Managing Microsoft 365 Identity and Access 

  • User Accounts in Microsoft 365
  • Administrator Roles and Security Groups
  • Password Management in Microsoft 365
  • Azure AD Identity Protection

Implementing Identity Synchronization

  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities

Access Management

  • Conditional Access
  • Managing Device Access
  • Role Based Access Control (RBAC)
  • Solutions for External Access

Security in Microsoft 365

  • Threat Vectors and Data Breaches
  • Security Solutions for Microsoft 365
  • Microsoft Secure Score

Advanced Threat Protection

  • Exchange Online Protection
  • Office 365 Advanced Threat Protection
  • Managing Safe Attachments
  • Managing Safe Links
  • Azure Advanced Threat Protection
  • Windows Defender Advanced Threat Protection

Data Loss Prevention

  • Data Loss Prevention Explained
  • Data Loss Prevention Policies
  • Creating a DLP Policy to Protect Documents
  • Policy Tips

Cloud Application Security

  • Cloud Application Security Explained
  • Using Cloud Application Security Information
  • Office 365 Cloud App Security

Data Governance in Microsoft 365

  • Planning Security and Compliance Needs
  • Building Ethical Walls in Exchange Online
  • Troubleshooting Data Governance
  • Analytics and Telemetry

FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Network Administrators, Servers Managers, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.


DATE:               28th Feb – 1st March, 2024

                            11th – 13th September, 2024




This workshop covers user password protection, multi-factor authentication, Azure Identity Protection, Active Directory federation services, Azure AD Connect, and introduces you to Conditional Access. You will also learn about threat protection technologies that help protect and secure your Microsoft 365 environment. This Microsoft 365 security course will also examine data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations. By the end of this workshop, you will be able to

  •   Use Microsoft Secure Score to evaluate your security posture
  •   Use the Security Dashboard in the Microsoft Security & Compliance center
  •   Configure various advanced threat protection services for Microsoft 365


There are no reviews yet.


Your email address will not be published. Required fields are marked *

Shopping Cart