BEST Microsoft SC-400 Certification Training Institute | Emigo

Administering Information Protection and Compliance in Microsoft 365 SC-400 Training

Emigo Networks offers a course designed to equip you with the skills needed to secure your Microsoft 365 deployment. The course focuses on the essentials of data lifecycle management, information p

Administering Information Protection and Compliance in Microsoft 365 SC-400 Training and certification

 Emigo Networks offers a course designed to equip you with the skills needed to secure your Microsoft 365 deployment. The course focuses on the essentials of data lifecycle management, information protection, and compliance within your organization. By the end of the course, learn ers will have a comprehensive understanding of safeguarding data in various stages.

Course Content

The training covers a wide array of topics, including the creation and enforcement of data loss prevention policies, identifying sensitive infor mation types, and applying sensitivity labels. Additionally, learners will dive into the intricacies of implementing data retention policies, utilizing Microsoft Purview Message Encryption, and managing audits. You will also explore eDiscovery, insider risk management, and other related subjects that are critical for maintaining a secure information environment. This course will help you build the foundational knowledge and practical expertise needed to prepare for the Microsoft Information Protection Administrator exam (SC-400).

What You'll Learn

  • SC-400: Implement Information Protection in Microsoft 365
  • SC-400: Implement Data Loss Prevention
  • SC-400: Implement Data Lifecycle and Records Management
  • SC-400: Monitor and investigate data and activities by using Microsoft Purview
  • SC-400: Manage Insider and Privacy Risk in Microsoft 365

Syllabus Summary

Module 1: SC-400: Implement Information Protection in Microsoft 365
  • Introduction to information security and compliance in Microsoft Purview
  • Classify data for protection and governance
  • Create and manage sensitive information types
  • Understand Microsoft 365 encryption
  • Deploy Microsoft Purview Message Encryption
  • Deploy Microsoft Purview Message Encryption
  • Apply sensitivity labels for data protection
Module 2 : SC-400: Implement Data Loss Prevention
  • Prevent data loss in Microsoft Purview
  • Implement endpoint data loss prevention (DLP) with Microsoft Purview
  • Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
  • Manage data loss prevention policies and reports in Microsoft 365
Module 3 : SC-400: Implement Data Lifecycle and Records Management
  • Manage the data lifecycle in Microsoft Purview
  • Manage the data lifecycle in Microsoft Purview
  • Manage records in Microsoft Purview
Module 4: SC-400: Monitor and investigate data and activities by using Microsoft Purview
  • Explore compliance in Microsoft 365
  • Search for content in the Microsoft Purview compliance portal
  • Manage Microsoft Purview eDiscovery (Standard)
  • Manage Microsoft Purview eDiscovery (Premium)
  • Search and investigate with Microsoft Purview Audit
Module 5: SC-400: Manage Insider and Privacy Risk in Microsoft 365
  • Prepare Microsoft Purview Communication Compliance
  • Manage insider risk in Microsoft Purview
  • Implement Adaptive Protection in Insider Risk Management
  • Implement Microsoft Purview Information Barriers
  • Manage regulatory and privacy requirements with Microsoft Priva
  • Implement privileged access management
  • Manage Customer Lockbox

Who Should Attend?

The information protection administrator plays a key role in converting an organization's risk and compliance needs into technical solutions. They are tasked with implementing and managing various strategies for content classification, data loss prevention (DLP), information protec tion, data lifecycle management, records management, privacy, risk, and compliance. Additionally, they collaborate with other teams respon sible for governance, data, and security to assess and create policies that align with the organization's goals for risk reduction and compli ance. This role also supports workload administrators, business application owners, human resources, and legal teams in deploying technolo gy solutions that ensure the effective implementation of required policies and controls.

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry