SC-400: Microsoft Information Protection Administrator

Enroll for a 4-day SC-400: Microsoft Information Protection Administrator training course from Flexmind accredited by Microsoft. In this course, you will learn about how to designs, implements, and operates an organization’s identity and access management systems by using Azure Active Directory (Azure AD) and They manage tasks such as providing secure authentication and authorization access to enterprise applications.

The Identity and Access Administrator may be a single individual or a member of a larger team. This role collaborates with many other roles in the organization to drive strategic identity projects to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

Through a blend of hands-on labs and interactive lectures, you will learn to troubleshoot, monitor, and report for the identity and access environment.

Microsoft Courseware

Instructor-Led Training

Course Duration: 4-Days (32-Hour)

Microsoft Official Lab Exercises

Courseware Life Time Free Upgrade

Cloud Lab Access

Overview

The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant.


They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies.


This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.


Prerequisites

  • Foundational knowledge of Microsoft security and compliance technologies
  • Basic knowledge of information protection concepts
  • Understanding of cloud computing concepts
  • Understanding of Microsoft 365 products and services.
  • Modules

    Module 1: Implement Information Protection in Microsoft Purview

    • Introduction to information protection in Microsoft Purview
    • Classify data for protection and governance
    • Create and manage sensitive information types
    • Describe Microsoft 365 encryption
    • Deploy message encryption in Microsoft Purview
    • Protect information in Microsoft Purview
    • Apply and manage sensitivity labels
    • Lab - Implement information Protection

    Module 2: Implement Data Loss Prevention

    • Prevent data loss with Microsoft Purview
    • Implement Endpoint data loss prevention
    • Configure DLP policies for Microsoft Cloud App Security and Power Platform
    • Manage DLP policies and reports in Microsoft Purview
    • Lab - Implement Data Loss Prevention

    Module 3: Implement Data Lifecycle and Records Management

    • Data Lifecycle Management in Microsoft Purview
    • Manage data retention in Microsoft 365 workloads
    • Manage records in Microsoft Purview
    • Lab - Implement Data Lifecycle and Records Management

    Fees And Schedule

    Instructor-Led Training

    32-Hours of Instructor-Led Training One to one doubt resolution sessions Microsoft Official Lab Access

    Learning Objectives

    Expected learning:

    • Explain and use sensitivity labels
    • Configure Data Loss Prevention policies
    • Secure messages with Microsoft Purview
    • Describe the data lifecycle management configuration process
    • Define key terms associated with Microsoft’s information protection and governance solutions
    • Explain the Content explorer and Activity explorer
    • Describe how to use sensitive information types and trainable classifiers
    • Review and analyze DLP reports
    • Identify and mitigate DLP policy violations
    • Deploy Endpoint DLP
    • Configure retention policies and labels
    • Create custom keyword dictionaries
    • Implement document fingerprinting

    Reviews

    Course Related Posts