tutorials that can be practiced 24/7 regardless of if you have a Microsoft 365 account
-
The hands on activities in this course will prepare you for all the lab based scenario’s that show up on the MS-500 exam
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
-
User Identity administration as well as understanding PowerShell concepts
-
Controlling Groups with Microsoft 365
-
Password expiration and management in Microsoft 365
-
Password Lockout control in Microsoft 365
-
Role Based Access Control (RBAC) and Privileged Identity Management (PIM)
-
Multi-Factor Authentication (MFA) in Microsoft 365
-
Self Service Password Reset Control (SSPR) in Microsoft 365
-
Azure AD Identity Protection Policies in Microsoft 365
-
Compliance Policies in Microsoft 365
-
Conditional Access Policies in Microsoft 365
-
Azure Information Protection (AIP) Configuration in Microsoft 365
-
Data Governance and Data Loss Prevention (DLP) in Microsoft 365
-
Microsoft Defender for Office 365 (Formally known as Advanced Threat Protection (ATP)
-
eDiscovery, Reporting, Auditing and Alerts
-
Microsoft Intune with Endpoint Manager
-
Securing Microsoft 365 Hybrid Environments (Includes Azure AD Connect)
-
Cloud App Security
-
Microsoft Defender for Identity
-
Azure Sentinel
-
1Introduction to what this course is all about
This video will help you understand what is involved in this course and how the course will help you learn the MS-500 material
-
2Creating a trial Microsoft 365/Azure Account
-
3Using assignments in the course
This video shows how the assignments work in Udemy
-
4Introduction to Creating and Managing User Identities
This lesson provides an introduction to the ways Microsoft deals with user identities
-
5The First Concept of Microsoft's Cloud
-
6Demonstration of Creating and Managing User Identities
This lecture provides a walkthrough demonstration of dealing with User Identities
-
7PLEASE DO NOT SKIP THIS VIDEO
-
8Hands on tutorial of Creating User Identities
-
9Understanding the foundational concepts of Microsoft PowerShell Administration
-
10Using PowerShell to Manage Microsoft 365 Cloud Resources
-
11Introduction to Group Creation in Microsoft 365
In this introduction we will discuss the different types of groups in Azure/Microsoft 365
-
12Demonstration of Creating Groups in Microsoft 365
In this demonstration, I will walk through the creation of a dynamic security group that will auto assign iPhones that get added to your organization
-
13Hands on tutorial of Creating a Dynamic Security group for iPhone Devices
-
14Introduction to Password Expiration Management in Microsoft 365
This lecture provides an introduction to how Password Expiration management works in Microsoft 365
-
15Demonstration of configuring the Password Expiration policy in Microsoft 365
-
16Hands on tutorial of setting the Password Expiration in Microsoft 365
-
17Introduction to Password Lockout Management in Microsoft 365
This introduction video explains the concept of Password Lockout Management in Microsoft 365
-
18Demonstration of configuring the Password Lockout settings
In this demonstration, I'm going to step into the Azure portal and explain how to configure the password lockout settings
-
19Hands on tutorial for configuring the Password Lockout Settings in Microsoft 365
-
20Introduction to Assigning Roles
This lecture will help you understand the concept behind RBAC (Role Based Access Control) and how it provides an easy to use model for assigning administrative privileges in our environments
-
21Demonstration on role permissions as well as assigning roles to identities
This demonstration will walk you through understand roles, role permissions, and how to assign an identity to a role
-
22Hands on tutorial for assigning roles in Azure
-
23Understanding Privileged Identity Management (PIM)
This lecture will cover the concepts of what PIM is and how it can help secure roles
-
24Configuring Privileged Identity Management (PIM)
This lecture will demonstrate how to set up PIM to give a user access to a role for a temporary amount of time
-
25Activating a PIM role as a user
This lecture will demonstrate how a user can accept a role using PIM
-
26Hands on tutorial for using PIM
-
27Introduction to Multi-Factor Authentication
In this lecture, I'll explain the concepts of Multi-Factor Authentication and how it can improve the overall security of the identities in your environment
-
28Demonstration on how to implement Multi-Factor Authentication
In this demonstration, I will walk you through implementing MFA (Multi-Factor Authentication)
-
29Hands on tutorial for implementing Multi-Factor Authentication
-
30Introduction to SSPR (Self Service Password Reset)
This lecture will introduction you to the concepts of SSPR (Self Service Password Reset) and how it can benefit your environment and improve identity control.
-
31Demonstration on how to implement and configure SSPR
In this demonstration, I will show you how to configure SSPR and explain the different settings available
-
32Hands on tutorial for SSPR
-
33Introduction to Azure AD Identity Protection
In this introduction, we'll talk about the ins and outs of Azure AD Identity Protection and how it improves the overall security of your organization
-
34Demonstration of using Azure AD Identity Protection
This demonstration will walk you through using Azure AD Identity Protection to implement a risky user and risky sign-in policy
-
35Hands on tutorial of creating Azure AD Identity Protection policies
-
36Introduction to Conditional Access Policies
In this lecture, you will learn the concepts behind the way Conditional Access Policies can make access control decisions based on the way users try to access resources and data in the Microsoft 365/Azure environment
-
37Demonstration of controlling access using Conditional Access Policies
This demonstration will walk you through the different options within Conditional Access Policies along with show you how to create a policy
-
38Hands on tutorial of implementing a Conditional Access Policy
-
39Understanding Device Compliance Policies
This lecture will explain what Device Compliance Policies are and how they help in controlling device access
-
40Implementing Device Compliance Policies using Enpoint Manager
This lecture will walk you through setting up a Device Compliance Policy
-
41Understanding Sensitivity Labels
-
42Demonstration on creating & managing Sensitivity Labels
-
43Hands on tutorial for creating an Azure Information Protection Sensitivity Label
-
44Enabling Sensitivity Labels for Teams SharePoint Microsoft 365 Groups
-
45Publishing Sensitivity Labels
-
46Demonstration for using keyword based AIP Sensitivity Policies
-
47Applying a custom Sensitive Info Type to a new Sensitivity Policy
In this demonstration, I'm going to show you how you can use AIP to block actions such as email usage based on keyword labels
-
48Demonstrating applying a custom Sensitive Info type to a new Sensitivity Policy
-
49Introduction to Data Loss Prevention
In this introduction, I will discuss the concepts of Data Loss Prevention in Microsoft 365 and how it can help protect your data from being exfiltrated
-
50Understanding the licensing of Data Loss Prevention
-
51Managing Data Loss Prevention policy priority
-
52Creating policies for Exchange, Sharepoint, OneDrive and Teams
-
53Hands on activity for creating a DLP policy
-
54Editing the custom advanced settings in Data Loss Prevention policies
-
55Modifying default Office 365 Data Loss Prevention Policy
-
56Using Data Loss Prevention Policies in Test Mode
-
57Data Governance and Retention in Microsoft 365
-
58Hands on activity for data governance retention policies
-
59Introduction to Microsoft Defender for Office365 formally ATP
In this lecture, I will introduce you to the concepts behind what ATP is and how it can help your organization
-
60Creating a Safe Attachment Policy within the Security Center
-
61Creating a Safe Links Policy within the Security Center
-
62Create a Safe Attachment Policy for HR. Set to Block and redirect to admin
-
63Configuring Anti-Phishing
-
64Configuring Anti-Malware
-
65Configuring Anti-Spam
-
66Managing and Monitoring Quarantined Items
-
67Windows Defender Guard Technologies
This lecture will explain Windows Defender ATP. Application Guard, Device Guard, and Exploit Guard
-
68Introduction to eDiscovery in Microsoft 365
Introduction to using eDiscovery in Microsoft 365
-
69Demonstration for adding privileges to a user to manage eDiscovery
This demonstration will explain how to give a user the right to manage the eDiscovery system in Microsoft 365
-
70Hands on tutorial for assigning eDiscovery Manager rights to a user
-
71Demonstration using eDiscovery and placing a hold on a user
This demonstration walks through the different eDiscovery options and shows how to place a hold
-
72Hands on tutorial for placing doing an eDiscovery search
-
73Working with Security Reports in Microsoft 365
This lecture will walk through the reports area of the Security and Compliance Center
-
74Working with Auditing Alerts and Content Searches in Microsoft 365
This lecture will walk through the Auditing, Alerts and searches area of the Security and Compliance Center
-
75Introduction to Microsoft Intune
This lecture will introduction you to Intune and go through some of the powerful benefits to using it
-
76Using Intune with the Endpoint Manager Portal
This lecture will help you understand the different options for Intune using the Endpoint Manager Portal
-
77Understanding how Device Configuration Profiles can help secure devices
This lecture will explain how we can use Intune to create device configuration profiles to help secure the devices in our environment
-
78Implementing a Device Configuration Profile with Intune
This lecture will demonstrate how to create a device configuration profile using Intune
-
79Hands on tutorial for creating a device configuration profile
-
80Using App Protection Policies to help protect Office 365 Apps
This lecture will demonstrate using Intune App Protection Policies for the protection of Office 365 Apps