Microsoft 365 Administrator (MS-102) Online Course
This comprehensive course provides in-depth training on Microsoft 365 administration, starting with a foundational overview and progressing to the deployment and management of a Microsoft 365 tenant. You’ll learn how to create and manage tenants and domains, monitor service health, and track user adoption and service usage.
Key Highlights:
- Thorough instruction on Microsoft 365 tenant management
- Detailed training on Azure AD integration and authentication
- In-depth modules on security management using Microsoft 365 Defender
Who Should Take This Course?
This course is ideal for IT professionals, system administrators, and network administrators with a foundational understanding of Microsoft 365.
Note: Prior experience with Microsoft Azure and a basic understanding of security and compliance concepts is recommended for optimal learning.
Course Curriculum
Overview
- Course Overview
Deploying and Managing a Microsoft 365 Tenant
- What is Microsoft 365?
- Create and Manage Tenants and Domains
- Service Health
- Monitor Adoption and Usage
- Create and Manage Users and Groups
- Manage and Monitor License Allocations
- Perform Bulk User Management
- Manage Roles and Role Groups
- Manage Delegation
- Implement Privileged Identity Management
Implementing Identity in Azure AD
- Using IdFix
- Use Azure AD Connect Cloud Sync
- Azure AD Connect
- Troubleshooting Synchronization
- Manage Authentication Methods
- Implement Self-Service Password Reset (SSPR)
- Implement Azure AD Password Protection
- Implement Multi-Factor Authentication
- Troubleshooting Authentication
- Plan for Identity Protection
- Implement Azure AD Identity Protection
- Plan Conditional Access Policies
- Implement Conditional Access Policies
Managing Security with Microsoft 365 Defender
- Introducing Microsoft 365 Defender
- Improve the Microsoft Secure Score
- Respond to Alerts in MS 365 Defender
- Respond to Issues in Security and Compliance Reports
- Respond to Threats Identified in Threat Analytics
- Implement Policies and Rules
- Respond to Threats Identified in Defender for Office 365
- Create and Run Campaigns
- Unblock Users
- Introducing Microsoft Defender for Endpoint
- Onboard Devices to Defender for Endpoint
- Configure Defender for Endpoint Settings
- Respond to Endpoint Vulnerabilities
Managing Compliance using Microsoft Purview
- Introducing Microsoft Purview
- Manage Sensitive Info Types
- Implement Retention and Sensitivity Labels
- Implement DLP for Workloads
- Implement Endpoint DLP
- Review and Respond to DLP Alerts