SC-400 Microsoft Information Protection Administrator Course

Microsoft Information Protection Administrator

Learn how to protect information in your Microsoft 365 deployment.

This course focuses on data governance and information protection within your organization.

The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Microsoft Purview message encryption among other related topics.

Course Overivew

  • In this SC-400 Microsoft Information Protection Administrator Course you learn how to protect information in your Microsoft 365 deployment.
  • This course focuses on data governance and information protection within your organization.
  • The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics.
  • The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
Read More
Read Less
Course Benefits:

Module 1: Implement Information Protection in Microsoft 365

  • Organizations require information protection solutions to protect their data against theft and accidental loss.
  • Learn how to protect your sensitive information. Learn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.
  • Learn about the information available to help you understand your data landscape and know your data.
  • Learn how to use sensitive information types to support your information protection strategy.
  • Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate are not hindered.

Lessons

  • Introduction to information protection and governance in Microsoft 365
  • Classify data for protection and governance
  • Create and manage sensitive information types
  • Describe Microsoft 365 encryption
  • Deploy message encryption in Office 365
  • Configure sensitivity labels
  • Apply and manage sensitivity labels
  • Lab : Implement Information Protection
  • Assign permissions for compliance
  • Manage Office 365 message encryption
  • Manage Sensitive Information Types
  • Manage Trainable Classifiers
  • Manage Sensitivity Labels

After completing this module, students will be able to:

  • Describe Microsoft’s approach to information protection and governance.
  • List the components of the Data Classification solution.
  • Describe how to use sensitive information types and trainable classifiers.
  • Implement document fingerprinting
  • Create custom keyword dictionaries
  • Deploy message encryption in Office 365

 

Module 2: Implement Data Loss Prevention in Microsoft 365

  • In this module we discuss how to implement data loss prevention techniques to secure your Microsoft 365 data.
  • Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.
  • Learn how to configure and implement data loss prevention policies and integrate them with Microsoft Cloud App Security. Learn how to respond to and mitigate data loss policy violations.

Lessons

  • Prevent Data loss in Microsoft 365
  • Implement Endpoint data loss prevention
  • Configure DLP policies for Microsoft Cloud App Security and Power Platform
  • Manage DLP policies and reports in Microsoft 365
  • Lab : Implement Data Loss Prevention
  • Manage DLP policies
  • Manage Endpoint DLP
  • Test DLP policies
  • Manage DLP reports

After completing this module, students will be able to:

  • Describe the information protection configuration process.
  • Articulate deployment and adoption best practices.
  • Describe the integration of DLP with Microsoft Cloud App Security (MCAS).
  • Configure policies in Microsoft Cloud App Security.
  • Review and analyze DLP reports.
  • Identify and mitigate DLP policy violations.
  • Mitigate DLP violations in MCAS.

 

Module 3: Implement Information Governance in Microsoft 365

  • In this module you will learn how to plan and implement information governance strategies for an organization.
  • Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don’t.
  • Learn how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services.
  • Learn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.

Lessons

  • Govern information in Microsoft 365
  • Manage data retention in Microsoft 365 workloads
  • Manage records in Microsoft 365
  • Lab : Implement Information Governance
  • Configure Retention Labels
  • Implement Retention Labels
  • Configure Service-based Retention
  • Use eDiscovery for Recovery
  • Configure Records Management

After completing this module, students will be able to:

  • Describe the information governance configuration process.
  • Articulate deployment and adoption best practices.
  • Describe the retention features in Microsoft 365 workloads.
  • Configure retention settings in Microsoft Teams and SharePoint Online.
  • Implement retention for Exchange Mailbox items.
  • Recover content protected by retention settings.
  • Regain protected items from Exchange Mailboxes.
  • Describe the records management configuration process.

 

  • Explain and use sensitivity labels.
  • Configure Data Loss Prevention policies.
  • Secure messages in Office 365.
  • The Information Protection Administrator plans and implements controls that meet organizational compliance needs.
  • This person is responsible for translating requirements and compliance controls into technical implementation.
  • They assist organizational control owners to become and stay compliant.
  • They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization.
  • They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies.
  • This person defines applicable requirements and tests IT processes and operations against those policies and controls.
  • They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.
Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

Microsoft Information Protection Administrator
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

Microsoft Information Protection Administrator
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request