Loading...
Login / Register

Course MS-500T02-A: Implementing Microsoft 365 Threat Protection

Threat protection helps stop damaging attacks with integrated and automated security. In this course you will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, yo... Show More
Course Prerequisites:
Learners should start this course already having the following skills: Basic conceptual understanding of Mi... Show More
Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Exam
Included

Duration
1 Day

Course Schedule

Upcoming dates for Course MS-500T02-A: Implementing Microsoft 365 Threat Protection

Module 1: Security in Microsoft 365

This module starts by explaining the various cyber-attack threats that exist. It then introduces you to the Microsoft solutions to thwart those threats. The module finishes with an explanation of Microsoft Secure Score and how it can be used to evaluate and report your organizations security posture.
Lesson

  • Threat Vectors and Data Breaches
  • Security Solutions for Microsoft 365
  • Microsoft Secure Score

See fewer details

Module 2: Advanced Threat Protection

This module explains the various threat protection technologies and services available in Microsoft 365. Specifically, the module covers message protection through Exchange Online Protection, Azure Advanced Threat Protection and Windows Defender Advanced Threat Protection.
Lessons

  • Exchange Online Protection
  • Office 365 Advanced Threat Protection
  • Managing Safe Attachments
  • Managing Safe Links
  • Azure Advanced Threat Protection
  • Windows Defender Advanced Threat Protection

Lab : Advanced Threat Protection

  • Setting up your lab environment
  • Editing an ATP Safe Links policy and creating a Safe Attachment policy

+ See more details

Module 3: Threat Intelligence

This module explains Microsoft Threat Intelligence which provides you with the tools to evaluate and address cyber threats. You will learn how to use the Security Dashboard in the Microsoft 365 Security and Compliance Center. It also explains and configures Microsoft Advanced Threat Analytics.
Lessons

  • Microsoft 365 Threat Intelligence
  • Using the Security Dashboard
  • Configuring Advanced Threat Analytics

Lab : Advanced Threat Analytics

  • Enabling and installing the ATA Center

+ See more details

Module 4: Mobility

This module is all about securing mobile devices and applications. You will learn about Mobile Device Management and how it works with Intune. You will also learn about how Intune and Azure AD can be used to secure mobile applications.
Lessons

  • Plan for Mobile Application Management
  • Plan for Mobile Device Management
  • Deploy Mobile Device Management
  • Enroll Devices to Mobile Device Management

+ See more details

CTU Training Solutions , Updated: May 24th, 2019

Share with friends

Request a Quote

Your Name
Your Surname
Contact Number
Your Email
Company
Which campus would you like to study at?
Your job title
Will your training be sponsored?
Message
The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free