Call Now

+92 312 0490601

Microsoft Office 365 MS-500

About this course

This course is tailored for security administrators aiming to protect Microsoft 365 environments. This training covers implementing and managing security and compliance solutions across Microsoft 365, focusing on identity and access management, threat protection, information protection, and governance features. You’ll learn to configure Azure Active Directory Identity Protection, Exchange Online Protection, Advanced Threat Analytics (ATA), and Microsoft Cloud App Security. Practical modules and hands-on labs equip you with skills in managing security incidents, implementing data loss prevention (DLP) policies, and enforcing compliance regulations. Prior experience with Microsoft 365 workloads, networking fundamentals, and PowerShell scripting is beneficial. Ideal for administrators looking to enhance their capabilities in safeguarding Microsoft 365 environments against modern cyber threats while ensuring compliance and data protection.

Course Outline

Module 1:

User and Group Management
  • Identity and Access Management concepts
  • The Zero Trust model
  • Plan your identity and authentication solution
  • User accounts and roles
  • Password Management

 

Lab: Initialize your tenant – users and groups
  • Set up your Microsoft 365 tenant
  • Manage users and groups

 

Lab: Password management
  • Configure Self-service password reset (SSPR) for user accounts in Azure AD
  • Deploy Azure AD Smart Lockout

 

Module 2:

Identity Synchronization and Protection
  • Plan directory synchronization
  • Configure and manage synchronized identities
  • Azure AD Identity Protection

 

Lab: Implement Identity Synchronization
  • Set up your organization for identity synchronization

Module 3:

Identity and Access Management
  • Application Management
  • Identity Governance
  • Manage device access
  • Role Based Access Control (RBAC)
  • Solutions for external access
  • Privileged Identity Management

 

Lab: Use Conditional Access to enable MFA
  • MFA Authentication Pilot (require MFA for specific apps)
  • MFA Conditional Access (complete an MFA roll out)

 

Lab: Configure Privileged Identity Management
  • Manage Azure resources
  • Assign directory roles
  • Activate and deactivate PIM roles
  • Directory roles
  • PIM resource workflows
  • View audit history for Azure AD roles in PIM

 

Module 4:

Security in Microsoft 365
  • Threat vectors and data breaches
  • Security strategy and principles
  • Microsoft security solutions
  • Secure Score

 

Lab: Use Microsoft Secure Score
  • Improve your secure score in the Microsoft 365 Security Center

Module 5:

Threat Protection
  • Exchange Online Protection (EOP)
  • Microsoft Defender for Office 365
  • Manage Safe Attachments
  • Manage Safe Links
  • Microsoft Defender for Identity
  • Microsoft Defender for Endpoint

 

Lab: Manage Microsoft 365 Security Services
  • Implement Microsoft Defender Policies

Module 6:

Threat Management
  • Security dashboard
  • Threat investigation and response
  • Azure Sentinel
  • Advanced Threat Analytics

 

Lab: Using Attack Simulator
  • Conduct a simulated Spear phishing attack
  • Conduct simulated password attacks

 

Module 7:

Microsoft Cloud Application Security
  • Deploy Cloud Application Security
  • Use cloud application security information

 

Module 8:

Mobility
  • Mobile Application Management (MAM)
  • Mobile Device Management (MDM)
  • Deploy mobile device services
  • Enroll devices to Mobile Device Management

 

Lab: Device Management
  • Enable Device Management
  • Configure Azure AD for Intune
  • Create compliance and conditional access policies

 

Module 9:

Information Protection and Governance
  • Information protection concepts
  • Governance and Records Management
  • Sensitivity labels
  • Archiving in Microsoft 365
  • Retention in Microsoft 365
  • Retention policies in the Microsoft 365 Compliance Center
  • Archiving and retention in Exchange
  • In-place records management in SharePoint

 

Lab: Archiving and Retention
  • Initialize compliance
  • Configure retention tags and policies

 

Module 10:

Rights Management and Encryption
  • Information Rights Management (IRM)
  • Secure Multipurpose Internet Mail Extension (S-MIME)
  • Office 365 Message Encryption

 

Lab: Configure Office 365 Message Encryption
  • Configure Office 365 Message Encryption
  • Validate Information Rights Management

 

Module 11:

Data Loss Prevention
  • Data loss prevention fundamentals
  • Create a DLP policy
  • Customize a DLP policy
  • Create a DLP policy to protect documents
  • Policy tips

 

Lab: Implement Data Loss Prevention policies
  • Manage DLP Policies
  • Test MRM and DLP Policies

 

Module 12:

Compliance Management
  • Compliance center

Module 13:

Insider Risk Management
  • Insider Risk
  • Privileged Access
  • Information barriers
  • Building ethical walls in Exchange Online

 

Lab: Privileged Access Management
  • Set up privileged access management and process a request

Module 14:

Discover and Respond
  • Content Search
  • Audit Log Investigations
  • Advanced eDiscovery

 

Lab: Manage Search and Investigation
  • Investigate your Microsoft 365 Data
  • Conduct a Data Subject Request

 

$ 150

}

Duration

30hrs

Module

14

Need Help?
Get instant support from our team

Chat on WhatsApp

}

8

Module

6