Curriculum For This Course
Video tutorials list
-
Implementing and Managing a Microsoft 365 Tenant
Video Name Time 1. Creating a Microsoft 365 Tenant 6:05 2. Implementing a Custom Domain 2:10 3. Organizational Settings in Microsoft 365 5:28 4. Identifying and Responding to Service Health Issues in Microsoft 365 5:57 5. Monitoring Microsoft 365 Adoption and Usage with Microsoft Adoption Score 5:59 -
Managing Users and Groups in Microsoft 365
Video Name Time 1. Creating and Managing Users in Microsoft 365 9:51 2. Creating and Managing Guest Users in Microsoft 365 2:55 3. Creating and Managing Contacts in Microsoft 365 6:05 4. Creating and Managing Groups in Microsoft 365 4:05 5. Managing Microsoft 365 License Allocations 5:00 6. Performing Bulk User Management in the Portal 11:30 -
Microsoft 365 Roles
Video Name Time 1. An Introduction to Roles in Microsoft 365 11:31 2. Managing Roles in Microsoft 365 2:43 3. Delegating Admin Roles to Partners 2:14 4. Managing Delegation with Administrative Units 4:23 5. Using Privileged Identity Management for Azure AD Roles 3:50 -
Implementing and Managing Identity Synchronization with Azure AD
Video Name Time 1. Preparing for Identity Synchronization 6:17 2. Directory Synchronization with Azure AD Connect 9:06 3. Monitoring Synchronization with Azure AD Connect Health 2:56 4. Troubleshooting Azure AD Synchronization 4:56 -
Implementing and Managing Authentication
Video Name Time 1. Windows Hello for Business 3:18 2. Passwordless Authentication with Microsoft Authenticator 4:39 3. Self-service Password Reset 9:51 4. Azure AD Password Protection 4:49 5. Multi-factor Authentication 5:36 6. Investigating and Resolving Authentication Issues with Sign-in Logs 4:42 -
Implementing and Managing Secure Access
Video Name Time 1. Azure AD Identity Protection 5:14 2. Planning for Identity Protection 4:55 3. Conditional Access Policies 3:36 -
Managing Security Reports and Alerts by Using the Microsoft 365 Defender Portal
Video Name Time 1. Improving Your Microsoft Secure Score in the Microsoft 365 Defender Portal 5:09 2. Review and respond to security incidents and alerts in Microsoft 365 Defender 6:49 3. Incident Notification Emails 4:11 -
Email and Collaboration Protection with Microsoft 365 Defender
Video Name Time 1. Securing Email with Microsoft Defender for Office 365 4:43 2. Safe Attachment Policies in Defender for Office 365 5:40 3. Safe Links in Email 3:18 4. Safe Links in Teams 3:20 5. Safe Links in Office Apps 2:29 6. Spoof Intelligence in Defender for Office 365 8:56 7. Attack Simulation Training 7:00 -
Using Quarantine Policies in Defender for Office 365
Video Name Time 1. Quarantine Policies in Defender for Office 365 5:38 2. Creating Quarantine Policies in Defender for Office 365 3:39 3. Assigning Quarantine Policies within Anti-Spam Policies 3:00 4. Assigning Quarantine Policies within Anti-Phishing Policies 2:59 5. Assigning Quarantine Policies within Anti-Malware Policies 2:38 6. Assigning Quarantine Policies within Safe Attachment Policies 2:41 -
Anti-phishing in Microsoft 365
Video Name Time 1. What is Phishing? 2:13 2. Anti-phishing protection in Defender for Office 365 6:58 3. Understanding Attack Simulation Training in Defender for Office 365 4:23 4. Understanding Anti-phishing policy Settings in Defender for Office 365 2:56 5. Understanding Spoof Settings 2:32 6. Understanding First Contact Safety Tip 1:33 7. Anti-phishing Settings Exclusive to Microsoft Defender for Office 365 12:38 -
Implement and Manage Endpoint Protection with Microsoft Defender for Endpoint
Video Name Time 1. What is Defender for Endpoint? 5:47 2. Onboarding Devices to Defender for Endpoint 6:37 3. Integrating Defender for Endpoint and Microsoft InTune 3:10 4. Enabling Microsoft Defender for Endpoint in Microsoft Intune 2:02 5. Configuring Defender for Endpoint to Use Compliance and App Protection Policies 2:06 6. Reviewing and Responding to Endpoint Vulnerabilities 4:26 7. Understanding the Microsoft Defender Vulnerability Management Dashboard 3:49 -
Implement Microsoft Purview Information Protection and Data Lifecycle
Video Name Time 1. Understanding Retention Labels and Retention Policies 10:44 2. Understanding Sensitivity Labels and Policies 6:14
Add Comment