Microsoft 365 Mobility and Security (Exam MS-101)
4.4 (177 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
939 students enrolled

Microsoft 365 Mobility and Security (Exam MS-101)

Learn topics from the Microsoft MS-101 exam
Bestseller
4.4 (177 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
939 students enrolled
Last updated 10/2019
English
English [Auto], Arabic, 8 more
  • French
  • German
  • Hindi
  • Japanese
  • Portuguese
  • Russian
  • Simplified Chinese
  • Spanish
Current price: $44.99 Original price: $64.99 Discount: 31% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Implement modern device services
  • Implement Microsoft 365 security and threat management
  • Manage Microsoft 365 governance and compliance
Requirements
  • Working knowledge of Microsoft 365 workloads
Description

This course will cover topics from the Microsoft MS-101 exam, which measures a student’s ability to accomplish the following technical and administrative tasks: Identify threat vectors; use Secure Score; configure Azure Identity Protection; configure Exchange online protection; implement modern device services; implement Microsoft 365 security and threat management; and manage Microsoft 365 governance and compliance.

Who this course is for:
  • Any user who wishes to learn Microsoft 365 security and threat management
Course content
Expand all 84 lectures 05:39:50
+ Identifying Threat Vectors
6 lectures 14:54
Today's Threat Landscape
02:15
What is Spoofing?
02:37
What is Phishing?
02:52
How do Spam and Malware Cause Harm?
01:25
How do Account Breaches Cause Harm?
02:54
Data Exfiltration, Deletion, and Spillage
02:51
+ Using Secure Score
3 lectures 10:15
What is Secure Score?
02:19
Using the Secure Score Dashboard and Analyzer
03:05
+ Configuring Azure Identity Protection
5 lectures 23:24
What is Azure Identity Protection?
06:29
Activating Azure Identity Protection
03:09
Configuring Azure Identity Protection
06:14
Configuring Alerts and Investigation
04:17
Setting Exclusions
03:15
+ Exchange Online Protection
10 lectures 48:05
What is Exchange Online Protection
06:24
Understanding Zero Hour Auto Purge
02:37
Spoofing and Phishing Protection
03:17
Configuring with Exchange AntiSpam
07:02
Creating a Safe Attachment Policy
07:25
Creating a Transport Rule to Bypass Safe Attachments
04:24
Creating a Safe Links Policy
04:52
Creating a Transport Rule to Bypass Safe Links
03:26
Monitoring and Reporting
04:30
+ Microsoft 365 Threat Intelligence
6 lectures 27:07
Microsoft Intelligent Security Graph
02:59
Working with the Security Dashboard
03:46
Viewing the Threat Explorer
02:43
What is the Microsoft Advanced Threat Analytics?
04:55
Managing ATA
03:48
+ Microsoft Data Governance
10 lectures 43:20
In-Place Archive in Exchange
02:55
Enabling In-Place Archiving
02:56
In-Place Records Management in SharePoint
02:41
Activating In-Place Records Management
06:14
Messaging Records Management
04:28
Creating MRM Policy and Tags
06:22
Troubleshooting MRM Policies that Don't Run
03:19
Information Rights Management in Exchange
03:53
Microsoft 365 Message Encryption
04:10
+ Security and Compliance
16 lectures 01:16:37
Planning Security and Compliance Roles
04:15
Reviewing GDPR Needs
05:36
Building an Ethical Wall
04:03
Working with a Retention Policy
05:14
Creating a Retention Policy
08:41
Data Loss Prevention
04:22
Creating a DLP Policy
11:00
Troubleshooting Policy Tips
02:21
Planning Azure Information Protection
03:22
Configuring Super User for AIP
02:56
Implementing the AIP Labels and Policies
02:21
Working with AIP Labels and Policies
07:52
What is Windows Information Protection?
04:40
Planning for Windows Information Protection
02:46
Implementing Windows Information Protection
04:22
+ Managing Search and Investigation
5 lectures 18:01
What is Content Search?
02:05
Creating a Content Search
03:31
Searching Audit Logs
08:33
Configuring Audit Policy in SharePoint
01:29
+ Planning for Device Management
10 lectures 31:46
Planning for Device Management
03:59
Prerequisites for Using Co-Management
01:58
Enabling Co-Management
04:08
Transferring Service to Intune
02:28
What is the Microsoft Store for Business?
03:09
Configuring the Microsoft Store for Business
02:23
Managing Settings for the Microsoft Store for Business
04:06
Configuring Mobile Application Management
02:35
Using Azure Ad for Apps
04:28