Microsoft 365 Security Administration Video Course

MS-500: Microsoft 365 Security Administration

Your Microsoft MS-500 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the MS-500 certification test. Ace your Microsoft MS-500 at the first attempt and obtain the Microsoft 365 Security Administration credential with ease.

# of Students
138
# of Lectures
78
Course Length
7 h
Course Rating
4.5
Price $27.49
Today $24.99

Curriculum for MS-500 Video Course

Introduction to the course

  Video Name Time
  1. Creating a free Microsoft 365/Azure account for practice 6:00
  Video Name Time
  1. Introduction to Creating and Managing User Identities 8:00
  2. Demonstration of Creating and Managing User Identities 6:00
  3. Stepping through the hands on tutorial for User Identities 1:00
  Video Name Time
  1. Introduction to Group Creation in Microsoft 365 4:00
  2. Demonstration of Creating Groups in Microsoft 365 4:00
  3. Stepping through the hands on tutorial for Dynamic Group Creation 2:00
  Video Name Time
  1. Introduction to Password Expiration Management in Microsoft 365 4:00
  2. Demonstration of configuring Password Expiration in Microsoft 365 2:00
  3. Stepping through the hands on tutorial for configuring password expiration 1:00
  Video Name Time
  1. Introduction to Password Lockout Management in Microsoft 365 4:00
  2. Demonstration of configuring the Password Lockout settings 3:00
  3. Stepping through the hands on tutorial for Password Lockout in Microsoft 365 2:00
  Video Name Time
  1. Introduction to Assigning Roles 12:00
  2. Demonstration on role permissions as well as assigning roles to identities 6:00
  3. Stepping through the hands on tutorial for assigning roles 1:00
  4. Understanding Privileged Identity Management (PIM) 14:00
  5. Configuring Privileged Identity Management (PIM) 9:00
  6. Activating a PIM role as a user 5:00
  7. Stepping through the tutorial for PIM 1:00
  Video Name Time
  1. Introduction to Multi-Factor Authentication 9:00
  2. Demonstration on how to implement Multi-Factor Authentication 6:00
  3. Stepping through the tutorial for implementing Multi-Factor Authentication 1:00
  Video Name Time
  1. Introduction to SSPR (Self Service Password Reset) 5:00
  2. Demonstration on how to implement and configure SSPR 5:00
  3. Stepping through the hands on tutorial for SSPR 1:00
  Video Name Time
  1. Introduction to Azure AD Identity Protection 7:00
  2. Demonstration of using Azure AD Identity Protection 6:00
  3. Stepping through the hands on tutorial for Azure AD Identity Protection Policies 2:00
  Video Name Time
  1. Introduction to Conditional Access Policies 10:00
  2. Demonstration of controlling access using Conditional Access Policies 11:00
  3. Stepping through the hands on tutorial for Conditional Access Policies 2:00
  4. Understanding Device Compliance Policies 6:00
  5. Implementing Device Compliance Policies using Enpoint Manager 10:00
  Video Name Time
  1. Introduction to Azure Information Protection 7:00
  2. Demonstration on creating and managing AIP Sensitivity Labels 10:00
  3. Stepping through the hands on tutorial for creating AIP Sensitivity Labels 2:00
  4. Publishing AIP Labels in Microsoft 365 4:00
  5. Demonstration on publishing AIP Labels 4:00
  6. Stepping through the hands on tutorial for publishing AIP Labels 2:00
  7. Demonstration for using keyword based AIP Policies 5:00
  8. Stepping through the hands on tutorial for using keyword based AIP Policies 1:00
  9. Using AIP to block actions based upon keywords 5:00
  10. Stepping through the tutorial for using AIP to block actions based on keywords 2:00
  Video Name Time
  1. Introduction to Data Loss Prevention 7:00
  2. Demonstration of implementing Data Loss Prevention 7:00
  3. Stepping through the first hands on tutorial for creating a DLP policy 2:00
  4. Demonstration for editing an existing DLP Policy to apply an exception rule 9:00
  5. Stepping through the tutorial for editing an existing DLP Policy 2:00
  6. Demonstration in editing a DLP Policy to add incident report support for a user 4:00
  7. Stepping through the tutorial for adding incident report support to a DLP Policy 2:00
  8. Data Governance and Retention using Security and Compliance 3:00
  Video Name Time
  1. Introduction to ATP (Advanced Threat Protection) 9:00
  2. Demonstration on configuring and creating ATP Safe Attachments and Safe Links 9:00
  3. Stepping through the hands on tutorial for creating an ATP Safe Links Policy 2:00
  4. Windows Defender ATP Guard Technologies 7:00
  Video Name Time
  1. Introduction to eDiscovery in Microsoft 365 6:00
  2. Demonstration for adding privileges to a user to manage eDiscovery 2:00
  3. Stepping through the hands on tutorial for assigning eDiscovery Manager rights 1:00
  4. Demonstration using eDiscovery and placing a hold on a user 4:00
  5. Stepping through the hands on tutorial for placing an eDiscovery Hold 2:00
  6. Working with Security Reports in Microsoft 365 6:00
  7. Working with Auditing Alerts and Content Searches in Microsoft 365 6:00
  Video Name Time
  1. Introduction to Microsoft Intune 12:00
  2. Using Intune with the Endpoint Manager Portal 13:00
  3. Understanding how Device Configuration Profiles can help secure devices 6:00
  4. Implementing a Device Configuration Profile with Intune 6:00
  5. Using App Protection Policies to help protect Office 365 Apps 8:00
  Video Name Time
  1. Foundation of Active Directory Domains 13:00
  2. A foundation for Remote Access, DMZs, and Virtualization 8:00
  3. A foundation of the Microsoft Cloud Services 12:00
  4. Setting up custom domain settings toprepare for Azure AD Connect 6:00
  5. Setting up custom domain name setting in AzureAD 5:00
  6. Performing cleanup to prepare for Azure AD connect 6:00
  7. Setting up a Hybrid environment using AzureAD Connect 17:00
  8. Verifying Azure AD Connect Health 4:00
  Video Name Time
  1. Understanding Cloud App Security 9:00
  2. Utilizing Cloud App Security 12:00

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
4.5
Rating: 4.5
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIMA
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CrowdStrike
  • CSA
  • CWNP
  • CyberArk
  • Databricks
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAAP
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Infor
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Meta
  • Microsoft
  • Mulesoft
  • NACVA
  • NADCA
  • NCMA
  • NetSuite
  • Network Appliance
  • NFPA
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scaled Agile
  • Scrum
  • SDI
  • ServiceNow
  • Sitecore
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Versa Networks
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Microsoft
Next Step
Next Step

Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address