fbpx

MS 500 Microsoft 365 Security Administration Course with Certification Exam

MS-500 Microsoft 365 Security Administration Course

MS-500 Microsoft 365 Security Administration certification training course is designed to equip you with the necessary skills to manage Microsoft 365 identity and access, threat protection, information protection and administering built-in compliance.

The MS-500 course covers how to perform adequate action on various threats and perform tracking. Learn to design and implement security tactics and guarantees to comply with the policies and regulations of the organisation. Key concepts include Microsoft Azure AD, planning RBAC, Cloud app security and Window Analytics.

Communicate and deal with a hybrid environment and perform security actions using Office 365 threat Intelligence analytic tools to protect vital information in the MS 500 course.

  • Training: get practical technical skills
  • Receive a certificate of course attendance
  • Small class size: increased instructor interaction
  • Authorised test centre: exams taken at our premises
  • Expert trainers: imparting real-world experience
  • Experience working in an IT environment
  • Basic conceptual understanding of Microsoft Azure
  • Experience with Windows 10 devices and Office 365
  • Basic understanding of computer networks
  • Working knowledge of managing mobile devices

Candidates can achieve this certification by passing the following exam(s).

  • Exam MS-500 Microsoft 365 Security Administration

The certification exam can be registered and attempted within 3 months of course/module completion at Logitrain training centre on weekdays during normal business hours (excludes public holidays)

MS-500 Course Material
  • Secure Microsoft 365 hybrid environments
  • Secure user accounts
  • Implement authentication methods
  • Implement conditional access
  • Implement role-based access control (RBAC)
  • Implement Azure AD Privileged Identity Management (PIM)
  • Implement Azure AD Identity Protection
  • Implement an enterprise hybrid threat protection solution
  • Implement device threat protection
  • Implement and manage device and application protection
  • Implement and manage Office 365 messaging protection
  • Implement and manage Office 365 threat protection
  • Secure data access within Office 365
  • Manage Azure information Protection (AIP)
  • Manage Data Loss Prevention (DLP)
  • Implement and manage Microsoft Cloud App Security
  • Configure and analyze security reporting
  • Manage and analyze audit logs and reports
  • Configure Office 365 classification and labeling
  • Manage data governance and retention
  • Manage search and investigation
  • Manage data privacy regulation compliance

 

This course is likely to add to the employment related skills of the participants. The skills developed are likely to be used in the course of being an employee or working in a business.

  • Students
  • IT professionals
  • IT maintenance
  • Helpdesk professionals
  • Computer technicians
  • Cloud professionals
  • plan Azure AD authentication options
  • plan Azure AD synchronization options
  • monitor and interpret Azure AD Connect events
  • implement Azure AD dynamic group membership
  • implement Azure AD Self-service password reset
  • manage Azure AD access reviews
  • plan sign-on security
  • implement multi-factor authentication (MFA)
  • manage and monitor MFA
  • implement device sign-on methods
  • manage authentication methods
  • monitor authentication methods
  • plan for compliance and conditional access policies
  • configure and manage device compliance policy
  • configure and manage conditional access policy
  • monitor Conditional Access and Device Compliance
  • plan for RBAC
  • configure RBAC
  • monitor RBAC usage
  • plan for Azure PIM
  • configure and manage Azure PIM
  • monitor Azure PIM
  • implement user risk policy
  • implement sign-in risk policy
  • configure Identity Protection alerts
  • review and respond to risk events
  • plan an Azure Advanced Threat Protection (ATP) solution
  • install and configure Azure ATP
  • manage Azure ATP workspace health
  • generate Azure ATP reports
  • integrate Azure ATP with Windows Defender ATP
  • monitor Azure ATP
  • manage suspicious activities
  • plan and implement a Windows Defender ATP solution
  • manage Windows Defender ATP
  • monitor Windows Defender ATP
  • plan for device protection
  • configure and manage Windows Defender Application Guard
  • configure and manage Windows Defender Application Control
  • configure and manage Windows Defender Exploit Guard
  • configure Secure Boot
  • configure and manage Windows 10 device encryption
  • configure and manage non-Windows device encryption
  • plan for securing applications data on devices
  • define managed apps for Mobile Application Management (MAM)
  • protect your enterprise data using Windows Information Protection (WIP)
  • configure WIP policies
  • configure Intune App Protection policies for non-Windows devices
  • configure Office 365 ATP anti-phishing protection
  • configure Office 365 ATP anti-phishing policies
  • define users and domains to protect with Office 365 ATP Anti-phishing
  • configure Office 365 ATP anti-spoofing
  • configure actions against impersonation
  • configure Office 365 ATP anti-spam protection
  • enable Office 365 ATP Safe-Attachments
  • configure Office 365 ATP Safe Attachments policies
  • configure Office 365 ATP Safe Attachments options
  • configure Office 365 ATP Safe Links options
  • configure Office 365 ATP Safe Links blocked URLs
  • configure Office 365 ATP Safe Links policies
  • integrate Office 365 Threat Intelligence with Office 365 services
  • integrate Office 365 Threat Intelligence with Windows Defender ATP
  • review threats and malware trends on the Office 365 ATP Threat Management dashboard
  • review threats and malware trends with Office 365 ATP Threat Explorer and Threat Tracker
  • create and review Office 365 ATP incidents
  • review quarantined items in ATP including Microsoft SharePoint Online, OneDrive for Business, Exchange Online, and Microsoft Teams
  • monitor online anti-malware solutions using Office 365 ATP reports
  • perform tests using Attack Simulator
  • plan secure data access within Office 365
  • implement and manage Customer Lockbox
  • configure data access in Office 365 collaboration workloads
  • configure B2B sharing for external users
  • plan an AIP solution
  • activate Azure Rights Management
  • configure usage rights
  • configure and manage super users
  • customize policy settings
  • create and configure labels and conditions
  • create and configure templates
  • configure languages
  • configure and use the AIP scanner
  • deploy the RMS connector
  • manage tenant keys
  • deploy the AIP client
  • track and revoke protected documents
  • integrate AIP with Microsoft Online Services
  • plan a DLP solution
  • create and manage DLP policies
  • create and manage sensitive information types
  • monitor DLP reports
  • manage DLP notifications
  • create queries to locate sensitive data
  • plan Cloud App Security implementation
  • configure Office 365 Cloud App Security
  • perform productivity app discovery using Cloud App Security
  • manage entries in the Cloud app catalog
  • manage third-party apps in Office 365 Cloud App Security
  • manage Microsoft Cloud App Security
  • configure Cloud App Security connectors
  • configure Cloud App Security policies
  • configure and manage Cloud App Security templates
  • configure Cloud App Security users and permissions
  • review and respond to Cloud App Security alerts
  • review and interpret Cloud App Security dashboards and reports
  • review and interpret Cloud App Security activity log and governance log
  • interpret Windows Analytics
  • configure Windows Telemetry options
  • configure Office Telemetry options
  • review and interpret security reports and dashboards
  • plan for custom security reporting with Intelligent Security Graph
  • review Office 365 secure score action and recommendations
  • configure reports and dashboards in Azure Log Analytics
  • review and interpret reports and dashboards in Azure Log Analytics
  • configure alert policies in the Office 365 Security and Compliance Centre
  • plan for auditing and reporting
  • configure Office 365 auditing and reporting
  • perform an audit log search
  • review and interpret compliance reports and dashboards
  • configure audit alert policy
  • plan for data governance classification and labels
  • search for personal data
  • apply labels to personal data
  • monitor for leaks of personal data
  • create and publish Office 365 labels
  • configure label policies
  • plan for data governance and retention
  • review and interpret data governance reports and dashboards
  • configure retention policies
  • define data governance event types
  • define data governance supervision policies
  • configure Information holds
  • find and recover deleted Office 365 data
  • import data in the Security and Compliance Centre
  • configure data archiving
  • manage inactive mailboxes
  • plan for content search and eDiscovery
  • delegate permissions to use search and discovery tools
  • use search and investigation tools to perform content searches
  • export content search results
  • manage eDiscovery cases
  • plan for regulatory compliance in Microsoft 365
  • review and interpret GDPR dashboards and reports
  • manage Data Subject Requests (DSRs)
  • review Compliance Manager reports
  • create and perform Compliance Manager assessments and action items
Request Information
  • five star ratings
    High-quality, cost-effective training since 2004
  • This field is for validation purposes and should be left unchanged.
What is included with the Microsoft MS-500 Microsoft 365 Security Administration Course?
Logitrain course includes official certification exam fee.
Includes Official Exam Fee

Take the certification exam within 3 months of course / module completion

Logitrain is an Authorised Pearson VUE Test Centre.
Authorised Test Centre

Take the official vendor certification exam at the Logitrain training center

Logitrain courses, programs and packages includes course material.
Includes Books & Meals

Take the official vendor certification exam at the Logitrain training center

Logitrain courses, packages and programs includes sample practise questions.
Includes Mock & Test Questions

Mock test is included in the full-time courses to assist with your preparation

Logitrain full-time course includes course retake, if you do not pass the official certification exam.
Highly Skilled Trainers

Our trainers are highly skilled with expertise and extensive hands-on experience

Logitrain courses include price beat guarantee.
Our Price Beat Guarantee

Relax, we will beat competitor’s advertised price in Australia. Our course has no extra costs

Dates, Locations & Prices
Logitrain Live Online Training Banner

Location Type Duration Price Dates
Location Type Duration Price Dates

The supply of this course/package/program is governed by our terms and conditions. Please read them carefully before enrolling, as enrolment is conditional on acceptance of these terms and conditions. Proposed dates are given, courses run subject to availability and minimum registrations.

OUR ACCREDITATIONS

Find out why we are the leading choice to help boost your career in Australia

medal first placePrepare to get IT job ready in 8 weeks

Classroom trainingsTrained 15,000+ professionals and counting

training accessibilityExperienced Provider: Operating Since 2004

TeamworkTrained staff from 1200+ Australian Businesses

We Have Placed Candidates In
SATISFIED CUSTOMERS
Attend live virtual training program
SOME OF OUR CLIENTS

Over 1000 organisations have relied on Logitrain to be their trusted training partner.

five star ratings
High-quality, cost-effective training since 2004
Learn More
  • This field is for validation purposes and should be left unchanged.
create

Don’t Wait. Please fill the form now.