Microsoft 365 Administrator Video Course

MS-102: Microsoft 365 Administrator

Your Microsoft MS-102 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the MS-102 certification test. Ace your Microsoft MS-102 at the first attempt and obtain the Microsoft 365 Administrator credential with ease.

# of Students
110
# of Lectures
61
Course Length
5 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for MS-102 Video Course

Implementing and Managing a Microsoft 365 Tenant

  Video Name Time
  1. Creating a Microsoft 365 Tenant 6:05
  2. Implementing a Custom Domain 2:10
  3. Organizational Settings in Microsoft 365 5:28
  4. Identifying and Responding to Service Health Issues in Microsoft 365 5:57
  5. Monitoring Microsoft 365 Adoption and Usage with Microsoft Adoption Score 5:59
  Video Name Time
  1. Creating and Managing Users in Microsoft 365 9:51
  2. Creating and Managing Guest Users in Microsoft 365 2:55
  3. Creating and Managing Contacts in Microsoft 365 6:05
  4. Creating and Managing Groups in Microsoft 365 4:05
  5. Managing Microsoft 365 License Allocations 5:00
  6. Performing Bulk User Management in the Portal 11:30
  Video Name Time
  1. An Introduction to Roles in Microsoft 365 11:31
  2. Managing Roles in Microsoft 365 2:43
  3. Delegating Admin Roles to Partners 2:14
  4. Managing Delegation with Administrative Units 4:23
  5. Using Privileged Identity Management for Azure AD Roles 3:50
  Video Name Time
  1. Preparing for Identity Synchronization 6:17
  2. Directory Synchronization with Azure AD Connect 9:06
  3. Monitoring Synchronization with Azure AD Connect Health 2:56
  4. Troubleshooting Azure AD Synchronization 4:56
  Video Name Time
  1. Windows Hello for Business 3:18
  2. Passwordless Authentication with Microsoft Authenticator 4:39
  3. Self-service Password Reset 9:51
  4. Azure AD Password Protection 4:49
  5. Multi-factor Authentication 5:36
  6. Investigating and Resolving Authentication Issues with Sign-in Logs 4:42
  Video Name Time
  1. Azure AD Identity Protection 5:14
  2. Planning for Identity Protection 4:55
  3. Conditional Access Policies 3:36
  Video Name Time
  1. Improving Your Microsoft Secure Score in the Microsoft 365 Defender Portal 5:09
  2. Review and respond to security incidents and alerts in Microsoft 365 Defender 6:49
  3. Incident Notification Emails 4:11
  Video Name Time
  1. Securing Email with Microsoft Defender for Office 365 4:43
  2. Safe Attachment Policies in Defender for Office 365 5:40
  3. Safe Links in Email 3:18
  4. Safe Links in Teams 3:20
  5. Safe Links in Office Apps 2:29
  6. Spoof Intelligence in Defender for Office 365 8:56
  7. Attack Simulation Training 7:00
  Video Name Time
  1. Quarantine Policies in Defender for Office 365 5:38
  2. Creating Quarantine Policies in Defender for Office 365 3:39
  3. Assigning Quarantine Policies within Anti-Spam Policies 3:00
  4. Assigning Quarantine Policies within Anti-Phishing Policies 2:59
  5. Assigning Quarantine Policies within Anti-Malware Policies 2:38
  6. Assigning Quarantine Policies within Safe Attachment Policies 2:41
  Video Name Time
  1. What is Phishing? 2:13
  2. Anti-phishing protection in Defender for Office 365 6:58
  3. Understanding Attack Simulation Training in Defender for Office 365 4:23
  4. Understanding Anti-phishing policy Settings in Defender for Office 365 2:56
  5. Understanding Spoof Settings 2:32
  6. Understanding First Contact Safety Tip 1:33
  7. Anti-phishing Settings Exclusive to Microsoft Defender for Office 365 12:38
  Video Name Time
  1. What is Defender for Endpoint? 5:47
  2. Onboarding Devices to Defender for Endpoint 6:37
  3. Integrating Defender for Endpoint and Microsoft InTune 3:10
  4. Enabling Microsoft Defender for Endpoint in Microsoft Intune 2:02
  5. Configuring Defender for Endpoint to Use Compliance and App Protection Policies 2:06
  6. Reviewing and Responding to Endpoint Vulnerabilities 4:26
  7. Understanding the Microsoft Defender Vulnerability Management Dashboard 3:49
  Video Name Time
  1. Understanding Retention Labels and Retention Policies 10:44
  2. Understanding Sensitivity Labels and Policies 6:14

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Microsoft
Next Step
Next Step

Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address