SC-401 Information Security Administrator Associate course

Get prepared for the SC-401 exam with instructor led labs and hands on simulations available 24/7

SC-401 Information Security Administrator Associate course
SC-401 Information Security Administrator Associate course

SC-401 Information Security Administrator Associate course udemy course

Get prepared for the SC-401 exam with instructor led labs and hands on simulations available 24/7

We really hope you'll agree, this training is way more then the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Introduction

  • Welcome to the course

  • Understanding the Microsoft Environment

  • A Solid Foundation of Active Directory Domains

  • A Solid Foundation of RAS, DMZ, and Virtualization

  • A Solid Foundation of the Microsoft Cloud Services

  • Creating a free Microsoft 365 Azure AD Account

  • Managing Microsoft 365 Services with PowerShell

  • Connecting to Security and Compliance using PowerShell

  • IMPORTANT Using Assignments in the course

Implement and manage data classification

  • Identify sensitive information requirements for an organization's data

  • Translate sensitive information requirements into built-in or custom

  • Create and manage custom sensitive info types

  • Implement document fingerprinting

  • Create and manage exact data match (EDM) classifiers

  • What are trainable classifiers?

  • Create and manage trainable classifiers

  • Monitor data classification & label by using data explorer & content explorer

  • Configure optical character recognition (OCR) support for sensitive info types

Implement and manage sensitivity labels in Microsoft Purview

  • Implement roles and permissions for administering sensitivity labels

  • Define the concepts of sensitivity labels in Microsoft Purview

  • Define and create sensitivity labels for items and containers

  • Configure protection settings and content marking for sensitivity labels

  • Configure and manage publishing policies for sensitivity labels

  • Configure and manage auto-labeling policies for sensitivity labels

  • Apply a sensitivity label to containers, such as Teams, SharePoint etc

  • Apply sensitivity labels manually using Microsoft Word

  • Understanding Microsoft Defender for Cloud Apps

  • Apply sensitivity labels by using Microsoft Defender for Cloud Apps

Implement information protection for Windows, file shares, and Exchange

  • Plan the Microsoft Purview Information Protection client

  • Implement the Microsoft Purview Information Protection client

  • Manage files by using the Microsoft Purview Information Protection client

  • Apply bulk classifications with Microsoft Purview Information Protection scanner

  • Removing the Azure virtual machine that is no longer needed

  • Design solutions for email Encryption in Microsoft 365

  • Implement Microsoft Purview Message Encryption

  • Implement Microsoft Purview Advanced Message Encryption

Create and configure data loss prevention policies

  • Design data loss prevention policies based on an organization’s requirements

  • Implement roles and permissions for data loss prevention

  • Create and manage data loss prevention policies

  • Configure data loss prevention policies for Adaptive Protection

  • Interpret policy and rule precedence in data loss prevention

  • Create file policies in Microsoft Defender for Cloud Apps by using a DLP policy

Implement and monitor Microsoft Purview Endpoint DLP

  • Specify device requirements for Endpoint DLP, including extensions

  • Configure Endpoint DLP settings

  • Configure advanced DLP rules for devices in DLP policies

  • Configure just-in-time protection

  • Monitor endpoint activities

Implement and manage retention

  • Plan for information retention and disposition by using retention labels

  • Concepts of Retention Policies vs Retention Labels vs Retention Label Policies

  • Create, configure, and manage adaptive scopes

  • Create retention labels for data lifecycle management

  • Configure a retention label policy to publish labels

  • Configure a retention label policy to auto-apply labels

  • Interpret the results of policy precedence, including using Policy lookup

  • Create and configure retention policies

  • Recover retained content in Microsoft 365

Implement and manage Microsoft Purview Insider Risk Management

  • Implement roles and permissions for Insider Risk Management

  • Plan for Insider Risk Management in Microsoft 365

  • Plan and implement Insider Risk Management connectors

  • Plan integration with Microsoft Defender for Endpoint

  • Configure and manage Insider Risk Management settings

  • Configure policy indicators

  • Select an appropriate policy template

  • Create and manage Insider Risk Management policies

  • Manage forensic evidence settings

  • Enable and configure insider risk levels for Adaptive Protection

  • Manage insider risk alerts and cases

  • Manage Insider Risk Management workflow, including notice templates

Manage information security alerts and activities

  • Assign Microsoft Purview Audit (Premium) user licenses

  • Investigate activities by using Microsoft Purview Audit

  • Configure audit retention policies

  • Analyze Purview activities by using activity explorer

  • Respond to data loss prevention alerts in the Microsoft Purview portal

  • Investigate insider risk activities by using the Microsoft Purview portal

  • Respond to Purview alerts in Microsoft Defender XDR

  • Respond to Defender for Cloud Apps file policy alerts

  • Perform searches by using Content search

Protect data used by AI services

  • Implement controls in Microsoft Purview in an environment that uses AI services

  • Implement controls in MS 365 productivity workloads in environments that use AI

  • Deploying a Windows 11 virtual machine for the lab

  • Implement pre-requisites for DSPM for AI along with roles and permissions

  • Configure DSPM for AI policies

  • Delete the Windows 11 virtual machine stored in Azure

  • Monitor activities in DSPM for AI