MS-500: Microsoft 365 Security Administration
Your Microsoft MS-500 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the MS-500 certification test. Ace your Microsoft MS-500 at the first attempt and obtain the Microsoft 365 Security Administration credential with ease.
Curriculum for MS-500 Video Course
Introduction to the course
Video Name | Time | |
---|---|---|
1. Creating a free Microsoft 365/Azure account for practice | 6:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Creating and Managing User Identities | 8:00 | |
2. Demonstration of Creating and Managing User Identities | 6:00 | |
3. Stepping through the hands on tutorial for User Identities | 1:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Group Creation in Microsoft 365 | 4:00 | |
2. Demonstration of Creating Groups in Microsoft 365 | 4:00 | |
3. Stepping through the hands on tutorial for Dynamic Group Creation | 2:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Password Expiration Management in Microsoft 365 | 4:00 | |
2. Demonstration of configuring Password Expiration in Microsoft 365 | 2:00 | |
3. Stepping through the hands on tutorial for configuring password expiration | 1:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Password Lockout Management in Microsoft 365 | 4:00 | |
2. Demonstration of configuring the Password Lockout settings | 3:00 | |
3. Stepping through the hands on tutorial for Password Lockout in Microsoft 365 | 2:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Assigning Roles | 12:00 | |
2. Demonstration on role permissions as well as assigning roles to identities | 6:00 | |
3. Stepping through the hands on tutorial for assigning roles | 1:00 | |
4. Understanding Privileged Identity Management (PIM) | 14:00 | |
5. Configuring Privileged Identity Management (PIM) | 9:00 | |
6. Activating a PIM role as a user | 5:00 | |
7. Stepping through the tutorial for PIM | 1:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Multi-Factor Authentication | 9:00 | |
2. Demonstration on how to implement Multi-Factor Authentication | 6:00 | |
3. Stepping through the tutorial for implementing Multi-Factor Authentication | 1:00 |
Video Name | Time | |
---|---|---|
1. Introduction to SSPR (Self Service Password Reset) | 5:00 | |
2. Demonstration on how to implement and configure SSPR | 5:00 | |
3. Stepping through the hands on tutorial for SSPR | 1:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Azure AD Identity Protection | 7:00 | |
2. Demonstration of using Azure AD Identity Protection | 6:00 | |
3. Stepping through the hands on tutorial for Azure AD Identity Protection Policies | 2:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Conditional Access Policies | 10:00 | |
2. Demonstration of controlling access using Conditional Access Policies | 11:00 | |
3. Stepping through the hands on tutorial for Conditional Access Policies | 2:00 | |
4. Understanding Device Compliance Policies | 6:00 | |
5. Implementing Device Compliance Policies using Enpoint Manager | 10:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Azure Information Protection | 7:00 | |
2. Demonstration on creating and managing AIP Sensitivity Labels | 10:00 | |
3. Stepping through the hands on tutorial for creating AIP Sensitivity Labels | 2:00 | |
4. Publishing AIP Labels in Microsoft 365 | 4:00 | |
5. Demonstration on publishing AIP Labels | 4:00 | |
6. Stepping through the hands on tutorial for publishing AIP Labels | 2:00 | |
7. Demonstration for using keyword based AIP Policies | 5:00 | |
8. Stepping through the hands on tutorial for using keyword based AIP Policies | 1:00 | |
9. Using AIP to block actions based upon keywords | 5:00 | |
10. Stepping through the tutorial for using AIP to block actions based on keywords | 2:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Data Loss Prevention | 7:00 | |
2. Demonstration of implementing Data Loss Prevention | 7:00 | |
3. Stepping through the first hands on tutorial for creating a DLP policy | 2:00 | |
4. Demonstration for editing an existing DLP Policy to apply an exception rule | 9:00 | |
5. Stepping through the tutorial for editing an existing DLP Policy | 2:00 | |
6. Demonstration in editing a DLP Policy to add incident report support for a user | 4:00 | |
7. Stepping through the tutorial for adding incident report support to a DLP Policy | 2:00 | |
8. Data Governance and Retention using Security and Compliance | 3:00 |
Video Name | Time | |
---|---|---|
1. Introduction to ATP (Advanced Threat Protection) | 9:00 | |
2. Demonstration on configuring and creating ATP Safe Attachments and Safe Links | 9:00 | |
3. Stepping through the hands on tutorial for creating an ATP Safe Links Policy | 2:00 | |
4. Windows Defender ATP Guard Technologies | 7:00 |
Video Name | Time | |
---|---|---|
1. Introduction to eDiscovery in Microsoft 365 | 6:00 | |
2. Demonstration for adding privileges to a user to manage eDiscovery | 2:00 | |
3. Stepping through the hands on tutorial for assigning eDiscovery Manager rights | 1:00 | |
4. Demonstration using eDiscovery and placing a hold on a user | 4:00 | |
5. Stepping through the hands on tutorial for placing an eDiscovery Hold | 2:00 | |
6. Working with Security Reports in Microsoft 365 | 6:00 | |
7. Working with Auditing Alerts and Content Searches in Microsoft 365 | 6:00 |
Video Name | Time | |
---|---|---|
1. Introduction to Microsoft Intune | 12:00 | |
2. Using Intune with the Endpoint Manager Portal | 13:00 | |
3. Understanding how Device Configuration Profiles can help secure devices | 6:00 | |
4. Implementing a Device Configuration Profile with Intune | 6:00 | |
5. Using App Protection Policies to help protect Office 365 Apps | 8:00 |
Video Name | Time | |
---|---|---|
1. Foundation of Active Directory Domains | 13:00 | |
2. A foundation for Remote Access, DMZs, and Virtualization | 8:00 | |
3. A foundation of the Microsoft Cloud Services | 12:00 | |
4. Setting up custom domain settings toprepare for Azure AD Connect | 6:00 | |
5. Setting up custom domain name setting in AzureAD | 5:00 | |
6. Performing cleanup to prepare for Azure AD connect | 6:00 | |
7. Setting up a Hybrid environment using AzureAD Connect | 17:00 | |
8. Verifying Azure AD Connect Health | 4:00 |
Video Name | Time | |
---|---|---|
1. Understanding Cloud App Security | 9:00 | |
2. Utilizing Cloud App Security | 12:00 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals