Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Prepare security and compliance to support Microsoft 365 Copilot

Microsoft via Microsoft Learn

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
  • Module 1: This module examines the various features provided in the Microsoft 365 ecosystem for securing user access, such as Conditional Access policies, multifactor authentication, self-service password management, Smart Lockout policies, and security defaults.

    By the end of this module, you should be able to:

    • Manage user passwords.

    • Create Conditional Access policies.

    • Enable security defaults.

    • Describe pass-through authentication.

    • Enable multifactor authentication.

    • Describe self-service password management.

    • Implement Microsoft Entra Smart Lockout.

  • Module 2: This module examines how to implement Microsoft Defender for Cloud Apps, which identifies and combats cyberthreats across all your Microsoft and third-party cloud services. MS-102

    By the end of this module, you should be able to:

    • Describe how Microsoft Defender for Cloud Apps provides improved visibility into network cloud activity and increases the protection of critical data across cloud applications.

    • Explain how to deploy Microsoft Defender for Cloud Apps.

    • Control your cloud apps with file policies.

    • Manage and respond to alerts generated by those policies.

    • Configure and troubleshoot Cloud Discovery.

  • Module 3: This module examines how Microsoft Defender for Endpoint helps enterprise networks prevent, detect, investigate, and respond to advanced threats by using endpoint behavioral sensors, cloud security analytics, and threat intelligence. MS-102

    After completing this module, you should be able to:

    • Describe how Microsoft Defender for Endpoint helps enterprise networks prevent, detect, investigate, and respond to advanced threats.

    • Onboard supported devices to Microsoft Defender for Endpoint.

    • Implement the Threat and Vulnerability Management module to effectively identify, assess, and remediate endpoint weaknesses.

    • Configure device discovery to help find unmanaged devices connected to your corporate network.

    • Lower your organization's threat and vulnerability exposure by remediating issues based on prioritized security recommendations.

  • Module 4: This module examines the Microsoft Defender for Office 365 protection stack and its corresponding threat intelligence features, including Threat Explorer, Threat Trackers, and Attack simulation training. MS-102

    After completing this module, you should be able to:

    • Describe the protection stack provided by Microsoft Defender for Office 365.

    • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant.

    • Describe the Threat Tracker widgets and views that provide you with intelligence on different cybersecurity issues that might affect your company.

    • Run realistic attack scenarios using Attack Simulator to help identify vulnerable users before a real attack impacts your organization.

  • Module 5: This module examines how data can be retained and ultimately removed in Microsoft 365 by using data retention policies and data retention labels in retention policies. MS-102

    By the end of this module, you should be able to:

    • Explain how a retention policies and retention labels work.
    • Identify the capabilities of both retention policies and retention labels.
    • Select the appropriate scope for a policy depending on business requirements.
    • Explain the principles of retention.
    • Identify the differences between retention settings and eDiscovery holds.
    • Restrict retention changes by using preservation lock.
  • Module 6: This module examines how Microsoft Purview uses information barriers to restrict communication and collaboration in Microsoft Teams, SharePoint Online, and OneDrive for Business. MS-102

    By the end of this module, you should be able to:

    • Describe how information barriers can restrict or allow communication and collaboration among specific groups of users.
    • Describe the components of an information barrier and how to enable information barriers.
    • Understand how information barriers help organizations determine which users to add or remove from a Microsoft Team, OneDrive account, and SharePoint site.
    • Describe how information barriers prevent users or groups from communicating and collaborating in Microsoft Teams, OneDrive, and SharePoint.
  • Module 7: This module examines how organizations can use Microsoft Purview Data Loss Prevention to help protect sensitive data and define the protective actions that organizations can take when a DLP rule is violated. MS-102

    By the end of this module, you should be able to:

    • Create a data loss prevention implementation plan. Implement Microsoft 365's default DLP policy.
    • Create a custom DLP policy from a DLP template and from scratch.
    • Create email notifications and policy tips for users when a DLP rule applies.
    • Create policy tips for users when a DLP rule applies
    • Configure email notifications for DLP policies
  • Module 8: This module examines the process for implementing sensitivity labels, including applying proper administrative permissions, determining a deployment strategy, creating, configuring, and publishing labels, and removing and deleting labels.

    By the end of this module, you should be able to:

    • Create a deployment strategy for implementing sensitivity labels that satisfies your organization's requirements.

    • Enable sensitivity labels in SharePoint Online and OneDrive so they can use encrypted files.

    • Create and configure sensitivity labels.

    • Publish sensitivity labels by creating a label policy.

    • Identify the differences between removing and deleting sensitivity labels.

Syllabus

  • Module 1: Module 1: Manage secure user access in Microsoft 365
    • Introduction
    • Examine the identity and access tools used in Microsoft 365
    • Manage user passwords
    • Implement Conditional Access policies
    • Enable pass-through authentication
    • Implement multifactor authentication
    • Explore passwordless authentication options
    • Explore self-service password management
    • Implement Microsoft Entra Smart Lockout
    • Explore Security Defaults in Microsoft Entra ID
    • Investigate authentication issues using sign-in logs
    • Knowledge check
    • Summary
  • Module 2: Module 2: Implement app protection by using Microsoft Defender for Cloud Apps
    • Introduction
    • Explore Microsoft Defender Cloud Apps
    • Deploy Microsoft Defender for Cloud Apps
    • Configure file policies in Microsoft Defender for Cloud Apps
    • Manage and respond to alerts in Microsoft Defender for Cloud Apps
    • Configure Cloud Discovery in Microsoft Defender for Cloud Apps
    • Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps
    • Knowledge check
    • Summary
  • Module 3: Module 3: Implement endpoint protection by using Microsoft Defender for Endpoint
    • Introduction
    • Explore Microsoft Defender for Endpoint
    • Configure Microsoft Defender for Endpoint in Microsoft Intune
    • Onboard devices in Microsoft Defender for Endpoint
    • Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management
    • Manage device discovery and vulnerability assessment
    • Reduce your threat and vulnerability exposure
    • Knowledge check
    • Summary
  • Module 4: Module 4: Implement threat protection by using Microsoft Defender for Office 365
    • Introduction
    • Explore the Microsoft Defender for Office 365 protection stack
    • Examine the security policies and rules used in Microsoft Defender for Office 365
    • Investigate security attacks by using Threat Explorer
    • Identify cybersecurity issues by using Threat Trackers
    • Prepare for attacks with Attack simulation training
    • Knowledge check
    • Summary
  • Module 5: Module 5: Explore retention in Microsoft 365
    • Introduction
    • Explore retention by using retention policies and retention labels
    • Compare capabilities in retention policies and retention labels
    • Define the scope of a retention policy
    • Examine the principles of retention
    • Implement retention using retention policies, retention labels, and eDiscovery holds
    • Restrict retention changes by using Preservation Lock
    • Knowledge check
    • Summary
  • Module 6: Module 6: Implement Microsoft Purview Information Barriers
    • Introduction
    • Explore Microsoft Purview Information Barriers
    • Configure information barriers in Microsoft Purview
    • Examine information barriers in Microsoft Teams
    • Examine information barriers in OneDrive
    • Examine information barriers in SharePoint
    • Knowledge check
    • Summary
  • Module 7: Module 7: Implement Microsoft Purview Data Loss Prevention
    • Introduction
    • Plan to implement Microsoft Purview Data Loss Protection
    • Implement Microsoft Purview's default DLP policies
    • Design a custom DLP policy
    • Create a custom DLP policy from a template
    • Configure email notifications for DLP policies
    • Configure policy tips for DLP policies
    • Knowledge check
    • Summary
  • Module 8: Module 8: Implement sensitivity labels
    • Introduction
    • Plan your deployment strategy for sensitivity labels
    • Enable sensitivity labels for files in SharePoint and OneDrive
    • Examine the requirements to create a sensitivity label
    • Create sensitivity labels
    • Publish sensitivity labels
    • Remove and delete sensitivity labels
    • Knowledge check
    • Summary

Reviews

Start your review of Prepare security and compliance to support Microsoft 365 Copilot

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.