SC-400T00 Administering Information Protection and Compliance in Microsoft 365

Skip to Schedule / Outline
4 days - $2,380

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). This course may earn a Credly badge.

This Course is for…

The information protection administrator translates an organization’s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization’s risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls.

Schedule / Enroll

StartsTimePriceEnroll
08/20/202410:00 AM - 6:00 PM ET$2,380.00
  • Course Outline
  • Objectives
  • 1 – Module 1 Introduction to information protection and data lifecycle management in Microsoft Purview Introduction to information protection and data lifecycle management

    • Introduction to information protection and data lifecycle management15 min
    • Know your data1
    • Protect your data
    • Prevent data loss
    • Govern your data
    • Summary and knowledge check

    2 – Module 2 Classify data for protection and governance

    • Data classification overview
    • Classify data using sensitive information types
    • Classify data using trainable classifiers
    • Review sensitive information and label usage
    • Explore labeled and sensitive content
    • Understand activities related to your data
    • Summary and knowledge check

    3 – Module 3 Create and manage sensitive information types

    • Introduction
    • Compare built-in versus custom sensitive information types
    • Create and manage custom sensitive information types
    • Describe custom sensitive information types with exact data match
    • Implement document fingerprinting
    • Create keyword dictionary
    • Knowledge check
    • Summary and resources

    4 – Module 4 Understand Microsoft 365 encryption

    • Introduction to Microsoft 365 encryption
    • Learn how Microsoft 365 data is encrypted at rest
    • Understand service encryption in Microsoft Purview
    • Explore customer key management using Customer Key
    • Learn how data is encrypted in-transit
    • Summary and knowledge check

    5 – Module 5 Deploy Microsoft Purview Message Encryption

    • Introduction
    • Implement Microsoft Purview Message Encryption
    • Implement Microsoft Purview Advanced Message Encryption
    • Use Microsoft Purview Message Encryption templates in mail flow rules
    • Knowledge check
    • Summary and resources
  • Discuss information protection and data lifecycle management and why it’s important.
    Describe Microsoft’s approach to information protection and data lifecycle management.
    Define key terms associated with Microsoft’s information protection and data lifecycle management solutions.
    Identify the solutions that comprise information and data lifecycle management in Microsoft Purview.
    List the components of the Data Classification solution
    Explain the Content explorer and Activity explorer
    Recognize the difference between built-in and custom sensitivity labels
    Configure sensitive information types with exact data match-based classification
    Implement document fingerprinting
    Create custom keyword dictionaries
    Explain how encryption mitigates the risk of unauthorized data disclosure.
    Describe Microsoft data-at-rest and data-in-transit encryption solutions.
    Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
    Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
    Configure Microsoft Purview Message Encryption for end users
    Implement Microsoft Purview Advanced Message Encryption