Companies Home Search Profile

SC-400 Course Microsoft Information Protection Administrator

Focused View

John Christopher

6:30:58

3 View
  • 1 - Welcome to the SC400 Course.mp4
    04:51
  • 2 - Understanding the Microsoft Environment.mp4
    01:51
  • 3 - A Solid Foundation of Active Directory Domains.mp4
    10:34
  • 4 - A Solid Foundation of RAS DMZ and Virtualization.mp4
    13:13
  • 5 - A Solid Foundation of the Microsoft Cloud Services.mp4
    12:28
  • 6 - Creating a trial Microsoft 365 Azure Account.mp4
    06:43
  • 7 - Managing Microsoft 365 Services with Powershell.mp4
    15:55
  • 8 - Connecting to Security and Compliance using PowerShell.mp4
    03:22
  • 9 - IMPORTANT Using Assignments in the course.mp4
    04:08
  • 10 - Questions for John Christopher.mp4
    05:43
  • 11 - Selecting a Sensitive Information Type based on an Organizations Requirements.mp4
    03:55
  • 12 - Creating and Managing Custom Sensitive Information Types.mp4
    08:30
  • 13 - Creating Custom Sensitive Information Types with exact data match.mp4
    02:49
  • 14 - DocumentFingerprintingMicrosoft365ComplianceMicrosoftDocs.pdf
  • 14 - Understanding Document Fingerprinting.mp4
    05:10
  • 15 - Creating a Keyword Dictionary.mp4
    02:50
  • 16 - Understanding Trainable Classifiers.mp4
    06:01
  • 17 - GetstartedwithtrainableclassifiersMicrosoft365ComplianceMicrosoftDocs.pdf
  • 17 - Getting Started with Trainable Classifiers.mp4
    03:15
  • 18 - Understanding Sensitivity Labels.mp4
    09:13
  • 19 - Identifying Roles and Permissions for Administering Sensitivity Labels.mp4
    07:22
  • 20 - Enabling Audit Logging before working with Sensitivity Labels.mp4
    01:32
  • 21 - Creating Sensitivity Labels including with Email Content Marking and Encryption.mp4
    10:04
  • 22 - Configuring and Managing Sensitivity Label Policies.mp4
    05:19
  • 22 - LearnaboutsensitivitylabelsMicrosoft365ComplianceMicrosoftDocs.pdf
  • 23 - Applying Sensitivity Labels to Teams Microsoft 365 groups and SharePoint.mp4
    18:43
  • 24 - Configuring & Publishing Automatic Labeling Policies excluding MCAS scenarios.mp4
    05:02
  • 25 - Viewing Sensitivity Labels as an end user.mp4
    03:25
  • 26 - Monitoring Data Classification and Label usage by using Label Analytics Tools.mp4
    04:15
  • 27 - Defining Requirements for Implementing Office 365 Message Encryption.mp4
    07:20
  • 28 - Using the classic or new portal for Advanced OME.mp4
    01:11
  • 29 - Implementing Office 365 Advanced Message Encryption.mp4
    05:20
  • 29 - MessageEncryptionMicrosoft365ComplianceMicrosoftDocs.pdf
  • 30 - Understanding the purpose of Data Loss Prevention.mp4
    06:27
  • 31 - Recommending a Data Loss Prevention Solution for an Organization.mp4
    06:52
  • 32 - Configuring Data Loss Prevention for Policy Precedence.mp4
    03:52
  • 33 - Configuring policies for Exchange SharePoint OneDrive and Teams.mp4
    21:16
  • 34 - Configuring the custom advanced settings in Data Loss Prevention policies.mp4
    11:54
  • 35 - Editing the default Office 365 Data Loss Prevention Policy.mp4
    02:20
  • 36 - Understanding Microsoft Cloud App Security MCAS.mp4
    08:55
  • 37 - Configuring policies in Microsoft Cloud App Security MCAS.mp4
    12:09
  • 38 - CreatetestandtuneaDLPpolicyMicrosoft365ComplianceMicrosoftDocs.pdf
  • 38 - Implementing Data Loss Prevention Policies in Test Mode.mp4
    04:58
  • 39 - Setting up proper licensing for Microsoft Endpoint Data Loss Prevention.mp4
    05:22
  • 40 - Configuring Policies for Endpoints.mp4
    04:22
  • 41 - Configuring Endpoint Data Loss Prevention Settings.mp4
    07:06
  • 41 - GetstartedwithMicrosoft365EndpointdatalosspreventionMicrosoft365ComplianceMicrosoftDocs.pdf
  • 42 - Recommending Configurations that enable devices for Endpoint DLP.mp4
    06:31
  • 43 - Monitoring Endpoint Activities and Reports for Policy Violations.mp4
    02:05
  • 44 - Creating and Applying Retention Labels.mp4
    09:27
  • 45 - Creating and Applying Retention Label Policies.mp4
    03:20
  • 46 - Configuring and Publishing AutoApply Label Policies.mp4
    04:34
  • 47 - LearnaboutretentionpolicieslabelstoautomaticallyretainordeletecontentMicrosoft365ComplianceMicrosoftDocs.pdf
  • 47 - Understanding Conflicting Retention Policies.mp4
    02:10
  • 48 - Creating and Applying Retention Policies in Microsoft SharePoint and OneDrive.mp4
    05:56
  • 49 - Creating and Applying Retention Policies in Microsoft Teams.mp4
    05:33
  • 50 - Recovering Content in Microsoft Teams SharePoint and OneDrive.mp4
    03:22
  • 51 - Recovering Content in Microsoft Exchange.mp4
    04:14
  • 52 - Implementing Retention Policies and Tags in Microsoft Exchange Classic.mp4
    05:27
  • 53 - Implementing a Retention Policy for Exchange in the Compliance Center.mp4
    02:15
  • 54 - Assigning Exchange Retention Policies in Outlook.mp4
    01:13
  • 55 - Applying mailbox holds in Microsoft Exchange.mp4
    05:04
  • 56 - Using PowerShell to enable Litigation and Retention Holds on Microsoft Exchange.mp4
    06:21
  • 57 - Implementing Microsoft Exchange Online Archiving Policies.mp4
    06:39
  • 58 - Configuring Labels for Records Management.mp4
    05:03
  • 58 - RecordsManagementinMicrosoft365Microsoft365ComplianceMicrosoftDocs.pdf
  • 59 - Managing and Migrating Retention Requirements with a File Plan.mp4
    09:06
  • 60 - Configuring Automatic Retention and Sensitivity Classification Records.mp4
    05:07
  • 61 - Implementing InPlace Records Management in Microsoft SharePoint.mp4
    05:16
  • 62 - Managing Disposition of Records.mp4
    06:38
  • Description


    Get prepared for the SC-400 exam with instructor led labs and hands on simulations available 24/7

    What You'll Learn?


    • Learn the concepts and perform hands on activities needed to pass the SC-400 exam
    • Gain a tremendous amount of knowledge involving Microsoft 365 and Azure Services
    • Get loads of hands on experience with Microsoft Information Protection Services!
    • Utilize hands on simulations that can be access anytime, anywhere!

    Who is this for?


  • IT people interested in learning and passing the Microsoft SC-400 Exam
  • People interested in learning a tremendous amount about Microsoft 365 Information Protection Services
  • What You Need to Know?


  • Willingness to put in the time and practice the steps shown in the course
  • More details


    Description

    We really hope you'll agree, this training is way more then the average course on Udemy!

    Have access to the following:

    • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

    • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

    • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

    TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

    Introduction

    • Welcome to the course

    • Understanding the Microsoft Environment

    • A Solid Foundation of Active Directory Domains

    • A Solid Foundation of RAS, DMZ, and Virtualization

    • A Solid Foundation of the Microsoft Cloud Services

    • Creating a free Microsoft 365 Azure AD Account

    • Managing Microsoft 365 Services with PowerShell

    • Connecting to Security and Compliance using PowerShell

    • IMPORTANT Using Assignments in the course

    Creating and Managing Sensitive Information Types

    • Selecting a Sensitive Information Type based on an Organization's Requirements

    • Creating and Managing Custom Sensitive Information Types

    • Creating Custom Sensitive Information Types with exact data match

    • Understanding Document Fingerprinting

    • Creating a Keyword Dictionary

    Trainable Classifiers

    • Understanding Trainable Classifiers

    • Getting Started with Trainable Classifiers

    Implementing and Managing Sensitivity Labels

    • Understanding Sensitivity Labels

    • Identifying Roles and Permissions for Administering Sensitivity Labels

    • Enabling Audit Logging before working with Sensitivity Labels

    • Creating Sensitivity Labels including with Email, Content Marking and Encryption Settings

    • Configuring and Managing Sensitivity Label Policies

    • Applying Sensitivity Labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites

    • Configuring and Publishing Automatic Labeling Policies (excluding MCAS scenarios)

    • Viewing Sensitivity Labels as an end user

    • Monitoring Data Classification and Label usage by using Label Analytics Tools such as content explorer and activity explorer

    Design and implement encryption for email messages

    • Design an email encryption solution based on methods available in Microsoft 365

    • Implement Microsoft Purview Message Encryption

    • Implement Microsoft Purview Advanced Message Encryption

    Creating and Configuring Data Loss Prevention Policies

    • Understanding the purpose of Data Loss Prevention

    • Recommending a Data Loss Prevention Solution for an Organization

    • Configuring Data Loss Prevention for Policy Precedence

    • Configuring policies for Exchange, SharePoint, OneDrive and Teams

    • Configuring the custom advanced settings in Data Loss Prevention policies

    • Editing the default Office 365 Data Loss Prevention Policy

    • Understanding Microsoft Cloud App Security (MCAS)

    • Configuring policies in Microsoft Cloud App Security (MCAS)

    • Implementing Data Loss Prevention Policies in Test Mode

    Implementing and Monitoring Microsoft Endpoint Data Loss Prevention

    • Setting up proper licensing for Microsoft Endpoint Data Loss Prevention

    • Configuring Policies for Endpoints

    • Configuring Endpoint Data Loss Prevention Settings

    • Recommending Configurations that enable devices for Endpoint Data Loss Prevention Policies

    • Monitoring Endpoint Activities and Reports for Policy Violations

    Retain and delete data by using retention labels

    • Plan for information retention and disposition by using retention labels

    • Create retention labels for data lifecycle management

    • Configure and manage adaptive scopes

    • Configure a retention label policy to publish labels

    • Configure a retention label policy to auto-apply labels

    • Interpret the results of policy precedence, including using Policy lookup

    Manage data retention in Microsoft 365 workloads

    • Create and apply retention policies for SharePoint and OneDrive

    • Create and apply retention policies for Microsoft 365 groups

    • Create and apply retention policies for Teams

    • Create and apply retention policies for Engage (formerly Yammer)

    • Create and apply retention policies for Exchange Online

    • Apply mailbox holds in Exchange Online

    • Implement Exchange Online archiving

    • Configure preservation locks for retention policies and retention label policies

    • Recover retained content in Microsoft 365

    Implementing Records Management in Microsoft 365

    • Configuring Labels for Records Management

    • Managing and Migrating Retention Requirements with a File Plan

    • Configuring Automatic Retention and Sensitivity Classification Records using File Plan Descriptors

    • Implementing In-Place Records Management in Microsoft SharePoint

    • Managing Disposition of Records

    Plan and manage eDiscovery and Content search

    • Choose between eDiscovery (Standard) and eDiscovery (Premium)

    • Delegate permissions and perform Content search

    • Perform searches and respond to results from eDiscovery

    Manage and analyze audit logs and reports in Microsoft Purview

    • Choose between Audit (Standard) & Audit (Premium) based on an orgs requirements

    • Plan for and configure auditing

    • Investigate activities by using the unified audit log

    • Review and interpret compliance reports and dashboards using compliance manager

    • Configure alert policies

    • Configure audit retention policies

    Implement and manage Microsoft Purview Communication Compliance

    • Plan for communication compliance

    • Create and manage communication compliance policies

    • Investigate and remediate communication compliance alerts and reports

    Implement and manage Microsoft Purview Insider Risk Management

    • Plan for insider risk management

    • Create and manage insider risk management policies

    • Investigate and remediate insider risk activities, alerts, and reports

    • Manage inside risk cases, forensic evidence settings, and notice templates

    Implement and manage Microsoft Purview Information Barriers (IBs)

    • Plan for IBs

    • Create and manage IB segments and policies

    • Configure Teams, SharePoint, & OneDrive to enforce IBs, including IB modes

    • Investigate issues with IB policies

    Implement and manage privacy requirements by using Microsoft Priva

    • Configure and maintain privacy risk management

    • Create and manage Privacy Risk Management policies

    • Understanding subject rights requests

    Who this course is for:

    • IT people interested in learning and passing the Microsoft SC-400 Exam
    • People interested in learning a tremendous amount about Microsoft 365 Information Protection Services

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    John Christopher
    John Christopher
    Instructor's Courses
    John Christopher is a Technical Instructor that has been in the business for over 20 years. His first experience with information technology occurred in the early 90s when he ran an MS-DOS based BBS(Bulletin Board System) as a System Operator. In the late 90s, after working with Windows NT 3.50 performing backups for Regal Group, he decided to get Windows NT Microsoft Certified.In 1998 he got his first Microsoft Certified Systems Engineer and Microsoft Certified Trainer certification. Shortly after getting certified, he began working as a Junior Administrator and Instructor for Knowledge Alliance in Atlanta GA. From there John was able to become one of the first people in the world to gain an MCSE for the Windows 2000 operating system and he began teaching full time for a company called Productivity Point International. At Productivity Point, John got Citrix Metaframe certified and began teaching Citrix along with Microsoft classes. Productivity Point began experiencing financial troubles and John moved on to work with another training company, located in Atlanta GA. in 2001.For many years at the training company in Atlanta John was the network administrator and held the title of Senior Technical Instructor for the company. John designed and administered their network from the ground up, going from a single floor in a single building, to multiple floors in multiple buildings and locations. He furthered his certifications, gaining the MCSE for 2003, 2008(MCITP), 2012, A+, Network+, Security+, Exchange, and CCNA. Along with his Network admin duties, John taught hundreds of students during his 11 years for the company. During all his years of training, John has had the honor of doing lots of classes with the military, along with quite a few classes within on-site military bases. In 2012, he decided to break away from company he had been working for and do consulting and contract teaching. Currently, John gets hired by many different training companies to teach technical training classes all over the United States. He is also hired as a consultant to go into companies and work on their networks and implement, along with troubleshoot real world scenarios.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 62
    • duration 6:30:58
    • English subtitles has
    • Release Date 2024/05/21