IT professionals gain skills to efficiently deploy, manage, and secure modern endpoints across Windows, macOS, iOS, and Android platforms using Microsoft Intune and related tools. The course empowers you to streamline device lifecycle management, enforce compliance, and support a Zero Trust security model in Microsoft 365 environments.
✅ GUARANTEED TO RUN
7:00 AM – 3:00 PM PST
Tentative
9:00 AM – 5:00 PM EST
Tentative
9:00 AM – 5:00 PM PST
Tentative
9:00 AM – 5:00 PM EST
Tentative
8:00 AM – 4:00 PM MST
Tentative
9:00 AM – 5:00 PM CST
Reserve Your Seat
- Virtual instructor Led Training
- Complete Hands-on Labs
- Softcopy of Courseware
- Learning Labs
- Virtual instructor Led Training
- Complete Hands-on Labs
- Softcopy of Courseware
- Learning Labs
- You can use your Purchase Card and checkout
- The GSA Contract Number: 47QTCA20D000D
- Call 800-453-5961 for details
- Customize your class
- Delivery Onsite or Online for your organization
- Choice of Dates when and where you want
- Guidance in choosing and customizing your class
Question About this Course?
Certification: Microsoft 365 Certified: Administrator Expert
Dynamics Edge courses and labs are enhanced Instructor-Led Training (ILT) materials designed specifically for live, guided instruction and follow a structured curriculum.
Our materials are intentionally different from Microsoft Learn paths in both structure and flow to better prepare for actual work, answer questions, real-time engagement, and deeper learning. Microsoft Learn paths are self-paced study resources
You will Learn:
- Manage Microsoft 365 Identity and Access
- Implement and Manage Security and Compliance Solutions
- Manage Microsoft 365 Tenant and Service Health
- Configure and Manage Microsoft 365 Collaboration Tools
- Plan and Manage Exchange Online
- Secure Microsoft 365 Environments
- Support Organizational Change and Adoption
Course Outline
Module 21: Examine Email Protection in Microsoft 365
-
Understand the anti-malware and anti-spam pipeline
-
Implement Zero-hour Auto Purge (ZAP) to detect threats
-
Explore Exchange Online Protection (EOP) anti-spoofing
-
Configure outbound spam filtering
-
Strengthen message hygiene for inbound and outbound traffic
Module 22: Enhance Email Protection with Microsoft Defender for Office 365
-
Expand EOP with Safe Attachments and Safe Links
-
Configure policies to detect spoofing and phishing
-
Submit messages and files for analysis
-
Create custom outbound spam and anti-phish policies
-
Manage user access to reported threats
Module 23: Manage Safe Attachments
-
Configure Safe Attachment policies using the portal
-
Create Safe Attachment policies with PowerShell
-
Modify and audit existing policies
-
Create transport rules to bypass scanning when necessary
-
Understand the end-user experience and notification behavior
Module 24: Manage Safe Links
-
Create Safe Links policies for email and Office apps
-
Configure policies via Defender portal and PowerShell
-
Modify and prioritize Safe Links rules
-
Bypass Safe Links scanning with transport rules
-
Analyze how users interact with Safe Links
Module 25: Explore Threat Intelligence in Microsoft Defender XDR
-
Use Microsoft Intelligent Security Graph for threat visibility
-
Configure and manage alert policies in Microsoft 365
-
Automate threat responses and investigations
-
Perform advanced threat hunting in Defender XDR
-
Analyze insights using Threat Analytics
Module 26: Implement App Protection with Microsoft Defender for Cloud Apps
-
Deploy and integrate Microsoft Defender for Cloud Apps
-
Configure file policies for data protection
-
Use alerts and incident response features
-
Implement and monitor Cloud Discovery
-
Troubleshoot app visibility and risk issues
Module 27: Implement Endpoint Protection with Microsoft Defender for Endpoint
-
Onboard and configure devices in Microsoft Defender
-
Deploy Defender policies via Microsoft Intune
-
Assess vulnerabilities with Defender Vulnerability Management
-
Enable device discovery and inventory
-
Reduce attack surface across endpoints
Module 28: Implement Threat Protection with Microsoft Defender for Office 365
-
Understand the protection stack and policy structure
-
Configure Threat Explorer and Trackers for investigation
-
Set up Attack Simulation Training
-
Identify and respond to ongoing threats
-
Align policies with business risk tolerance
Module 29: Examine Data Governance in Microsoft Purview
-
Explore Microsoft Purview Information Protection and lifecycle tools
-
Implement data classification and sensitivity labels
-
Minimize internal risk using Insider Risk Management
-
Manage legal holds and eDiscovery
-
Understand the full data governance lifecycle
Module 30: Explore Archiving and Records Management
-
Enable and manage archive mailboxes
-
Implement Microsoft Purview Records Management
-
Configure retention labels and policies for records
-
Restore deleted data from Exchange and SharePoint
-
Ensure regulatory compliance with retention
Module 31: Explore Retention in Microsoft 365
-
Compare retention policies and retention labels
-
Define scopes, retention periods, and triggers
-
Implement Preservation Lock for critical policies
-
Apply policies using compliance center and PowerShell
-
View retained items and audit history
Module 32: Explore Microsoft Purview Message Encryption
-
Configure Microsoft Purview Message Encryption (OME)
-
Create mail flow rules to enforce encryption
-
Add custom branding for secure emails
-
Explore advanced encryption options and scenarios
-
Ensure secure sharing inside and outside the organization
Module 33: Explore Compliance in Microsoft 365
-
Plan your compliance and data protection strategy
-
Use Microsoft Purview Compliance Manager to assess readiness
-
Implement controls aligned with compliance frameworks
-
Analyze and improve the Microsoft Compliance Score
-
Monitor audit logs and regulatory compliance posture
Module 34: Implement Microsoft Purview Insider Risk Management
-
Understand use cases for Insider Risk Management
-
Plan and configure policies and data indicators
-
Investigate and manage insider alerts
-
Collaborate with HR and legal teams
-
Review and close insider risk cases
Module 35: Implement Microsoft Purview Information Barriers
-
Configure Information Barriers to prevent data leaks
-
Apply barriers to Teams, SharePoint, and OneDrive
-
Understand user segmentation logic and restrictions
-
Monitor barrier policies and violations
-
Ensure compliance with industry regulations
Module 36: Explore Microsoft Purview Data Loss Prevention
-
Understand DLP policy use cases across workloads
-
Explore Endpoint DLP and Adaptive Protection
-
View DLP activity using logs and dashboards
-
Protect sensitive data from exfiltration
-
Monitor and fine-tune policy results
Module 37: Implement Microsoft Purview Data Loss Prevention
-
Deploy default and custom DLP policies
-
Use templates for fast DLP implementation
-
Configure email alerts and policy tips
-
Define DLP rules and conditions
-
Audit and validate DLP incidents
Module 38: Implement Data Classification of Sensitive Information
-
Classify data using built-in and trainable classifiers
-
Detect sensitive data with document fingerprinting
-
View content analytics in Content Explorer
-
Use Activity Explorer for behavior insights
-
Customize classification rules for your organization
Module 39: Explore Sensitivity Labels
-
Define the role of sensitivity labels in data protection
-
Determine label scopes and content types
-
Configure automatic and recommended labeling
-
Assign label policies to users or groups
-
Understand label impact on email and documents
Module 40: Implement Sensitivity Labels
-
Plan and test label deployment strategy
-
Enable label support in SharePoint and OneDrive
-
Create, publish, and manage sensitivity labels
-
Set up label-based encryption and permissions
-
Remove and retire labels when no longer needed
Question About this Course?
Need help picking the right course?
Call Now