->
Oreilly - Microsoft 365 Mobility and Security (Exam MS-101) - 042365MS101
Oreilly - Microsoft 365 Mobility and Security (Exam MS-101)
by Norm Kennedy | Publisher: Intellezy | Release Date: October 2019 | ISBN: 042365MS101


Table of Contents

  1. Introduction
    • Introduction 00:01:35
  2. Identifying Threat Vectors
    • Today's Threat Landscape 00:02:15
    • What is Spoofing? 00:02:38
    • What is Phishing? 00:02:53
    • How Do Spam and Malware Cause Harm? 00:01:26
    • How Do Account Breaches Cause Harm? 00:02:54
    • Data Exfiltration, Deletion, and Spillage 00:02:52
  3. Using Secure Score
    • What is a Secure Score? 00:02:19
    • Using the Secure Score Dashboard and Analyzer 00:03:06
    • Increasing your Security Posture 00:04:51
  4. Configuring Azure Identity Protection
    • What is Azure Identity Protection? 00:06:29
    • Activating Azure Information Protection 00:03:09
    • Configuring Azure Information Protection 00:06:15
    • Configuring Alerts and Investigation 00:04:17
    • Setting Exclusions 00:03:15
  5. Exchange Online Protection
    • What is Exchange Online Protection? 00:06:25
    • Understanding Zero Hour Auto Purge 00:02:38
    • Spoofing and Phishing Protection 00:03:18
    • Configuring with Exchange AntiSpam 00:07:02
    • Configuring Exchange Anti Malware 00:04:08
    • Creating a Safe Attachments Policy 00:07:25
    • Creating a Transport Rule to Bypass Safe Attachments 00:04:25
    • Creating a Safe Links Policy 00:04:53
    • Creating a Transport Rule to Bypass Safe Links 00:03:26
    • Monitoring and Reporting 00:04:31
  6. Microsoft 365 Threat Intelligence
    • Microsoft Intelligent Security Graph 00:02:59
    • Working with the Security Dashboard 00:03:47
    • Viewing the Threat Explorer 00:02:43
    • What is Microsoft Advanced Threat Analytics? 00:04:56
    • Configuring ATA 00:08:56
    • Managing ATA 00:03:48
  7. Microsoft Data Governance
    • In-Place Archive in Exchange 00:02:56
    • Enabling In-Place Archiving 00:02:57
    • In-Place Records Management in SharePoint 00:02:42
    • Activating In-Place Records Management 00:06:15
    • Messaging Records Management 00:04:29
    • Creating MRM Policy and Tags 00:06:23
    • Troubleshooting MRM PolicesThat Don't Run 00:03:19
    • Information Rights Management in Exchange 00:03:53
    • Information Rights Management in SharePoint 00:06:22
    • Office 365 Message Encryption 00:04:10
  8. Security and Compliance
    • Planning Security and Compliance Roles 00:04:16
    • Reviewing GDPR Needs 00:05:37
    • Building an Ethical Wall 00:04:03
    • Working with a Retention Policy 00:05:14
    • Creating Retention Policy 00:08:41
    • Data Loss Prevention 00:04:23
    • Creating a DPL Policy 00:11:00
    • Troubleshooting Policy Tips 00:02:22
    • What is Azure Information Protection? 00:02:47
    • Planning Azure Information Protection 00:03:22
    • Configuring Super User for AIP 00:02:57
    • Implementing the AIP Tenant Key 00:02:22
    • Working with AIP Labels and Policies 00:07:53
    • What is Windows Information Protection 00:04:41
    • Planning for WIP 00:02:47
    • Implementing Windows Information Protection 00:04:23
  9. Managing Search and Investigation
    • What is Content Search? 00:02:05
    • Creating a Content Search 00:03:31
    • Auditing in Microsoft 365 00:02:24
    • Searching Audit Logs 00:08:34
    • Configuring Audit Policy in SharePoint 00:01:29
  10. Planning for Device Management
    • Planning for Device Management 00:03:59
    • Prerequisites for Using Co-Management 00:01:58
    • Enabling Co-Management 00:04:08
    • Transferring Services to Intune 00:02:28
    • What is Microsoft Store for Business? 00:03:10
    • Configuring Microsoft Store for Business 00:02:23
    • Managing Settings in the Microsoft Store for Business 00:04:07
    • What is Mobile Application Management? 00:02:32
    • Configuring Mobile Application Management 00:02:36
    • Using Azure AD for Apps 00:04:29
  11. Windows 10 Deployment Strategy
    • Planning for Windows as a Service 00:03:19
    • What are the Windows 10 Deployment Models? 00:08:12
    • Planning your Subscription Activation Strategy 00:02:40
    • Resolving Windows 10 Upgrade Errors 00:06:30
  12. Implementing Mobile Device Malmanagement
    • Managing Devices with MDM 00:02:34
    • Activating MDM 00:02:36
    • Configuring MDM 00:02:36
    • Managing Device Policies 00:04:36
    • Creating Conditional Access Policies 00:05:37
    • Enrolling Devices for MDM 00:02:31
    • Monitoring Enrolled Devices 00:02:39
  13. Conclusion
    • Course Recap 00:01:02
  14. Oreilly - Microsoft 365 Mobility and Security (Exam MS-101)

    042365MS101.Microsoft.365.Mobility.and.Security.Exam.MS101.part1.OR.rar

    042365MS101.Microsoft.365.Mobility.and.Security.Exam.MS101.part2.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss