You are on page 1of 3

Microsoft 365 Mobility and Security (MS-101)

Course Number: MOC-MS-101


Duration: 5 days

Overview

This Microsoft 365 Mobility and Security training course (MS-101) teaches attendees how to
manage their security metrics and implement Microsoft 365 Compliance Management.  In
addition, attendees explore the world of Microsoft 365 device management.

Prerequisites

Students should have completed one of the Microsoft 365 workload administrator
certification paths.

Materials

All Microsoft 365 training students receive Microsoft official courseware.

Software Needed on Each Student PC

Attendees will not need to install any software on their computer for this class. The class will
be conducted in a remote environment that Accelebrate will provide; students will only need
a local computer with a web browser and a stable Internet connection. Any recent version of
Microsoft Edge, Mozilla Firefox, or Google Chrome will be fine.

Objectives

 Microsoft 365 security metrics


 Microsoft 365 security services
 Microsoft 365 threat intelligence
 Data governance in Microsoft 365
 Archiving and retention in Office 365
 Data governance in Microsoft 365 Intelligence
 Search and investigations
 Device management
 Windows 10 deployment strategies
 Mobile device management

Outline

 Introduction
 Introduction to Microsoft 365 Security Metrics
o Threat Vectors and Data Breaches
o The Zero Trust Model
o Security Solutions in Microsoft 365

Copyright ©2003-2022 Accelebrate, Inc. Some outlines may contain content from our courseware partners; such
content is protected by these partners’ copyrights. All trademarks are owned by their respective owners.
o Introduction to Microsoft Secure Score
o Privileged Identity Management
o Introduction to Azure Active Directory Identity Protection
 Managing Your Microsoft 365 Security Services
o Introduction to Exchange Online Protection
o Introduction to Advanced Threat Protection
o Managing Safe Attachments
o Managing Safe Links
o Monitoring and Reports
 Microsoft 365 Threat Intelligence
o Overview of Microsoft 365 Threat Intelligence
o Using the Security Dashboard
o Configuring Advanced Threat Analytics
o Implementing Your Cloud Application Security
 Introduction to Data Governance in Microsoft 365
o Archiving in Microsoft 365
o Retention in Microsoft 365
o Information Rights Management
o Secure Multipurpose Internet Mail Extension
o Office 365 Message Encryption
o Data Loss Prevention
 Archiving and Retention in Microsoft 365
o In-Place Records Management in SharePoint
o Archiving and Retention in Exchange
o Retention Policies in the SCC
 Implementing Data Governance in Microsoft 365 Intelligence
o Evaluating Your Compliance Readiness
o Implementing Compliance Center Solutions
o Building Ethical Walls in Exchange Online
o Creating a Simple DLP Policy from a Built-in Template
o Creating a Custom DLP Policy
o Creating a DLP Policy to Protect Documents
o Working with Policy Tips
 Managing Data Governance in Microsoft 365
o Managing Retention in Email
o Troubleshooting Data Governance
o Implementing Azure Information Protection
o Implementing Advanced Features of AIP
o Implementing Windows Information Protection
 Managing Search and Investigations
o Searching for Content in the Security and Compliance Center
o Auditing Log Investigations
o Managing Advanced eDiscovery
 Planning for Device Management
o Introduction to Co-management
o Preparing Your Windows 10 Devices for Co-management
o Transitioning from Configuration Manager to Intune
o Introduction to Microsoft Store for Business
o Planning for Mobile Application Management
 Planning Your Windows 10 Deployment Strategy

Copyright ©2003-2022 Accelebrate, Inc. Some outlines may contain content from our courseware partners; such
content is protected by these partners’ copyrights. All trademarks are owned by their respective owners.
o Windows 10 Deployment Scenarios
o Implementing and Managing Windows Autopilot
o Planning Your Windows 10 Subscription Activation Strategy
o Resolving Windows 10 Upgrade Errors
o Introduction to Windows Analytics
 Implementing Mobile Device Management
o Planning Mobile Device Management
o Deploying Mobile Device Management
o Enrolling Devices to MDM
o Managing Device Compliance
 Conclusion

Copyright ©2003-2022 Accelebrate, Inc. Some outlines may contain content from our courseware partners; such
content is protected by these partners’ copyrights. All trademarks are owned by their respective owners.

You might also like