Programming & Development

MS-101T00 Microsoft 365 Mobility and Security


The Microsoft 365 Mobility and Security course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role. This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In security management, you will examine all the common types of threat vectors and data breaches and how Microsoft 365’s security solutions address these security threats. These solutions include: use of the Zero Trust security model, Microsoft Secure Score, Azure Identity Protection, Exchange Online Protection, Microsoft Defender for Office 365, Privileged Identity Management, Safe Attachments, Safe Links, and Threat Intelligence services such as Attack Simulation training, Threat Explorer, Threat Trackers, and Microsoft Threat Protection. In compliance management, you will examine the key aspects of data governance, including Information Rights Management, message encryption, data loss prevention (DLP), in-place records management, creating DLP policies and policy tips, and Azure and Windows Information Protection. In Microsoft 365 device management, you will learn how to co-manage your Windows 10 devices, how to transition from Configuration Manager to Intune, and how to implement Windows Autopilot, Windows Analytics, and Mobile Device Management.

Who Should Attend
This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.

Course Objectives
Microsoft 365 Security Metrics
Microsoft 365 Security Services
Microsoft 365 Threat Intelligence
Data Governance in Microsoft 365
Data Governance in Microsoft 365 Intelligence
Search and Investigations
Device Management
Windows 10 Deployment Strategies
Mobile Device Management

Course Outline:

Examine threat vectors and data breaches
Explore the Zero Trust security model
Explore security solutions in Microsoft 365
Examine Microsoft Secure Score
Examine Privileged Identity Management
Examine Azure Identity Protection
Examine Exchange Online Protection
Examine Microsoft Defender for Office 365
Manage Safe Attachments
Manage Safe Links
Explore reporting in the Microsoft 365 security services
Explore threat intelligence in Microsoft 365
Explore the Security Dashboard
Implement Microsoft Defender for Identity
Implement Microsoft Cloud Application Security
Explore archiving in Microsoft 365
Explore retention in Microsoft 365
Explore Information Rights Management
Explore Office 365 Message Encryption
Explore In-place Records Management in SharePoint
Explore Data Loss Prevention in Microsoft 365
Evaluate your compliance readiness
Implement compliance solutions
Create information barriers in Microsoft 365
Create a DLP policy from a built-in template
Create a custom DLP policy
Create a DLP policy to protect documents
Implement policy tips for DLP policies
Manage retention in email
Troubleshoot data governance
Explore sensitivity labels
Implement sensitivity labels
Implement Data Governance
Search for content in the Microsoft 365 Compliance center
Conduct audit log investigations
Manage Advanced eDiscovery
Explore Co-management of Windows 10 device
Prepare your Windows 10 devices for Co-management
Transition from Configuration Manager to Intune
Examine the Microsoft Store for Business
Plan for application management
Examine Windows 10 deployment scenarios
Explore Windows Autopilot deployment models
Plan your Windows 10 Subscription Activation strategy
Resolve Windows 10 upgrade errors
Analyze Windows 10 diagnostic data using Desktop Analytics
Explore Mobile Device Management
Deploy Mobile Device Management
Enroll devices to Mobile Device Management
Manage device compliance

Enroll in this course


Need Help Finding The Right Training Solution?

Our training advisors are here for you.