YoVDO

SC-400: Implement Information Protection in Microsoft 365

Offered By: Microsoft via Microsoft Learn

Tags

Windows Systems Administration Courses Microsoft Office 365 Courses Microsoft Teams Courses Encryption Courses BitLocker Courses Data Classification Courses Data Loss Prevention Courses

Course Description

Overview

  • Module 1: Learn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.
  • Upon completion of this module, you should be able to:

    • Discuss information protection and governance and why it’s important.
    • Describe Microsoft’s approach to information protection and governance.
    • Define key terms associated with Microsoft’s information protection and governance solutions.
    • Identify the solutions that comprise information and governance in Microsoft 365.
  • Module 2: Learn how information protection helps organizations protect data to prevent data loss or theft.
  • At the end of this module, you should be able to:

    • Explain the importance of data loss prevention technologies
    • Identify the methods of data loss prevention
    • Assess and define data sensitivity
    • Apply Microsoft data loss prevention technologies
  • Module 3: Learn about the information available to help you understand your data landscape and know your data.
  • Upon completion of this module, you should be able to:

    • List the components of the Data Classification solution.
    • Identify the cards available on the Data Classification overview tab.
    • Explain the Content explorer and Activity explorer.
    • Describe how to use sensitive information types and trainable classifiers.
  • Module 4: Create and manage sensitive information types
  • After completing this module, you will be able to:

    • Recognize the difference between built-in and custom sensitivity labels
    • Configure sensitive information types with exact data match-based classification
    • Implement document fingerprinting
    • Create custom keyword dictionaries
  • Module 5: Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
  • Upon completion of this module, you should be able to:

    • Explain how encryption mitigates the risk of unauthorized data disclosure.
    • Describe Microsoft data-at-rest and data-in-transit encryption solutions.
    • Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
    • Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
  • Module 6: Deploy message encryption in Office 365
  • After completing this module, you will be able to:

    • Configure Office 365 Message Encryption for end users
    • Implement Advanced Office 365 Message Encryption
  • Module 7: Learn how to detect sensitive content as it's used and shared throughout your organization, in the cloud and on devices, and help prevent accidental data loss.
  • Upon completion of this module, you should be able to:

    • Discuss the information protection solution and its benefits.
    • List the customer scenarios the information protection solution addresses.
    • Describe the information protection configuration process.
    • Explain what users will experience when the solution is implemented.
    • Articulate deployment and adoption best practices.
  • Module 8: Apply and manage sensitivity labels
  • After completing this module, you will be able to:

    • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
    • Monitor label usage using label analytics.
    • Configure on-premises labeling.
    • Manage protection settings and marking for applied sensitivity labels.
    • Apply protections and restrictions to email.
    • Apply protections and restrictions to files.

Syllabus

  • Module 1: Introduction to information protection and governance in Microsoft 365
    • Introduction to information and governance in Microsoft 365
    • Know your data
    • Protect your data
    • Prevent data loss
    • Govern your data
    • Summary and knowledge check
  • Module 2: Prevent data loss
    • Introduction to Microsoft 365 data loss prevention
    • Define the sensitive data you want to protect
    • Use data loss prevention (DLP) policies to protect your data
    • Summary and knowledge check
  • Module 3: Classify data for protection and governance
    • Data classification overview
    • Classify data using sensitive information types
    • Classify data using trainable classifiers
    • Review sensitive information and label usage
    • Explore labeled and sensitive content
    • Understand activities related to your data
    • Summary and knowledge check
  • Module 4: Create and manage sensitive information types
    • Introduction
    • Compare built-in versus custom sensitive information types
    • Create and manage custom sensitive information types
    • Describe custom sensitive information types with exact data match
    • Implement document fingerprinting
    • Create keyword dictionary
    • Knowledge check
    • Summary and resources
  • Module 5: Understand Microsoft 365 encryption
    • Introduction to Microsoft 365 encryption
    • Learn how BitLocker encrypts data-at-rest
    • Understand service encryption in Microsoft 365
    • Explore customer key management using Customer Key
    • Learn how data is encrypted in-transit
    • Summary and knowledge check
  • Module 6: Deploy message encryption in Office 365
    • Introduction
    • Implement Office 365 message encryption
    • Implement Office 365 advanced message encryption
    • Use Office message encryption templates in mail flow rules
    • Knowledge check
    • Summary and resources
  • Module 7: Protect information in Microsoft 365
    • Information protection overview
    • Configure sensitivity labels
    • Configure sensitivity label policies
    • Configure auto-labeling policies
    • Manage, monitor, and remediate information protection
    • Summary and knowledge check
  • Module 8: Apply and manage sensitivity labels
    • Introduction
    • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
    • Plan on-premises labeling
    • Configure on-premises labeling for the Unified Labeling Scanner
    • Apply protections and restrictions to email and files
    • Monitor label performance using label analytics
    • Knowledge check
    • Summary and resources

Tags

Related Courses

G Suite Mail Management
Google Cloud via Coursera
Google Workspace Mail Management
Google Cloud via Coursera
Data Loss Prevention: Qwik Start - Command Line
Google Cloud via Coursera
Data Loss Prevention: Qwik Start - JSON
Google Cloud via Coursera
Cyber Threat Intelligence
IBM via Coursera