SC-401 Information Security Administrator Associate course
Get prepared for the SC-401 exam with instructor led labs and hands on simulations available 24/7

SC-401 Information Security Administrator Associate course udemy course
Get prepared for the SC-401 exam with instructor led labs and hands on simulations available 24/7
We really hope you'll agree, this training is way more then the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
Welcome to the course
Understanding the Microsoft Environment
A Solid Foundation of Active Directory Domains
A Solid Foundation of RAS, DMZ, and Virtualization
A Solid Foundation of the Microsoft Cloud Services
Creating a free Microsoft 365 Azure AD Account
Managing Microsoft 365 Services with PowerShell
Connecting to Security and Compliance using PowerShell
IMPORTANT Using Assignments in the course
Implement and manage data classification
Identify sensitive information requirements for an organization's data
Translate sensitive information requirements into built-in or custom
Create and manage custom sensitive info types
Implement document fingerprinting
Create and manage exact data match (EDM) classifiers
What are trainable classifiers?
Create and manage trainable classifiers
Monitor data classification & label by using data explorer & content explorer
Configure optical character recognition (OCR) support for sensitive info types
Implement and manage sensitivity labels in Microsoft Purview
Implement roles and permissions for administering sensitivity labels
Define the concepts of sensitivity labels in Microsoft Purview
Define and create sensitivity labels for items and containers
Configure protection settings and content marking for sensitivity labels
Configure and manage publishing policies for sensitivity labels
Configure and manage auto-labeling policies for sensitivity labels
Apply a sensitivity label to containers, such as Teams, SharePoint etc
Apply sensitivity labels manually using Microsoft Word
Understanding Microsoft Defender for Cloud Apps
Apply sensitivity labels by using Microsoft Defender for Cloud Apps
Implement information protection for Windows, file shares, and Exchange
Plan the Microsoft Purview Information Protection client
Implement the Microsoft Purview Information Protection client
Manage files by using the Microsoft Purview Information Protection client
Apply bulk classifications with Microsoft Purview Information Protection scanner
Removing the Azure virtual machine that is no longer needed
Design solutions for email Encryption in Microsoft 365
Implement Microsoft Purview Message Encryption
Implement Microsoft Purview Advanced Message Encryption
Create and configure data loss prevention policies
Design data loss prevention policies based on an organization’s requirements
Implement roles and permissions for data loss prevention
Create and manage data loss prevention policies
Configure data loss prevention policies for Adaptive Protection
Interpret policy and rule precedence in data loss prevention
Create file policies in Microsoft Defender for Cloud Apps by using a DLP policy
Implement and monitor Microsoft Purview Endpoint DLP
Specify device requirements for Endpoint DLP, including extensions
Configure Endpoint DLP settings
Configure advanced DLP rules for devices in DLP policies
Configure just-in-time protection
Monitor endpoint activities
Implement and manage retention
Plan for information retention and disposition by using retention labels
Concepts of Retention Policies vs Retention Labels vs Retention Label Policies
Create, configure, and manage adaptive scopes
Create retention labels for data lifecycle management
Configure a retention label policy to publish labels
Configure a retention label policy to auto-apply labels
Interpret the results of policy precedence, including using Policy lookup
Create and configure retention policies
Recover retained content in Microsoft 365
Implement and manage Microsoft Purview Insider Risk Management
Implement roles and permissions for Insider Risk Management
Plan for Insider Risk Management in Microsoft 365
Plan and implement Insider Risk Management connectors
Plan integration with Microsoft Defender for Endpoint
Configure and manage Insider Risk Management settings
Configure policy indicators
Select an appropriate policy template
Create and manage Insider Risk Management policies
Manage forensic evidence settings
Enable and configure insider risk levels for Adaptive Protection
Manage insider risk alerts and cases
Manage Insider Risk Management workflow, including notice templates
Manage information security alerts and activities
Assign Microsoft Purview Audit (Premium) user licenses
Investigate activities by using Microsoft Purview Audit
Configure audit retention policies
Analyze Purview activities by using activity explorer
Respond to data loss prevention alerts in the Microsoft Purview portal
Investigate insider risk activities by using the Microsoft Purview portal
Respond to Purview alerts in Microsoft Defender XDR
Respond to Defender for Cloud Apps file policy alerts
Perform searches by using Content search
Protect data used by AI services
Implement controls in Microsoft Purview in an environment that uses AI services
Implement controls in MS 365 productivity workloads in environments that use AI
Deploying a Windows 11 virtual machine for the lab
Implement pre-requisites for DSPM for AI along with roles and permissions
Configure DSPM for AI policies
Delete the Windows 11 virtual machine stored in Azure
Monitor activities in DSPM for AI