Close
Contact Us info@learnquest.com

??WelcomeName??
??WelcomeName??
« Important Announcement » Contact Us 877-206-0106 | USA Flag
Close
Close
Close
photo

Thank you for your interest in LearnQuest.

Your request is being processed and LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in Private Training.

We look forward to helping you develop the perfect training solution to help you meet your company's goals.

For immediate assistance, speak with one of our representatives using the chat module below. Otherwise, LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

Close
photo

Thank you for your interest in LearnQuest!

Now, you will be able to stay up-to-date on our latest course offerings, promotions, and training discounts. Watch your inbox for upcoming special offers.

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

Information Security Administrator

Price
2,380 USD
4
MOC-SC-401T00
Classroom Training, Online Training
Microsoft

AWS Training Pass

Take advantage of flexible training options with the AWS Training Pass and get Authorized AWS Training for a full year.

Learn More

Prices reflect a 22.5% discount for IBM employees (wherever applicable).
Prices reflect a 24% discount for Kyndryl employees (wherever applicable).
Prices reflect the Accenture employee discount.
Prices shown are the special AWS Partner Prices.
Prices reflect the Capgemini employee discount.
Prices reflect the UPS employee discount.
Prices reflect the ??democompanyname?? employee discount.
GSA Private/Onsite Price: ??gsa-private-price??
For GSA pricing, please go to GSA Advantage.
 

Class Schedule

Delivery Formats

Sort results

Filter Classes

Guaranteed to Run

Modality

Location

Language

Date

    Sorry, there are no public classes currently scheduled in your country.

    Please complete this form, and a Training Advisor will be in touch with you shortly to address your training needs.

View Global Schedule

Course Description

Overview

The Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services. The course covers essential topics such as information protection, data loss prevention (DLP), retention, and insider risk management. You learn how to protect data within Microsoft 365 collaboration environments from internal and external threats. Additionally, you learn how to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. You also learn how to protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.
 

Objectives

After completing this course, students will be able to:
  • Describe challenges in protecting sensitive data across cloud and AI environments.
  • Explain how Microsoft Purview enables data classification, labeling, and protection.
  • Identify how data loss prevention (DLP) prevents unauthorized data sharing.
  • Understand how Insider Risk Management helps detect potential threats.
  • Explore security monitoring tools for detecting and responding to data risks.
  • Prepare your environment to support the Microsoft Purview Information Protection scanner
  • Configure scanner settings, authentication, and deployment prerequisites
  • Run scans in discovery or enforcement mode
  • Apply sensitivity labels and protection to on-premises files
  • Use data loss prevention (DLP) rules to restrict access or quarantine files based on policy
  • Understand how alerts are generated and prioritized in Insider Risk Management
  • Tune policies and thresholds to manage alert volume effectively
  • Use the Alerts dashboard and alert details to triage and respond to risky activity
  • Investigate behavior using tabs like All risk factors, Activity explorer, and User activity
  • Integrate with Microsoft Defender XDR for broader threat investigation
  • Create, manage, and resolve Insider Risk Management cases
  • Plan retention and disposition using retention labels
  • Create, publish, and automatically apply retention labels
  • Use adaptive scopes to target users, groups, or sites dynamically
  • Configure retention policies for Microsoft 365 workloads
  • Interpret the outcome when multiple retention settings apply
  • Restore deleted items and previous versions of content across SharePoint, OneDrive, and Teams

Audience

As an Information Security Administrator, you plan and implement information security for sensitive data using Microsoft Purview and related services. You're responsible for mitigating risks by protecting data within Microsoft 365 collaboration environments from internal and external threats, as well as safeguarding data used by AI services. Your role involves implementing information protection, data loss prevention (DLP), retention, and insider risk management. You also manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. In this role, you collaborate with other roles responsible for governance, data, and security to develop policies that address your organization's information security and risk reduction goals. You work with workload administrators, business application owners, and governance stakeholders to implement technology solutions that support these policies and controls.
 

Prerequisites

    • Familiarity with Microsoft Purview compliance solutions
    • Basic understanding of data protection and security concepts

Topics

  • Implement Microsoft Purview Information Protection Protect sensitive data in a digital world
    • Introduction
    • The growing need for data protection
    • The challenges of managing sensitive data
    • Protect data in a Zero Trust world
    • Understand data classification and protection
    • Prevent data leaks and insider threats
    • Manage security alerts and respond to threats
    • Protect AI-generated and AI-processed data
    • Module assessment
  • Classify data for protection and governance
    • Introduction
    • Data classification overview
    • Classify data using sensitive information types
    • Classify data using trainable classifiers
    • Create a custom trainable classifier
    • Module assessment
    Review and analyze data classification and protection
    • Introduction
    • Review classification and protection insights
    • Analyze classified data with data and content explorer
    • Monitor and review actions on labeled data
    • Module assessment
    Review and analyze data classification and protection
    • Introduction
    • Review classification and protection insights
    • Analyze classified data with data and content explorer
    • Monitor and review actions on labeled data
    • Module assessment
    Create and manage sensitive information types
    • Introduction
    • Sensitive information type overview
    • Compare built-in versus custom sensitive information types
    • Create and manage custom sensitive information types
    • Create and manage exact data match sensitive info types
    • Implement document fingerprinting
    • Describe named entities
    • Create a keyword dictionary
    • Module assessment
    Create and configure sensitivity labels with Microsoft Purview
    • Introduction
    • Sensitivity label overview
    • Create and configure sensitivity labels and label policies
    • Configure encryption with sensitivity labels
    • Implement auto-labeling policies
    • Track and evaluate sensitivity label usage in Microsoft Purview
    • Module assessment
    Apply sensitivity labels for data protection
    • Introduction
    • Foundations of sensitivity label integration in Microsoft 365
    • Manage sensitivity labels in Office apps
    • Apply sensitivity labels with Microsoft 365 Copilot for secure collaboration
    • Protect meetings with sensitivity labels
    • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
    • Module assessment
    Classify and protect on-premises data with Microsoft Purview
    • Introduction
    • Protect on-premises files with Microsoft Purview
    • Prepare your environment for the Microsoft Purview Information Protection scanner
    • Configure and install the Microsoft Purview Information Protection scanner
    • Run and manage the scanner
    • Enforce data loss prevention policies on on-premises files
    • Module assessment
    Understand Microsoft 365 encryption
    • Introduction to Microsoft 365 encryption
    • Learn how Microsoft 365 data is encrypted at rest
    • Understand service encryption in Microsoft Purview
    • Explore customer key management using Customer Key
    • Learn how data is encrypted in-transit
    • Summary and knowledge check
    Protect email with Microsoft Purview Message Encryption
    • Introduction
    • Understand message encryption
    • Plan for Microsoft Purview Message Encryption
    • Configure Microsoft Purview Message Encryption
    • Customize encrypted email branding with Microsoft Purview
    • Control encrypted email access with Advanced Message Encryption
    • Use Microsoft Purview Message Encryption templates in mail flow rules
    • Module assessment
  • Implement and manage Microsoft Purview Data Loss Prevention Prevent data loss in Microsoft Purview
    • Introduction
    • Data loss prevention overview
    • Plan and design DLP policies
    • Understand DLP policy deployment and simulation mode
    • Create and manage DLP policies
    • Integrate Adaptive Protection with DLP
    • Use DLP analytics (preview) to identify data risks
    • Understand DLP alerts and activity tracking
    • Module assessment
  • Implement endpoint data loss prevention (DLP) with Microsoft Purview
    • Introduction
    • Endpoint data loss prevention (DLP) overview
    • Understand the endpoint DLP implementation workflow
    • Onboard devices for endpoint DLP
    • Configure settings for endpoint DLP
    • Create and manage endpoint DLP policies
    • Deploy the Microsoft Purview browser extension
    • Configure just-in-time (JIT) protection
    • Module assessment
    Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
    • Introduction
    • Configure data loss prevention policies for Power Platform
    • Integrate data loss prevention in Microsoft Defender for Cloud Apps
    • Configure policies in Microsoft Defender for Cloud Apps
    • Manage data loss prevention violations in Microsoft Defender for Cloud Apps
    • Module assessment
    Investigate and respond to Microsoft Purview Data Loss Prevention alerts
    • Introduction
    • Understand data loss prevention (DLP) alerts
    • Understand the DLP alert lifecycle
    • Configure DLP policies to generate alerts
    • Investigate DLP alerts in Microsoft Purview
    • Investigate DLP alerts in Microsoft Defender XDR
    • Respond to DLP alerts
    • Module assessment
  • Implement and manage Microsoft Purview Insider Risk Management Understand Microsoft Purview Insider Risk Management
    • Introduction
    • What is an insider risk?
    • Microsoft Purview Insider Risk Management overview
    • Microsoft Purview Insider Risk Management features
    • Case study: Protect sensitive data with Insider Risk Management
    • Module assessment
  • Prepare for Microsoft Purview Insider Risk Management
    • Introduction
    • Plan for Insider Risk Management
    • Prepare your organization for Insider Risk Management
    • Configure settings for Insider Risk Management
    • Integrate Insider Risk Management with data sources and tools
    • Module assessment
    Create and manage Insider Risk Management policies
    • Introduction
    • Understand Insider Risk Management policy templates
    • Compare quick and custom insider risk policies
    • Create a custom Insider Risk Management policy
    • Manage policies in Insider Risk Management
    • Module assessment
    Investigate insider risk alerts and related activity
    • Introduction
    • Understand insider risk alerts and investigations
    • Manage alert volume in insider risk management
    • Investigate and triage insider risk alerts in Microsoft Purview
    • Analyze alert context with the All risk factors tab
    • Investigate activity details with the Activity explorer tab
    • Review patterns over time with the User activity tab
    • Investigate insider risk alerts in Microsoft Defender XDR
    • Manage and take action on insider risk cases
    • Module assessment
    Implement Adaptive Protection in Insider Risk Management
    • Introduction
    • Adaptive Protection overview
    • Understand and configure risk levels in Adaptive Protection
    • Configure Adaptive Protection
    • Manage Adaptive Protection
  • Protect data in AI environments with Microsoft Purview Discover AI interactions with Microsoft Purview
    • Introduction
    • Understand AI security risks
    • Microsoft Purview Data Security Posture Management (DSPM) for AI overview
    • Configure DSPM for AI
    • Review AI security reports
    • Audit Microsoft 365 Copilot activities and AI interactions with Microsoft Purview
    • Module assessment
  • Protect sensitive data from AI-related risks
    • Introduction
    • Apply AI security recommendations with DSPM for AI
    • Use sensitivity labels to protect Microsoft 365 Copilot content
    • Use Endpoint DLP to prevent generative AI data exposure
    • Module assessment
    Govern AI usage with Microsoft Purview
    • Introduction
    • Apply retention policies to Microsoft 365 Copilot prompts and responses
    • Investigate and delete Copilot interactions with Microsoft Purview eDiscovery
    • Detect and manage Copilot and AI communications with Microsoft Purview
    • Module assessment
    Assess and mitigate AI risks with Microsoft Purview
    • Introduction
    • Use data assessments to detect oversharing risks
    • Detect risky AI usage with Insider Risk Management
    • Case study: Use Adaptive Protection to respond to AI-related risk
    • Module assessment
  • Implement and manage Microsoft 365 retention and recovery Understand retention in Microsoft Purview
    • Introduction
    • Overview of retention and the data lifecycle
    • Understand retention labels and retention policies
    • Decide when to apply retention
    • Module assessment
  • Implement and manage Microsoft 365 retention and recovery
    • Introduction
    • Plan for retention and disposition with retention labels
    • Create and publish retention labels
    • Create and manage auto-apply retention labels
    • Create and configure adaptive scopes
    • Create and configure retention policies
    • Understand policy and label precedence in Microsoft Purview
    • Recover content in Microsoft 365 workloads
    • Module assessment
    Top 20 Training Industry Company - IT Training

    Need Help?

    Call us at 877-206-0106 or e-mail us at info@learnquest.com

    Personalized Solutions

    Need a personalized solution for your Training? Contact us, and one of our training advisors will help you find the best solution.

    Contact Us

    Need Help?

    Do you have a question about the courses, instruction, or materials covered? Do you need help finding which course is best for you? We are here to help!

    Talk to us

    Self-Paced Training Info

    Learn at your own pace with anytime, anywhere training

    • Same in-demand topics as instructor-led public and private classes.
    • Standalone learning or supplemental reinforcement.
    • e-Learning content varies by course and technology.
    • View the Self-Paced version of this outline and what is included in the SPVC course.
    • Learn more about e-Learning

    Course Added To Shopping Cart

    bla

    bla

    bla

    bla

    bla

    bla

    Self-Paced Training Terms & Conditions

    ??spvc-wbt-warning??

    Exam Terms & Conditions

    ??exam-warning??
    ??group-training-form-area??
    ??how-can-we-help-you-area??
    ??personalized-form-area??
    ??request-quote-area??

    Sorry, there are no classes that meet your criteria.

    Please contact us to schedule a class.
    Close

    self-paced
    STOP! Before You Leave

    Save 0% on this course!

    Take advantage of our online-only offer & save 0% on any course !

    Promo Code skip0 will be applied to your registration

    Close
    Nothing yet
    here's the message from the cart

    To view the cart, you can click "View Cart" on the right side of the heading on each page
    Add to cart clicker.

    Purchase Information

    ??elearning-coursenumber?? ??coursename??
    View Cart

    title

    Date: xxx

    Location: xxx

    Time: xxx

    Price: xxx

    Please take a moment to fill out this form. We will get back to you as soon as possible.

    All fields marked with an asterisk (*) are mandatory.

    If you would like to request a quote for 5 or more students, please contact CustomerService@learnquest.com to be assigned an account representative.

    Need more Information?

    Speak with our training specialists to continue your learning journey.

     

    Delivery Formats

    Close

    By submitting this form, I agree to LearnQuest's Terms and Conditions

    heres the new schedule
    This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Privacy Policy.
    Your use of this LearnQuest site affirms your consent to our use of session and persistent cookies to track how you use our website.