- Module 1: Learn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.
- Discuss information protection and governance and why it’s important.
- Describe Microsoft’s approach to information protection and governance.
- Define key terms associated with Microsoft’s information protection and governance solutions.
- Identify the solutions that comprise information and governance in Microsoft 365.
- Module 2: Learn how information protection helps organizations protect data to prevent data loss or theft.
- Explain the importance of data loss prevention technologies
- Identify the methods of data loss prevention
- Assess and define data sensitivity
- Apply Microsoft data loss prevention technologies
- Module 3: Learn about the information available to help you understand your data landscape and know your data.
- List the components of the Data Classification solution.
- Identify the cards available on the Data Classification overview tab.
- Explain the Content explorer and Activity explorer.
- Describe how to use sensitive information types and trainable classifiers.
- Module 4: Create and manage sensitive information types
- Recognize the difference between built-in and custom sensitivity labels
- Configure sensitive information types with exact data match-based classification
- Implement document fingerprinting
- Create custom keyword dictionaries
- Module 5: Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
- Explain how encryption mitigates the risk of unauthorized data disclosure.
- Describe Microsoft data-at-rest and data-in-transit encryption solutions.
- Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
- Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
- Module 6: Deploy message encryption in Office 365
- Configure Office 365 Message Encryption for end users
- Implement Advanced Office 365 Message Encryption
- Module 7: Learn how to detect sensitive content as it's used and shared throughout your organization, in the cloud and on devices, and help prevent accidental data loss.
- Discuss the information protection solution and its benefits.
- List the customer scenarios the information protection solution addresses.
- Describe the information protection configuration process.
- Explain what users will experience when the solution is implemented.
- Articulate deployment and adoption best practices.
- Module 8: Apply and manage sensitivity labels
- Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
- Monitor label usage using label analytics.
- Configure on-premises labeling.
- Manage protection settings and marking for applied sensitivity labels.
- Apply protections and restrictions to email.
- Apply protections and restrictions to files.
Upon completion of this module, you should be able to:
At the end of this module, you should be able to:
Upon completion of this module, you should be able to:
After completing this module, you will be able to:
Upon completion of this module, you should be able to:
After completing this module, you will be able to:
Upon completion of this module, you should be able to:
After completing this module, you will be able to: