Cod: MS_101 Ostalo MICROSOFT Dificultate: Avansat

Microsoft 365 Mobility and Security

1 200,00 €
(5 Zile (8h/day))
Bucharest Română
1 200,00 €

Alternative dates and locations

Online training
Bucharest, RO, Română
Afișați toate datele

Data nu mi se potriveste
Contactați-ne folosind formularul de aici .


The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multi-factor authentication and self-service password management. This section wraps up with a comprehensive look at implementing application and external access. You will learn how to add and manage applications in Azure Active Directory, including how to configure multi- tenant applications. You will then examine how to configure Azure AD Application Proxy, including how to install and register a connector and how to publish an on-premises app for remote access. Finally, you will examine how to design and manage solutions for external access. This includes licensing guidance for Azure AD B2B collaboration, creating a collaborative user, and troubleshooting a B2B collaboration.


5 Zile (8h/day)


Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. Audience profile This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.

Job role: Administrator

Preparation for exam: MS-100


Course Outline Module 1: Explore security metrics in Microsoft 365 In this learning path, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Identity Protection and Microsoft Defender for Office 365. Lesson Examine threat vectors and data breaches Explore the Zero Trust security model Explore security solutions in Microsoft 365 Examine Microsoft Secure Score Examine Privileged Identity Management Examine Azure Identity Protection Lab : Tenant Setup and Privileged Identity Management Initialize your Microsoft 365 Tenant PIM Resource Workflows After completing this module, students will be able to: Describe several techniques hackers use to compromise user accounts through email Describe techniques hackers use to gain control over resources Describe techniques hackers use to compromise data Describe the Zero Trust approach to security in Microsoft 365. Describe the components of Zero Trust security. Describe and five steps to implementing a Zero Trust model in your organization. Explain Zero Trust networking List the types of threats that can be avoided by using EOP and Microsoft Defender for Office 365 Describe how Microsoft 365 Threat Intelligence can be benefit your organization Monitor your organization through auditing and alerts Describe how ASM enhances visibility and control over your tenant through three core areas Describe the benefits of Secure Score and what kind of services can be analyzed Describe how to collect data using the Secure Score API Know where to identify actions that will increase your security by mitigating risks Explain how to determine the threats each action will mitigate and the impact it has on use Explain Privileged Identity Management (PIM) in Azure administration Configure PIM for use in your organization Audit PIM roles Explain Microsoft Identity Manager Explain Privileged Access Management in Microsoft 365 Describe Azure Identity Protection and what kind of identities can be protected Understand how to enable Azure Identity Protection Know how to identify vulnerabilities and risk events Plan your investigation in protecting cloud-based identities Plan how to protect your Azure Active Directory environment from security breaches Module 2: Manage your Microsoft 365 security services This learning path examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Microsoft Defender for Office 365, Safe Attachments, and Safe Links. You will also be introduced to the various reports that help an organization monitor its security health. Lesson Examine Exchange Online Protection Examine Microsoft Defender for Office 365 Manage Safe Attachments Manage Safe Links Explore reporting in the Microsoft 365 security services Lab : Manage Microsoft 365 Security Services Implement a Safe Attachments policy Implement a Safe Links policy After completing this module, students will be able to: Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection List several mechanisms used to filter spam and malware Describe additional solutions to protect against phishing and spoofing Describe the benefits of the Spoof Intelligence feature Describe how Safe Attachments is used to block zero-day malware in email attachments and documents Describe how Safe Links protect users from malicious URLs embedded in email and documents Create and modify a Safe Attachments policy in the Security & Compliance Center Create a Safe Attachments policy by using Windows PowerShell Configure a Safe Attachments policy to take certain actions Understand how a transport rule can be used to disable the Safe Attachments functionality Describe the end-user experience when an email attachment is scanned and found to be malicious Create and modify a Safe Links policy in the Security & Compliance Center Create a Safe Links policy by using Windows PowerShell Understand how a transport rule can be used to disable the Safe Links functionality Describe the end-user experience when Safe Links identifies a link to a malicious website or file Describe how the Microsoft 365 security reports show how your organization is being protected Understand where to access reports generated by EOP and Microsoft Defender for Office 365 Understand how to access detailed information from the generated reports generated Module 3: Implement threat intelligence in Microsoft 365 In this learning path, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard, Microsoft Defender for Identity, and Microsoft Cloud Application Security to stay ahead of potential security breaches. Lesson Explore threat intelligence in Microsoft 365 Explore the Security Dashboard Implement Microsoft Defender for Identity Implement Microsoft Cloud Application Security Lab : Implement Threat Intelligence Conduct a Spear Phishing attack using the Attack Simulator Conduct Password attacks using the Attack Simulator Prepare for Alert Policies Implement a Mailbox Permission Alert Implement a SharePoint Permission Alert Test the Default eDiscovery Alert After completing this module, students will be able to: Understand how threat intelligence is powered by the Microsoft Intelligent Security Graph Describe how the threat dashboard can benefit C-level security officers Understand how Threat Explorer can be used to investigate threats and help to protect your tenant Describe how the Security Dashboard displays top risks, global trends, and protection quality Describe what Microsoft Defender for Identity is and what requirements are needed to deploy it Configure Microsoft Defender for Identity Manage the Microsoft Defender for Identity services Describe Cloud App Security Explain how to deploy Cloud App Security Control your Cloud Apps with Policies Troubleshoot Cloud App Security Module 4: Introduction to Data Governance in Microsoft 365 This learning path examines the key components of Microsoft 365 Compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Office 365 message encryption, In-place Records Management in SharePoint, and data loss prevention (DLP). Lesson Explore archiving in Microsoft 365 Explore retention in Microsoft 365 Explore Information Rights Management Explore Office 365 Message Encryption Explore In-place Records Management in SharePoint Explore Data Loss Prevention in Microsoft 365 Lab : Implement Data Governance Configure Microsoft 365 Message Encryption Validate Information Rights Management Initialize Compliance Configure Retention Tags and Policies After completing this module, students will be able to: Understand Data Governance in Microsoft 365 Describe the difference between In-Place Archive and Records Management Explain how data is archived in Exchange Recognize the benefits of In Place Records Management in SharePoint Understand how Messaging Records Management works in Exchange List the types of retention tags that can be applied to mailboxes Know the different Microsoft 365 Encryption Options Understand how Information Rights Management (IRM) can be used in Exchange Configure IRM protection for Exchange mails Explain how IRM can be used in SharePoint Apply IRM protection to SharePoint documents Tell the differences between IRM protection and AIP classification Understand how message encryption works Perform encryption on a message Accomplish decryption of a message Understand the co-operation of signing and encryption simultaneously Explain what triple-wrapped messages are Describe when you can use Office 365 Message Encryption Explain how Office 365 Message Encryption works Describe Data Loss Prevention (DLP) Understand what sensitive information and search patterns are that DLP is using Know what a DLP policy is and what it contains Recognize how actions and conditions work together for DLP Express how actions contain functions to send emails on matches Show policy tips to the users if a DLP rule applies Use policy templates to implement DLP policies for commonly used information Explain document finger Understand how to use DLP to protect documents in Windows Server FCI Module 5: Implement data governance in Microsoft 365 This learning path examines how to implement the key aspects of data governance, including the building of information barriers in Microsoft 365 and ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. Lesson Evaluate your compliance readiness Implement compliance solutions Create information barriers in Microsoft 365 Create a DLP policy from a built-in template Create a custom DLP policy Create a DLP policy to protect documents Implement policy tips for DLP policies Lab : Implement DLP Policies Manage DLP Policies Test MRM and DLP Policies After completing this module, students will be able to: Describe the Microsoft 365 Compliance Center and how to access it Describe the purpose and function of Compliance score Explain the components of of how an organization's Compliance score is determined Explain how assessments are used to formulate compliance scores Explain how Microsoft 365 helps address Global Data Protection Regulation Describe insider risk management functionality in Microsoft 365 Configure insider risk management policies Configure insider risk management policies Explain the communication compliance capabilities in Microsoft 365 Describe what an ethical wall in Exchange is and how it works Explain how to create information barriers in Microsoft 365 Identify best practices for building and working with ethical walls Understand the different built-in templates for a DLP policies Determine how to choose the correct locations for a DLP policy Configure the correct rules for protecting content Enable and review the DLP policy correctly Describe how to modify existing rules of DLP policies Explain how to add and modify custom conditions and action to a DLP rule Describe how to change user notifications and policy tips Configure the user override option to a DLP rule Explain how incident reports are sent by a DLP rule violation Describe how to work with managed properties for DLP policies Explain how SharePoint Online creates crawled properties from documents Describe how to create a managed property from a crawled property in SharePoint Online Explain how to create a DLP policy with rules that apply to managed properties via PowerShell Describe the user experience when a user creates an email or site containing sensitive information Explain the behavior in Office apps when a user enters sensitive information Module 6: Manage data governance in Microsoft 365 This learning path focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement sensitivity labels and Windows Information Protection. Lesson Manage retention in email Troubleshoot data governance Explore sensitivity labels Implement sensitivity labels Implement Data Governance Lab : Implement Data Governance Implement sensitivity labels Implement Windows Information Protection After completing this module, students will be able to: Determine when and how to use retention tags in mailboxes Assign retention policy to an email folder Add optional retention policies to email messages and folders Remove a retention policy from an email message Explain how the retention age of elements is calculated Repair retention policies that do not run as expected Understand how to systematically troubleshoot when a retention policy appears to fail Perform policy tests in test mode with policy tips Describe how to monitor DLP policies through message tracking Manage data protection using sensitivity labels Describe the requirements to create a sensitivity label Develop a data classification framework for your sensitivity labels Create, publish, and remove sensitivity labels Describe WIP and what it is used for Plan a deployment of WIP policies Implement WIP policies with Intune and SCCM Implement WIP policies in Windows desktop apps Module 7: Manage content search and investigations in Microsoft 365 This learning path conclude this section on data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery. Lesson Search for content in the Microsoft 365 Compliance center Conduct audit log investigations Manage Advanced eDiscovery Lab : Manage Search and Investigations Conduct a data search Investigate Your Microsoft 365 Data After completing this module, students will be able to: Describe how to use content search Design your content search Configure search permission filtering Explain how to search for third-party data Describe when to use scripts for advanced searches Describe what the audit log is and the permissions required to search a Microsoft 365 audit Configure Audit Policies Enter criteria for searching the audit log View, sort, and filter search results Export search results to a CSV file Search the unified audit log by using Windows PowerShell Describe Advanced eDiscovery Configure permissions for users in Advanced eDiscovery Create Cases in Advanced eDiscovery Search and prepare data for Advanced eDiscovery Module 8: Prepare for device management in Microsoft 365 This learning path provides an in-depth examination of Microsoft 365 Device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Microsoft Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management. Lesson Explore Co-management of Windows 10 device Prepare your Windows 10 devices for Co-management Transition from Configuration Manager to Intune Examine the Microsoft Store for Business Plan for application management Lab : Implement the Microsoft Store for Business Configure the Microsoft Store for Business Manage the Microsoft Store for Business After completing this module, students will be able to: Describe the benefits of Co-management Plan your organization's Co-management Strategy Describe the main features of Configuration Manager Describe how Azure Active Directory enables co-management Identify the prerequisites for using Co-management Configure Configuration Manager for Co-management Enroll Windows 10 Devices to Intune Modify your co-management settings Transfer workloads to Intune Monitor your co-management solution Check compliance for co-managed devices Describe the feature and benefits of the Microsoft Store for Business Configure the Microsoft Store for Business Manage settings for the Microsoft Store for Business Module 9: Plan your Windows 10 deployment strategy This learning path focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Desktop Analytics, and planning your Windows 10 subscription activation service. Lesson Examine Windows 10 deployment scenarios Explore Windows Autopilot deployment models Plan your Windows 10 Subscription Activation strategy Resolve Windows 10 upgrade errors Analyze Windows 10 diagnostic data using Desktop Analytics After completing this module, students will be able to: Plan for Windows as a Service Plan a Modern Deployment Plan a Dynamic Deployment Plan a Traditional Deployment Describe Windows Autopilot requirements Configure Autopilot Describe Autopilot Self-deployments, Pre-provisioned deployments, and User-driven deployments Deploy BitLocker Encryption for Autopiloted Devices Understand Windows 10 Enterprise E3 in CSP Configure VDA for Subscription Activation Deploy Windows 10 Enterprise licenses Describe common fixes for Windows 10 upgrade errors Use SetupDiag Troubleshooting upgrade errors Describe Windows error reporting Understand the upgrade error codes and resolution procedure Describe Desktop Analytics Describe Device Health Describe Update Compliance Determine Upgrade Readiness Module 10: Implement Mobile Device Management in Microsoft 365 This learning path focuses on Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance. Lesson Explore Mobile Device Management Deploy Mobile Device Management Enroll devices to Mobile Device Management Manage device compliance Lab : Manage devices with Intune Enable device management Configure Azure AD for Intune Create Intune policies Enroll a Windows 10 device Manage and monitor a device in Intune After completing this module, students will be able to: Manage devices with MDM Compare MDM for Microsoft 365 and Intune Understand policy settings for mobile devices Control Email and Document Access Activate Mobile Device Management Services Deploy Mobile Device Management Configure Domains for MDM Configure an APNs Certificate for iOS devices Manage Device Security Policies Define a Corporate Device Enrollment Policy Enroll devices to MDM Understand the Apple Device Enrollment Program Understand Enrollment Rules Configure a Device Enrollment Manager Role Describe Multi-factor Authentication considerations Plan for device compliance Configure conditional users and groups Create Conditional Access policies Monitor enrolled devices

Traininguri personalizate

Acest training nu este potrivit pentru tine sau nu ai găsit ceea ce căutai? Contactează-ne și te vom ajuta.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

* Obligatorii

Solicitarea ta a fost înregistrată.

Vom găsi cea mai bună variantă pentru tine.

Ai intrebari?

Contactează-ne pentru mai multe informatii

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

* Obligatorii

Solicitarea ta a fost înregistrată.

Iti vom raspunde cat mai curand posibil.

Cerere data

Încarcă informațiile solicitate, trimite cerere și, în cel mai scurt timp, vom reveni cu un răspuns.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

* Obligatorii

Solicitarea ta a fost înregistrată.

Vom găsi cea mai bună variantă pentru tine.

Săli de training

ALEF Training dispune de 3 săli de training în București, echipate cu sisteme moderne de ultimă generație, capabile să țină pasul cu orice nevoie a cursanților, și sisteme de proiecție pentru o difuzare facilă a informațiilor prezentate.

Sălile de instruire se modernizează in mod continuu. În Centrul de Competențe, folosim pentru instruire și seminarii Cisco Spark Board. Spark Board este în esență o tabletă uriașă care combină funcțiile și ecranul whiteboard pentru videoconferințe. Aveți ocazia unică de a experimenta acest mediu modern de comunicare.

Săli de training - București

Săli de training – Praga

Săli de training - Budapesta

Săli de training - Bratislava

Sală de training - Nautilius

Sală de training - Compass

Sală de training - Sonar

Echipa de traineri

O echipă bine pregătită, cu certificări importante și experință în domeniul IT, este pilonul principal al ALEF Training Center. Punem preț pe dezvoltarea continuă a trainerilor noștri, astfel încât să îți oferim toate cursurile de care ai nevoie.

Alături de noi și trainerii noștri, ai la dispoziție o gamă completă de cursuri în domenii precum: rutare și comutare, securitate, colaborare și centre de date. Mai jos regăsești toate informațiile despre noi.

Echipa Training & Expert Center Romania

Alexandra Pîrvu
Training Team Leader


Alexandra s-a alăturat echipei ALEF Training Center în noiembrie 2022, preluând rolul de Training Team Leader. Are zece ani de experiență în zona de training, fiind specializată pe segmentul cybersecurity. Alături de echipa de traineri, cât și de echipa de business development dedicată zonei de training, Alexandra răspunde la nevoile de educație continuă ale partenerilor ALEF.

Gabriela Lefter
Training Assistant


Gabi s-a alăturat echipei ALEF Training Center în luna Iunie 2021 având la bază o experiență în lumea IT&C, a acceptat provocarea să fie alături de echipa de training și va crește alături de noi, oferind suport participanților la curs, precum și colaboratorilor ALEF.

Alexandra Văduva
Training Support


Alexandra este responsabilă de partea operațională a organizării de traininguri din cadrul echipei ALEF Training Center. Alexandra oferă suport atât partenerilor și colaboratorilor ALEF, cât și participanților la curs, asigurând o bună desfășurare a claselor.

George Ciolacu
Cisco Trainer ALEF


George Ciolacu este inginer și instructor certificat Cisco și are experiență vastă în industria tehnologiei informației. Este specializat în design-ul rețelelor enterprise, cât și al tehnologiilor ce fac parte din această arie, precum routing, switching, network security și are certificări importante, precum CCNP Enterprise si CCNP Security.

Vizualizare certificări

Bogdan Păun
Microsoft Trainer ALEF


Bogdan Păun este Microsoft System Engineer si Microsoft Certified Trainer în cadrul ALEF Distribution RO, cu o experiență de peste 10 ani în zona IT. Activează în proiecte ce variază, de la implementări de soluții până la livrarea de training-uri custom sau oficiale Microsoft, având certificări atât în zona de licențiere, cât și în cea tehnică.

Vizualizare certificări

Adrian Țopa
Microsoft Trainer ALEF


Adrian Topa este Azure System Engineer și Microsoft Certified Trainer în cadrul ALEF Distribution RO, cu o experiență de peste 10 ani în domeniul informației tehnologice. De asemenea, este specialist Cloud, deținând multiple certificări Microsoft Azure.

Vizualizare certificări

Sergiu Calinciuc
Cisco Trainer ALEF


Sergiu Calinciuc este instructor certificat Cisco, cu o experiență de peste 10 ani în domeniul IT și expertiză pe tehnologiile de colaborare. Pe baza certificărilor obținute, precum CCNP Enterprise și CCNP Collaboration și a cunoștințelor avansate despre infrastructurile de tip enterprise networking, este avizat să ofere servicii de consultanță și traininguri tehnice partenerilor ALEF pentru soluțiile complexe CISCO.

Vizualizare certificări

Rareș Odobescu
Cisco Trainer ALEF


Pasionat încă din adolescență de tehnologie și în special de networking, Rareș Odobescu este certificat ca instructor Cisco, pregătit să împărtășească cu bucurie cunoștințele pe care le-a acumulat de-a lungul proiectelor complexe în care a fost implicat, are la activ peste 10 clase livrate de CCNA și are competențe și în zone de Wifi și CCNP Enteprise. 

Vizualizare certificări

Adrian Murgescu
Cisco Trainer ALEF


Adrian Murgescu are o bogată experiență în tehnologiile de Data Center. Deține o serie de certificări la nivel profesional de la Cisco, VMware si Veeam și oferă constant servicii de implementare și training către partenerii ALEF. Cursurile de nivel CCNP Datacenter sunt cele pe care le predă în mod constant.  

Vizualizare certificări

Cosmin Mocanu
Palo Alto Networks Trainer ALEF


Cosmin Mocanu este inginer și instructor certificat Palo Alto Networks, cu o experiență de peste 20 ani în domeniul IT. Pe baza experienței vaste și a certificărilor obținute, Cosmin este avizat să ofere servicii de consultanță și traininguri tehnice partenerilor ALEF pentru soluțiile Palo Alto Networks.

Vizualizare certificări

Daniela Apostol
Cisco Trainer ALEF


  • 4011 Recognition
  • CCDA
  • CCIE Certification - Data Center
  • CCNA Data Center
  • CCNA Routing and Switching
  • CCNA Security
  • CCNP Data Center
  • CCNP Routing and Switching
  • Cisco Data Center Unified Computing Design Specialist
  • Cisco Data Center Unified Fabric Design Specialist
  • Cisco Data Center Unified Fabric Support Specialist

Trainerii noștri se remarcă prin faptul că au o experiență practică vastă, dobândită de-a lungul proiectelor complexe la care au lucrat. Astfel, aceștia pot aborda orice subiect sau problematică ce vă este de interes, cursurile având parte teoretică și demo-uri practice pentru e înțelege cât mai bine soluția/produsul, în vederea obținerii certificărilor necesare.

De asemenea, oferim cursuri specializate, axate pe dobândirea abilităților de configurare, dar și cursuri personalizate adaptate cerințelor tale și companiei tale.

Suntem aici pentru a vă ajuta să obțineți toate informațiile și cunoștințele necesare pentru a deveni un expert în domeniu. Ne puteți scrie pe adresa, iar echipa noastră vă va răspunde în cel mai scurt timp.

5000 +



Săli de training




Lectori certificați



Unicitatea lectorilor noștri se datorează în principal faptului că au o experiență practică vastă, bazată pe diverse proiecte. Astfel, ei pot răspunde foarte flexibil la orice întrebare sau comentariu venind de la cursanți. Lectorii își transmit astfel cunoștințele practice participanților, la cursurile de formare. Datorită sinergiei funcționării fiabile a companiei și anilor de experiență, am reușit să răspundem în mod flexibil la viitoarele schimbări în specializările Cisco, astfel încât să putem garanta o gamă largă de cursuri certificate care vă vor permite ție și colegilor tăi să obțineți know-how-ul necesar pentru testele ulterioare de certificare.

Cisco Learning Partner Comptia F5 AWS Microsoft vmware palo alto


ALEF Distribution RO 
B-dul Dimitrie Pompeiu nr. 6E, Pipera Business Tower, et. 8, Sector 2, Bucuresti
+40-21-331.00.67 / 68 / 69