Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Microsoft Information Protection Administrator (SC-400T00)

Course Cover
compare button icon

Course Features

icon

Duration

3 days

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Instructor Paced

Course Description

Learn how to secure information in Microsoft 365. This course is about data governance and information security within your company. This course covers data loss prevention policies, sensitive data types, sensitivity labels and data retention policies. It also includes information on Office 365 message encryption. This course prepares learners for the Microsoft Information Protection Administrator exam (SC-4000).

Course Overview

projects-img

Live Class

projects-img

Human Interaction

projects-img

Personlized Teaching

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Foundational knowledge of Microsoft security and compliance technologies

Basic knowledge of information protection concepts

Understanding of cloud computing concepts

Understanding of Microsoft 365 products and services

What You Will Learn

Explain and use sensitivity labels

Configure Data Loss Prevention policies

Secure messages in Office 365

Describe the information governance configuration process

Define key terms associated with Microsoft's information protection and governance solutions

Explain the Content explorer and Activity explorer

Describe how to use sensitive information types and trainable classifiers

Review and analyze DLP reports

Identify and mitigate DLP policy violations

Describe the integration of DLP with Microsoft Cloud App Security (MCAS)

Deploy Endpoint DLP

Describe records management

Configure event driven retention

Import a file plan

Configure retention policies and labels

Create custom keyword dictionaries

Implement document fingerprinting

Target Students

The Information Protection Administrators

IT Professionals

Course Cover