MS-102: Microsoft 365 Administrator
Your Microsoft MS-102 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the MS-102 certification test. Ace your Microsoft MS-102 at the first attempt and obtain the Microsoft 365 Administrator credential with ease.
Curriculum for MS-102 Video Course
Implementing and Managing a Microsoft 365 Tenant
Video Name | Time | |
---|---|---|
1. Creating a Microsoft 365 Tenant | 6:05 | |
2. Implementing a Custom Domain | 2:10 | |
3. Organizational Settings in Microsoft 365 | 5:28 | |
4. Identifying and Responding to Service Health Issues in Microsoft 365 | 5:57 | |
5. Monitoring Microsoft 365 Adoption and Usage with Microsoft Adoption Score | 5:59 |
Video Name | Time | |
---|---|---|
1. Creating and Managing Users in Microsoft 365 | 9:51 | |
2. Creating and Managing Guest Users in Microsoft 365 | 2:55 | |
3. Creating and Managing Contacts in Microsoft 365 | 6:05 | |
4. Creating and Managing Groups in Microsoft 365 | 4:05 | |
5. Managing Microsoft 365 License Allocations | 5:00 | |
6. Performing Bulk User Management in the Portal | 11:30 |
Video Name | Time | |
---|---|---|
1. An Introduction to Roles in Microsoft 365 | 11:31 | |
2. Managing Roles in Microsoft 365 | 2:43 | |
3. Delegating Admin Roles to Partners | 2:14 | |
4. Managing Delegation with Administrative Units | 4:23 | |
5. Using Privileged Identity Management for Azure AD Roles | 3:50 |
Video Name | Time | |
---|---|---|
1. Preparing for Identity Synchronization | 6:17 | |
2. Directory Synchronization with Azure AD Connect | 9:06 | |
3. Monitoring Synchronization with Azure AD Connect Health | 2:56 | |
4. Troubleshooting Azure AD Synchronization | 4:56 |
Video Name | Time | |
---|---|---|
1. Windows Hello for Business | 3:18 | |
2. Passwordless Authentication with Microsoft Authenticator | 4:39 | |
3. Self-service Password Reset | 9:51 | |
4. Azure AD Password Protection | 4:49 | |
5. Multi-factor Authentication | 5:36 | |
6. Investigating and Resolving Authentication Issues with Sign-in Logs | 4:42 |
Video Name | Time | |
---|---|---|
1. Azure AD Identity Protection | 5:14 | |
2. Planning for Identity Protection | 4:55 | |
3. Conditional Access Policies | 3:36 |
Video Name | Time | |
---|---|---|
1. Improving Your Microsoft Secure Score in the Microsoft 365 Defender Portal | 5:09 | |
2. Review and respond to security incidents and alerts in Microsoft 365 Defender | 6:49 | |
3. Incident Notification Emails | 4:11 |
Video Name | Time | |
---|---|---|
1. Securing Email with Microsoft Defender for Office 365 | 4:43 | |
2. Safe Attachment Policies in Defender for Office 365 | 5:40 | |
3. Safe Links in Email | 3:18 | |
4. Safe Links in Teams | 3:20 | |
5. Safe Links in Office Apps | 2:29 | |
6. Spoof Intelligence in Defender for Office 365 | 8:56 | |
7. Attack Simulation Training | 7:00 |
Video Name | Time | |
---|---|---|
1. Quarantine Policies in Defender for Office 365 | 5:38 | |
2. Creating Quarantine Policies in Defender for Office 365 | 3:39 | |
3. Assigning Quarantine Policies within Anti-Spam Policies | 3:00 | |
4. Assigning Quarantine Policies within Anti-Phishing Policies | 2:59 | |
5. Assigning Quarantine Policies within Anti-Malware Policies | 2:38 | |
6. Assigning Quarantine Policies within Safe Attachment Policies | 2:41 |
Video Name | Time | |
---|---|---|
1. What is Phishing? | 2:13 | |
2. Anti-phishing protection in Defender for Office 365 | 6:58 | |
3. Understanding Attack Simulation Training in Defender for Office 365 | 4:23 | |
4. Understanding Anti-phishing policy Settings in Defender for Office 365 | 2:56 | |
5. Understanding Spoof Settings | 2:32 | |
6. Understanding First Contact Safety Tip | 1:33 | |
7. Anti-phishing Settings Exclusive to Microsoft Defender for Office 365 | 12:38 |
Video Name | Time | |
---|---|---|
1. What is Defender for Endpoint? | 5:47 | |
2. Onboarding Devices to Defender for Endpoint | 6:37 | |
3. Integrating Defender for Endpoint and Microsoft InTune | 3:10 | |
4. Enabling Microsoft Defender for Endpoint in Microsoft Intune | 2:02 | |
5. Configuring Defender for Endpoint to Use Compliance and App Protection Policies | 2:06 | |
6. Reviewing and Responding to Endpoint Vulnerabilities | 4:26 | |
7. Understanding the Microsoft Defender Vulnerability Management Dashboard | 3:49 |
Video Name | Time | |
---|---|---|
1. Understanding Retention Labels and Retention Policies | 10:44 | |
2. Understanding Sensitivity Labels and Policies | 6:14 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals