SC-400: Implement Information Protection in Microsoft 365
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Learn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.
- Discuss information protection and governance and why it’s important.
- Describe Microsoft’s approach to information protection and governance.
- Define key terms associated with Microsoft’s information protection and governance solutions.
- Identify the solutions that comprise information and governance in Microsoft 365.
- Module 2: Learn how information protection helps organizations protect data to prevent data loss or theft.
- Explain the importance of data loss prevention technologies
- Identify the methods of data loss prevention
- Assess and define data sensitivity
- Apply Microsoft data loss prevention technologies
- Module 3: Learn about the information available to help you understand your data landscape and know your data.
- List the components of the Data Classification solution.
- Identify the cards available on the Data Classification overview tab.
- Explain the Content explorer and Activity explorer.
- Describe how to use sensitive information types and trainable classifiers.
- Module 4: Create and manage sensitive information types
- Recognize the difference between built-in and custom sensitivity labels
- Configure sensitive information types with exact data match-based classification
- Implement document fingerprinting
- Create custom keyword dictionaries
- Module 5: Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
- Explain how encryption mitigates the risk of unauthorized data disclosure.
- Describe Microsoft data-at-rest and data-in-transit encryption solutions.
- Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
- Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
- Module 6: Deploy message encryption in Office 365
- Configure Office 365 Message Encryption for end users
- Implement Advanced Office 365 Message Encryption
- Module 7: Learn how to detect sensitive content as it's used and shared throughout your organization, in the cloud and on devices, and help prevent accidental data loss.
- Discuss the information protection solution and its benefits.
- List the customer scenarios the information protection solution addresses.
- Describe the information protection configuration process.
- Explain what users will experience when the solution is implemented.
- Articulate deployment and adoption best practices.
- Module 8: Apply and manage sensitivity labels
- Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
- Monitor label usage using label analytics.
- Configure on-premises labeling.
- Manage protection settings and marking for applied sensitivity labels.
- Apply protections and restrictions to email.
- Apply protections and restrictions to files.
Upon completion of this module, you should be able to:
At the end of this module, you should be able to:
Upon completion of this module, you should be able to:
After completing this module, you will be able to:
Upon completion of this module, you should be able to:
After completing this module, you will be able to:
Upon completion of this module, you should be able to:
After completing this module, you will be able to:
Syllabus
- Module 1: Introduction to information protection and governance in Microsoft 365
- Introduction to information and governance in Microsoft 365
- Know your data
- Protect your data
- Prevent data loss
- Govern your data
- Summary and knowledge check
- Module 2: Prevent data loss
- Introduction to Microsoft 365 data loss prevention
- Define the sensitive data you want to protect
- Use data loss prevention (DLP) policies to protect your data
- Summary and knowledge check
- Module 3: Classify data for protection and governance
- Data classification overview
- Classify data using sensitive information types
- Classify data using trainable classifiers
- Review sensitive information and label usage
- Explore labeled and sensitive content
- Understand activities related to your data
- Summary and knowledge check
- Module 4: Create and manage sensitive information types
- Introduction
- Compare built-in versus custom sensitive information types
- Create and manage custom sensitive information types
- Describe custom sensitive information types with exact data match
- Implement document fingerprinting
- Create keyword dictionary
- Knowledge check
- Summary and resources
- Module 5: Understand Microsoft 365 encryption
- Introduction to Microsoft 365 encryption
- Learn how BitLocker encrypts data-at-rest
- Understand service encryption in Microsoft 365
- Explore customer key management using Customer Key
- Learn how data is encrypted in-transit
- Summary and knowledge check
- Module 6: Deploy message encryption in Office 365
- Introduction
- Implement Office 365 message encryption
- Implement Office 365 advanced message encryption
- Use Office message encryption templates in mail flow rules
- Knowledge check
- Summary and resources
- Module 7: Protect information in Microsoft 365
- Information protection overview
- Configure sensitivity labels
- Configure sensitivity label policies
- Configure auto-labeling policies
- Manage, monitor, and remediate information protection
- Summary and knowledge check
- Module 8: Apply and manage sensitivity labels
- Introduction
- Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
- Plan on-premises labeling
- Configure on-premises labeling for the Unified Labeling Scanner
- Apply protections and restrictions to email and files
- Monitor label performance using label analytics
- Knowledge check
- Summary and resources
Tags
Related Courses
G Suite Mail ManagementGoogle Cloud via Coursera Google Workspace Mail Management
Google Cloud via Coursera Data Loss Prevention: Qwik Start - Command Line
Google Cloud via Coursera Data Loss Prevention: Qwik Start - JSON
Google Cloud via Coursera Cyber Threat Intelligence
IBM via Coursera