Tentative
9:00 AM – 5:00 PM EST
Tentative
7:00 AM – 3:00 PM PST
Tentative
7:00 AM – 3:00 PM PST
Reserve Your Seat
- Virtual instructor Led Training
 - Complete Hands-on Labs
 - Softcopy of Courseware
 - Learning Labs
 
- Virtual instructor Led Training
 - Complete Hands-on Labs
 - Softcopy of Courseware
 - Learning Labs
 - You can use your Purchase Card and checkout
 - The GSA Contract Number: 47QTCA20D000D
 - Call 800-453-5961 for details
 
- Customize your class
 - Delivery Onsite or Online for your organization
 - Choice of Dates when and where you want
 - Guidance in choosing and customizing your class
 
Question About this Course?

Certification: Microsoft Certified: Information Security Administrator Associate
Dynamics Edge courses and labs are enhanced Instructor-Led Training (ILT) materials, purpose-built for live, guided instruction, structured learning and practical, work-ready skills development.
Unlike Microsoft Learn paths—which are designed for self-paced study—our ILT content follows a carefully crafted curriculum tailored for real-time engagement, interactive Q&A, The structure and flow of our materials are intentionally different to support deeper learning and immediate application.
SC-401 Information Security Administrator
You will Learn:
- How to implement information protection
 - Implement data loss prevention and retention
 - Manage risks, alerts, and activities
 
This course helps learners prepare for the Administering Information Security in Microsoft 365 exam (SC-401).
Course outline
Module 1 – Protect sensitive data in a digital world
- The growing need for data protection
 - The challenges of managing sensitive data
 - Protect data in a Zero Trust world
 - Understand data classification and protection
 - Prevent data leaks and insider threats
 - Manage security alerts and respond to threats
 - Protect AI-generated and AI-processed data
 - Module assessment
 
Module 2 – Classify data for protection and governance
- Data classification overview
 - Classify data using sensitive information types
 - Classify data using trainable classifiers
 - Create a custom trainable classifier
 - Module assessment
 
Module 3 – Review and analyze data classification and protection
- Review classification and protection insights
 - Analyze classified data with data and content explorer
 - Monitor and review actions on labeled data
 - Module assessment
 
Module 4 – Create and manage sensitive information types
- Sensitive information type overview
 - Compare built-in versus custom sensitive information types
 - Create and manage custom sensitive information types
 - Create and manage exact data match sensitive info types
 - Implement document fingerprinting
 - Describe named entities
 - Create a keyword dictionary
 - Module assessment
 
Module 5 – Create and configure sensitivity labels with Microsoft Purview
- Sensitivity label overview
 - Create and configure sensitivity labels and label policies
 - Configure encryption with sensitivity labels
 - Implement auto-labeling policies
 - Track and evaluate sensitivity label usage in Microsoft Purview
 - Module assessment
 
Module 6 – Apply sensitivity labels for data protection
- Foundations of sensitivity label integration in Microsoft 365
 - Manage sensitivity labels in Office apps
 - Apply sensitivity labels with Microsoft 365 Copilot for secure collaboration
 - Protect meetings with sensitivity labels
 - Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
 - Module assessment
 
Module 7 – Classify and protect on-premises data with Microsoft Purview
- Protect on-premises files with Microsoft Purview
 - Prepare your environment for the Microsoft Purview Information Protection scanner
 - Configure and install the Microsoft Purview Information Protection scanner
 - Run and manage the scanner
 - Enforce data loss prevention policies on on-premises files
 - Module assessment
 
Module 8 – Understand Microsoft 365 encryption
- Learn how Microsoft 365 data is encrypted at rest
 - Understand service encryption in Microsoft Purview
 - Explore customer key management using Customer Key
 - Learn how data is encrypted in-transit
 
Module 9 – Protect email with Microsoft Purview Message Encryption
- Understand message encryption
 - Plan for Microsoft Purview Message Encryption
 - Configure Microsoft Purview Message Encryption
 - Customize encrypted email branding with Microsoft Purview
 - Control encrypted email access with Advanced Message Encryption
 - Use Microsoft Purview Message Encryption templates in mail flow rules
 - Module assessment
 
Module 10 – Prevent data loss in Microsoft Purview
- Data loss prevention overview
 - Plan and design DLP policies
 - Understand DLP policy deployment and simulation mode
 - Create and manage DLP policies
 - Integrate Adaptive Protection with DLP
 - Use DLP analytics (preview) to identify data risks
 - Understand DLP alerts and activity tracking
 - Module assessment
 
Module 11 – Implement endpoint data loss prevention (DLP) with Microsoft Purview
- Endpoint data loss prevention (DLP) overview
 - Understand the endpoint DLP implementation workflow
 - Onboard devices for endpoint DLP
 - Configure settings for endpoint DLP
 - Create and manage endpoint DLP policies
 - Deploy the Microsoft Purview browser extension
 - Configure just-in-time (JIT) protection
 - Module assessment
 
Module 12 – Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
- Configure data loss prevention policies for Power Platform
 - Integrate data loss prevention in Microsoft Defender for Cloud Apps
 - Configure policies in Microsoft Defender for Cloud Apps
 - Manage data loss prevention violations in Microsoft Defender for Cloud Apps
 - Module assessment
 
Module 13 – Investigate and respond to Microsoft Purview Data Loss Prevention alerts
- Understand data loss prevention (DLP) alerts
 - Understand the DLP alert lifecycle
 - Configure DLP policies to generate alerts
 - Investigate DLP alerts in Microsoft Purview
 - Investigate DLP alerts in Microsoft Defender XDR
 - Respond to DLP alerts
 - Module assessment
 
Module 14 – Understand Microsoft Purview Insider Risk Management
- What is an insider risk?
 - Microsoft Purview Insider Risk Management overview
 - Microsoft Purview Insider Risk Management features
 - Case study: Protect sensitive data with Insider Risk Management
 - Module assessment
 
Module 15 – Prepare for Microsoft Purview Insider Risk Management
- Plan for Insider Risk Management
 - Prepare your organization for Insider Risk Management
 - Configure settings for Insider Risk Management
 - Integrate Insider Risk Management with data sources and tools
 - Module assessment
 
Module 16 – Create and manage Insider Risk Management policies
- Understand Insider Risk Management policy templates
 - Compare quick and custom insider risk policies
 - Create a custom Insider Risk Management policy
 - Manage policies in Insider Risk Management
 - Module assessment
 
Module 17 – Investigate insider risk alerts and related activity
- Understand insider risk alerts and investigations
 - Manage alert volume in insider risk management
 - Investigate and triage insider risk alerts in Microsoft Purview
 - Analyze alert context with the All risk factors tab
 - Investigate activity details with the Activity explorer tab
 - Review patterns over time with the User activity tab
 - Investigate insider risk alerts in Microsoft Defender XDR
 - Manage and take action on insider risk cases
 - Module assessment
 
Module 18 – Implement Adaptive Protection in Insider Risk Management
- Adaptive Protection overview
 - Understand and configure risk levels in Adaptive Protection
 - Configure Adaptive Protection
 - Manage Adaptive Protection
 
Module 19 – Discover AI interactions with Microsoft Purview
- Understand AI security risks
 - Microsoft Purview Data Security Posture Management (DSPM) for AI overview
 - Configure DSPM for AI
 - Review AI security reports
 - Audit Microsoft 365 Copilot activities and AI interactions with Microsoft Purview
 - Module assessment
 
Module 20 – Protect sensitive data from AI-related risks
- Apply AI security recommendations with DSPM for AI
 - Use sensitivity labels to protect Microsoft 365 Copilot content
 - Use Endpoint DLP to prevent generative AI data exposure
 - Module assessment
 
Module 21 – Govern AI usage with Microsoft Purview
- Apply retention policies to Microsoft 365 Copilot prompts and responses
 - Investigate and delete Copilot interactions with Microsoft Purview eDiscovery
 - Detect and manage Copilot and AI communications with Microsoft Purview
 - Module assessment
 
Module 22 – Assess and mitigate AI risks with Microsoft Purview
- Use data assessments to detect oversharing risks
 - Detect risky AI usage with Insider Risk Management
 - Case study: Use Adaptive Protection to respond to AI-related risk
 - Module assessment
 
Module 23 – Understand retention in Microsoft Purview
- Overview of retention and the data lifecycle
 - Understand retention labels and retention policies
 - Decide when to apply retention
 - Module assessment
 
Module 24 – Implement and manage retention and recovery in Microsoft Purview
- Plan for retention and disposition with retention labels
 - Create and publish retention labels
 - Create and manage auto-apply retention labels
 - Create and configure adaptive scopes
 - Create and configure retention policies
 - Understand policy and label precedence in Microsoft Purview
 - Recover content in Microsoft 365 workloads
 - Module assessment
 
Module 25 – Search and investigate with Microsoft Purview Audit
- Microsoft Purview Audit overview
 - Configure and manage Microsoft Purview Audit
 - Conduct searches with Audit (Standard)
 - Audit Microsoft Copilot for Microsoft 365 interactions
 - Investigate activities with Audit (Premium)
 - Export audit log data
 - Configure audit retention with Audit (Premium)
 - Module assessment
 
Module 26 – Search for content with Microsoft Purview eDiscovery
- Understand eDiscovery and content search capabilities
 - Prerequisites for using eDiscovery in Microsoft Purview
 - Create an eDiscovery search
 - Conduct an eDiscovery search
 - Export eDiscovery search results
 - Module assessment
 
Question About this Course?
Need help picking the right course?
Call Now