MS-101: Microsoft 365 Mobility and Security
Your Microsoft MS-101 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the MS-101 certification test. Ace your Microsoft MS-101 at the first attempt and obtain the Microsoft 365 Mobility and Security credential with ease.
Curriculum for MS-101 Video Course
Identifying Threat Vectors
Video Name | Time | |
---|---|---|
1. Today's Threat Landscape | 2:00 | |
2. What is Spoofing? | 3:00 | |
3. What is Phishing? | 3:00 | |
4. How do Spam and Malware Cause Harm? | 1:00 | |
5. How do Account Breaches Cause Harm? | 3:00 | |
6. Data Exfiltration, Deletion, and Spillage | 3:00 |
Video Name | Time | |
---|---|---|
1. What is Secure Score? | 2:00 | |
2. Using the Secure Score Dashboard and Analyzer | 3:00 | |
3. Increasing Your Security Posture | 5:00 |
Video Name | Time | |
---|---|---|
1. What is Azure Identity Protection? | 6:00 | |
2. Activating Azure Identity Protection | 3:00 | |
3. Configuring Azure Identity Protection | 6:00 | |
4. Configuring Alerts and Investigation | 4:00 | |
5. Setting Exclusions | 3:00 |
Video Name | Time | |
---|---|---|
1. What is Exchange Online Protection | 6:00 | |
2. Understanding Zero Hour Auto Purge | 3:00 | |
3. Spoofing and Phishing Protection | 3:00 | |
4. Configuring with Exchange AntiSpam | 7:00 | |
5. Configuring Exchange AntiMalware | 4:00 | |
6. Creating a Safe Attachment Policy | 7:00 | |
7. Creating a Transport Rule to Bypass Safe Attachments | 4:00 | |
8. Creating a Safe Links Policy | 5:00 | |
9. Creating a Transport Rule to Bypass Safe Links | 3:00 | |
10. Monitoring and Reporting | 5:00 |
Video Name | Time | |
---|---|---|
1. Microsoft Intelligent Security Graph | 3:00 | |
2. Working with the Security Dashboard | 4:00 | |
3. Viewing the Threat Explorer | 3:00 | |
4. What is the Microsoft Advanced Threat Analytics? | 5:00 | |
5. Configuring ATA | 9:00 | |
6. Managing ATA | 4:00 |
Video Name | Time | |
---|---|---|
1. In-Place Archive in Exchange | 3:00 | |
2. Enabling In-Place Archiving | 3:00 | |
3. In-Place Records Management in SharePoint | 3:00 | |
4. Activating In-Place Records Management | 6:00 | |
5. Messaging Records Management | 4:00 | |
6. Creating MRM Policy and Tags | 6:00 | |
7. Troubleshooting MRM Policies that Don't Run | 3:00 | |
8. Information Rights Management in Exchange | 4:00 | |
9. Information Rights Management in SharePoint | 6:00 | |
10. Office 365 Message Encryption | 4:00 |
Video Name | Time | |
---|---|---|
1. Planning Security and Compliance Roles | 4:00 | |
2. Reviewing GDPR Needs | 6:00 | |
3. Building an Ethical Wall | 4:00 | |
4. Working with a Retention Policy | 5:00 | |
5. Creating a Retention Policy | 9:00 | |
6. Data Loss Prevention | 4:00 | |
7. Creating a DLP Policy | 11:00 | |
8. Troubleshooting Policy Tips | 2:00 | |
9. What is Azure Information Protection? | 3:00 | |
10. Planning Azure Information Protection | 3:00 | |
11. Configuring Super User for AIP | 3:00 | |
12. Implementing the AIP Labels and Policies | 2:00 | |
13. Working with AIP Labels and Policies | 8:00 | |
14. What is Windows Information Protection? | 5:00 | |
15. Planning for Windows Information Protection | 3:00 | |
16. Implementing Windows Information Protection | 4:00 |
Video Name | Time | |
---|---|---|
1. What is Content Search? | 2:00 | |
2. Creating a Content Search | 4:00 | |
3. Auditing in Microsoft 365 | 2:00 | |
4. Searching Audit Logs | 9:00 | |
5. Configuring Audit Policy in SharePoint | 1:00 |
Video Name | Time | |
---|---|---|
1. Planning for Device Management | 4:00 | |
2. Prerequisites for Using Co-Management | 2:00 | |
3. Enabling Co-Management | 1:39 | |
4. Transferring Service to Intune | 2:00 | |
5. What is the Microsoft Store for Business? | 3:00 | |
6. Configuring the Microsoft Store for Business | 2:00 | |
7. Managing Settings for the Microsoft Store for Business | 4:00 | |
8. What is the Mobile Application Management? | 3:00 | |
9. Configuring Mobile Application Management | 3:00 | |
10. Using Azure Ad for Apps | 4:00 |
Video Name | Time | |
---|---|---|
1. Planning for Windows as a Service | 3:00 | |
2. What are Windows 10 Deployment Models? | 8:00 | |
3. Planning Your Subscription Activation Strategy | 3:00 | |
4. Resolving Windows 10 Upgrade Errors | 7:00 |
Video Name | Time | |
---|---|---|
1. Managing Devices with MDM | 3:00 | |
2. Activating MDM | 3:00 | |
3. Configuring MDM | 3:00 | |
4. Managing Device Policies | 5:00 | |
5. Creating Conditional Access Policies | 6:00 | |
6. Enrolling Devices for MDM | 3:00 | |
7. Monitoring Enrolled Devices | 3:00 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals