Learn how Microsoft supports data discovery, classification, and protection as part of a cybersecurity solution

Go to class
Write Review

Free Online Course: Learn how Microsoft supports data discovery, classification, and protection as part of a cybersecurity solution provided by Microsoft Learn is a comprehensive online course, which lasts for 6-7 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Learn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.
    • Upon completion of this module, you should be able to:

      • Discuss information protection and governance and why it’s important.
      • Describe Microsoft’s approach to information protection and governance.
      • Define key terms associated with Microsoft’s information protection and governance solutions.
      • Identify the solutions that comprise information and governance in Microsoft 365.
    • Module 2: Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.
    • When you finish with this module, you'll be able to:

      • Discuss the data loss prevention solution and its benefits.
      • Describe the data loss prevention configuration process.
      • Explain what users will experience when the solution is implemented.
    • Module 3: Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don't.
    • Upon completion of this module, you should be able to:

      • Discuss the information governance solution and its benefits.
      • List the customer scenarios the information governance solution addresses.
      • Describe the information governance configuration process.
      • Explain what users will experience when the solution is implemented.
      • Articulate deployment and adoption best practices.
    • Module 4: Learners should know and be able to describe data classification and data protection key concepts.
    • By the end of this module, you will be able to answer:

      • What is a sensitive information type?
      • What is data classification?
      • What is data classification in the context of data governance and privacy compliance?
      • What are the common scenarios for using data classification?
      • How does data classification integrate with data protection?
      • What is data loss prevention?
      • What are the Microsoft technologies for data classification and protection?
    • Module 5: Learn how to set up policies to classify, retain, and protect your cloud-based data.
    • In this module, you will:

      • Learn how to classify your data
      • Configure your data retention requirements
      • Explore data ownership and sovereignty
    • Module 6: Learn how to connect apps to Microsoft Defender for Cloud Apps and deploy Conditional App Access Control.
    • In this module, you will:

      • Connect apps to Microsoft Defender for Cloud Apps
      • Deploy Conditional Access App Control
      • Configure real-time monitoring and control across cloud apps
    • Module 7: Learn the key considerations for transitioning your organization from using Azure Information Protection to Microsoft Information Protection.
    • Upon completion of this module, you should be able to:

      • Articulate the importance of transitioning to Microsoft Information Protection.
      • List benefits of transitioning to Microsoft Information Protection.
      • Explain the key considerations for making the transition.
      • Identify steps for transitioning to Microsoft Information Protection.
    • Module 8: Protect identity and access in Microsoft Teams across your organization.
    • At the end of this module, you should be able to:

      • Demonstrate how to configure data loss prevention policies.
      • Describe how to determine data residency.
      • Explain how to record access in Microsoft Teams.
      • Explain secure guest access.
    • Module 9: This module will introduce you to how DLP can be used to protect sensitive information in Teams.
    • By the end of this module, you should be able to:

      • What a DLP policy contains
      • How DLP policies work
      • About DLP and Microsoft Teams
      • Creating a DLP policy from a template
      • Create a custom DLP policy
      • Customize policy tips
      • Prevent external access
      • Reports from DLP policies

Syllabus
    • Module 1: Introduction to information protection and governance in Microsoft 365
      • Introduction to information and governance in Microsoft 365
      • Know your data
      • Protect your data
      • Prevent data loss
      • Govern your data
      • Summary and knowledge check
    • Module 2: Prevent data loss in Microsoft 365
      • Introduction
      • Data loss prevention overview
      • Identify content to protect
      • Define policy settings for your DLP policy
      • Test and create your DLP policy
      • Prepare Endpoint DLP
      • Manage DLP alerts in the Microsoft 365 compliance center
      • View data loss prevention reports
      • Knowledge check
      • Summary
    • Module 3: Govern information in Microsoft 365
      • Information governance overview
      • Configure retention policies
      • Configure retention labels
      • Configure manual retention label policies
      • Configure auto-apply retention label policies
      • Import data for information governance
      • Manage, monitor, and remediate information governance
      • Summary and knowledge check
    • Module 4: Intro to data classification and protection
      • Introduction
      • What is sensitive information?
      • What is data classification?
      • Common scenarios for using data classification
      • What is data loss prevention?
      • Microsoft technologies for data classification and protection
      • Knowledge check
      • Summary
    • Module 5: Configure security policies to manage data
      • Introduction
      • Classify your data at rest, in process, and in transit
      • Exercise - Classify an Azure SQL Database
      • Explore data recovery, retention, and disposal
      • Understand data sovereignty
      • Summary
    • Module 6: Implement information protection using Microsoft Defender for Cloud Apps
      • Introduction
      • Connect apps to Microsoft Defender for Cloud Apps
      • Deploy Conditional Access App Control
      • Configure real-time monitoring and control across cloud apps
      • Knowledge check
      • Summary
    • Module 7: Transition from Azure Information Protection to Microsoft Information Protection
      • Microsoft label management journey overview
      • Evaluate Windows labeling client alternatives
      • Transition from Azure Information Protection to Microsoft Information Protection
      • Summary and knowledge check
    • Module 8: Protect information in Microsoft Teams
      • Introduction
      • Configure data loss prevention
      • Determine data residency
      • Record access
      • Secure guest access
      • Knowledge check
      • Summary
    • Module 9: DLP for Teams and Microsoft 365
      • Introduction
      • Describe DLP Policy
      • Understand how DLP policies work
      • Understand DLP policies Microsoft Teams
      • Create new DLP policy with Microsoft Teams
      • Customize tool tip policy
      • Prevent external access sensitive documents
      • Use reports validate DLP policy data
      • Exercise - Configure DLP policies for Microsoft Teams
      • Knowledge check
      • Summary