SC-400: Implement Information Protection in Microsoft 365

Go to class
Write Review

Free Online Course: SC-400: Implement Information Protection in Microsoft 365 provided by Microsoft Learn is a comprehensive online course, which lasts for 4-5 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Learn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.
    • Upon completion of this module, you should be able to:

      • Discuss information protection and governance and why it’s important.
      • Describe Microsoft’s approach to information protection and governance.
      • Define key terms associated with Microsoft’s information protection and governance solutions.
      • Identify the solutions that comprise information and governance in Microsoft 365.
    • Module 2: Learn how information protection helps organizations protect data to prevent data loss or theft.
    • At the end of this module, you should be able to:

      • Explain the importance of data loss prevention technologies
      • Identify the methods of data loss prevention
      • Assess and define data sensitivity
      • Apply Microsoft data loss prevention technologies
    • Module 3: Learn about the information available to help you understand your data landscape and know your data.
    • Upon completion of this module, you should be able to:

      • List the components of the Data Classification solution.
      • Identify the cards available on the Data Classification overview tab.
      • Explain the Content explorer and Activity explorer.
      • Describe how to use sensitive information types and trainable classifiers.
    • Module 4: Create and manage sensitive information types
    • After completing this module, you will be able to:

      • Recognize the difference between built-in and custom sensitivity labels
      • Configure sensitive information types with exact data match-based classification
      • Implement document fingerprinting
      • Create custom keyword dictionaries
    • Module 5: Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
    • Upon completion of this module, you should be able to:

      • Explain how encryption mitigates the risk of unauthorized data disclosure.
      • Describe Microsoft data-at-rest and data-in-transit encryption solutions.
      • Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
      • Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
    • Module 6: Deploy message encryption in Office 365
    • After completing this module, you will be able to:

      • Configure Office 365 Message Encryption for end users
      • Implement Advanced Office 365 Message Encryption
    • Module 7: Learn how to detect sensitive content as it's used and shared throughout your organization, in the cloud and on devices, and help prevent accidental data loss.
    • Upon completion of this module, you should be able to:

      • Discuss the information protection solution and its benefits.
      • List the customer scenarios the information protection solution addresses.
      • Describe the information protection configuration process.
      • Explain what users will experience when the solution is implemented.
      • Articulate deployment and adoption best practices.
    • Module 8: Apply and manage sensitivity labels
    • After completing this module, you will be able to:

      • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
      • Monitor label usage using label analytics.
      • Configure on-premises labeling.
      • Manage protection settings and marking for applied sensitivity labels.
      • Apply protections and restrictions to email.
      • Apply protections and restrictions to files.

Syllabus
    • Module 1: Introduction to information protection and governance in Microsoft 365
      • Introduction to information and governance in Microsoft 365
      • Know your data
      • Protect your data
      • Prevent data loss
      • Govern your data
      • Summary and knowledge check
    • Module 2: Prevent data loss
      • Introduction to Microsoft 365 data loss prevention
      • Define the sensitive data you want to protect
      • Use data loss prevention (DLP) policies to protect your data
      • Summary and knowledge check
    • Module 3: Classify data for protection and governance
      • Data classification overview
      • Classify data using sensitive information types
      • Classify data using trainable classifiers
      • Review sensitive information and label usage
      • Explore labeled and sensitive content
      • Understand activities related to your data
      • Summary and knowledge check
    • Module 4: Create and manage sensitive information types
      • Introduction
      • Compare built-in versus custom sensitive information types
      • Create and manage custom sensitive information types
      • Describe custom sensitive information types with exact data match
      • Implement document fingerprinting
      • Create keyword dictionary
      • Knowledge check
      • Summary and resources
    • Module 5: Understand Microsoft 365 encryption
      • Introduction to Microsoft 365 encryption
      • Learn how BitLocker encrypts data-at-rest
      • Understand service encryption in Microsoft 365
      • Explore customer key management using Customer Key
      • Learn how data is encrypted in-transit
      • Summary and knowledge check
    • Module 6: Deploy message encryption in Office 365
      • Introduction
      • Implement Office 365 message encryption
      • Implement Office 365 advanced message encryption
      • Use Office message encryption templates in mail flow rules
      • Knowledge check
      • Summary and resources
    • Module 7: Protect information in Microsoft 365
      • Information protection overview
      • Configure sensitivity labels
      • Configure sensitivity label policies
      • Configure auto-labeling policies
      • Manage, monitor, and remediate information protection
      • Summary and knowledge check
    • Module 8: Apply and manage sensitivity labels
      • Introduction
      • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
      • Plan on-premises labeling
      • Configure on-premises labeling for the Unified Labeling Scanner
      • Apply protections and restrictions to email and files
      • Monitor label performance using label analytics
      • Knowledge check
      • Summary and resources