MS-102 Microsoft 365 Administrator Training

Course: 2551

IT professionals gain skills to efficiently deploy, manage, and secure modern endpoints across Windows, macOS, iOS, and Android platforms using Microsoft Intune and related tools. The course empowers you to streamline device lifecycle management, enforce compliance, and support a Zero Trust security model in Microsoft 365 environments.

Download PDF
  • Duration: 5 days
  • Price: $2,995.00
Get This Course $2,995.00
September 22 - 26, 2025

✅ GUARANTEED TO RUN
7:00 AM – 3:00 PM PST

September 22 - 26, 2025

Tentative
9:00 AM – 5:00 PM EST

October 6 - 10, 2025

Tentative
9:00 AM – 5:00 PM PST

November 17 - 21, 2025

Tentative
9:00 AM – 5:00 PM EST

December 1 - 5, 2025

Tentative
8:00 AM – 4:00 PM MST

December 1 - 5, 2025

Tentative
9:00 AM – 5:00 PM CST

Scroll to view additional course dates

Reserve Your Seat

  • Virtual instructor Led Training
  • Complete Hands-on Labs
  • Softcopy of Courseware
  • Learning Labs
  • Virtual instructor Led Training
  • Complete Hands-on Labs
  • Softcopy of Courseware
  • Learning Labs
  • You can use your Purchase Card and checkout
  • The GSA Contract Number: 47QTCA20D000D
  • Call 800-453-5961 for details
  • Customize your class
  • Delivery Onsite or Online for your organization
  • Choice of Dates when and where you want
  • Guidance in choosing and customizing your class

Question About this Course?

MS-102T00 Microsoft 365 Administrator
MS-102T00 Microsoft 365 Administrator

Certification: Microsoft 365 Certified: Administrator Expert

Dynamics Edge courses and labs are enhanced Instructor-Led Training (ILT) materials designed specifically for live, guided instruction and follow a structured curriculum.

Our materials are intentionally different from Microsoft Learn paths in both structure and flow to better prepare for actual work, answer questions, real-time engagement, and deeper learning.  Microsoft Learn paths are self-paced study resources

You will Learn:

  • Manage Microsoft 365 Identity and Access
  • Implement and Manage Security and Compliance Solutions
  • Manage Microsoft 365 Tenant and Service Health
  • Configure and Manage Microsoft 365 Collaboration Tools
  • Plan and Manage Exchange Online
  • Secure Microsoft 365 Environments
  • Support Organizational Change and Adoption

Course Outline

Module 1: Configure Your Microsoft 365 Experience

  1. Explore your Microsoft 365 cloud environment

  2. Configure your organizational profile and subscription settings

  3. Set tenant-level sharing for SharePoint, OneDrive, and Teams

  4. Integrate Microsoft 365 with customer engagement apps

  5. Enable Unified Audit Logging and complete tenant configuration


Module 2: Manage Users, Licenses, Guests, and Contacts

  1. Choose the appropriate user identity model

  2. Create and manage users and licenses

  3. Perform bulk user maintenance in Microsoft Entra ID

  4. Add and collaborate with guest users

  5. Create and manage contacts across Microsoft 365 services


Module 3: Manage Groups in Microsoft 365

  1. Understand group types and their usage

  2. Create and manage groups in Microsoft 365

  3. Configure dynamic groups using rule-based membership

  4. Define group naming policies and governance

  5. Manage groups in Exchange and SharePoint


Module 4: Add a Custom Domain in Microsoft 365

  1. Plan for custom domain integration

  2. Configure DNS zones and records

  3. Create and verify a custom domain

  4. Apply domain settings to services

  5. Troubleshoot domain issues


Module 5: Configure Client Connectivity to Microsoft 365

  1. Understand automatic client configuration and DNS requirements

  2. Configure Outlook for Microsoft 365

  3. Set up hybrid client access scenarios

  4. Test and validate connectivity

  5. Troubleshoot client configuration issues


Module 6: Configure Administrative Roles in Microsoft 365

  1. Explore admin roles and the permissions model

  2. Assign roles and delegate access to partners

  3. Use administrative units in Microsoft Entra ID

  4. Elevate privileges with Privileged Identity Management

  5. Apply best practices for role assignments


Module 7: Manage Tenant Health and Services

  1. Monitor service health and performance

  2. Use Microsoft 365 Adoption Score and Usage Analytics

  3. Conduct network connectivity assessments

  4. Implement Microsoft 365 Backup (Preview)

  5. Develop an incident response plan


Module 8: Deploy Microsoft 365 Apps for Enterprise

  1. Explore deployment options for Microsoft 365 Apps

  2. Perform installations via self-service, cloud, or local sources

  3. Deploy using Configuration Manager

  4. Manage app updates and update channels

  5. Administer apps via the Microsoft 365 Apps admin center


Module 9: Analyze Workplace Data with Microsoft Viva Insights

  1. Understand Viva Insights features and benefits

  2. Explore Personal and Team insights dashboards

  3. Access Organizational and Advanced insights

  4. Interpret insights to improve productivity

  5. Use Viva to support well-being and collaboration


Module 10: Explore Identity Synchronization

  1. Compare cloud-only, hybrid, and federated identity models

  2. Examine authentication options in hybrid environments

  3. Understand directory synchronization basics

  4. Determine appropriate synchronization tools

  5. Map identity strategies to organizational needs


Module 11: Prepare for Identity Synchronization to Microsoft 365

  1. Plan Microsoft Entra ID deployment architecture

  2. Prepare on-premises Active Directory for sync

  3. Choose between Entra Connect Sync and Cloud Sync

  4. Understand prerequisites for synchronization tools

  5. Align synchronization strategy with business requirements


Module 12: Implement Directory Synchronization Tools

  1. Configure Microsoft Entra Connect Sync prerequisites

  2. Install and configure Entra Connect Sync

  3. Monitor sync health with Entra Connect Health

  4. Configure and deploy Microsoft Entra Cloud Sync

  5. Validate successful synchronization


Module 13: Manage Synchronized Identities

  1. Manage synced users and groups from on-prem to cloud

  2. Use security groups for sync maintenance

  3. Apply object filtering to control sync scope

  4. Explore Microsoft Identity Manager integration

  5. Troubleshoot sync issues and alerts


Module 14: Manage Secure User Access in Microsoft 365

  1. Implement Conditional Access policies

  2. Enable and configure MFA and passwordless sign-in

  3. Manage user passwords and self-service reset

  4. Configure Smart Lockout and Security Defaults

  5. Investigate sign-in logs for authentication issues


Module 15: Examine Threat Vectors and Data Breaches

  1. Explore phishing, spoofing, and account breach threats

  2. Understand spam, malware, and elevation of privilege

  3. Investigate data exfiltration and deletion attacks

  4. Detect insider threats and spillage risks

  5. Assess other modern threat techniques


Module 16: Explore the Zero Trust Security Model

  1. Understand the core principles of Zero Trust

  2. Plan Zero Trust implementation for identity, device, and network

  3. Align Microsoft security tools to Zero Trust

  4. Evaluate Microsoft’s approach to Zero Trust networking

  5. Implement continuous validation and least privilege


Module 17: Explore Security Solutions in Microsoft Defender XDR

  1. Enhance email security with Microsoft Defender for Office 365

  2. Detect identity threats with Microsoft Defender for Identity

  3. Secure endpoints with Microsoft Defender for Endpoint

  4. Leverage threat intelligence and cloud app security

  5. Review XDR security dashboards and reports


Module 18: Examine Microsoft Secure Score

  1. Explore how Microsoft Secure Score measures posture

  2. Use Secure Score to identify security gaps

  3. Track improvement actions over time

  4. Align compliance goals with score metrics

  5. Use Secure Score history to meet milestones


Module 19: Examine Privileged Identity Management

  1. Understand the purpose of Microsoft Entra Privileged Identity Management

  2. Configure time-bound admin role access

  3. Require approval and justification for elevation

  4. Audit admin role activations

  5. Use alerts and policy enforcement for critical roles


Module 20: Examine Microsoft Entra ID Protection

  1. Enable default identity protection policies

  2. Detect sign-in risk and user risk events

  3. Configure risk-based Conditional Access

  4. Plan investigations using Entra ID Protection

  5. Integrate ID Protection with response workflows

Module 21: Examine Email Protection in Microsoft 365

  1. Understand the anti-malware and anti-spam pipeline

  2. Implement Zero-hour Auto Purge (ZAP) to detect threats

  3. Explore Exchange Online Protection (EOP) anti-spoofing

  4. Configure outbound spam filtering

  5. Strengthen message hygiene for inbound and outbound traffic


Module 22: Enhance Email Protection with Microsoft Defender for Office 365

  1. Expand EOP with Safe Attachments and Safe Links

  2. Configure policies to detect spoofing and phishing

  3. Submit messages and files for analysis

  4. Create custom outbound spam and anti-phish policies

  5. Manage user access to reported threats


Module 23: Manage Safe Attachments

  1. Configure Safe Attachment policies using the portal

  2. Create Safe Attachment policies with PowerShell

  3. Modify and audit existing policies

  4. Create transport rules to bypass scanning when necessary

  5. Understand the end-user experience and notification behavior


Module 24: Manage Safe Links

  1. Create Safe Links policies for email and Office apps

  2. Configure policies via Defender portal and PowerShell

  3. Modify and prioritize Safe Links rules

  4. Bypass Safe Links scanning with transport rules

  5. Analyze how users interact with Safe Links


Module 25: Explore Threat Intelligence in Microsoft Defender XDR

  1. Use Microsoft Intelligent Security Graph for threat visibility

  2. Configure and manage alert policies in Microsoft 365

  3. Automate threat responses and investigations

  4. Perform advanced threat hunting in Defender XDR

  5. Analyze insights using Threat Analytics


Module 26: Implement App Protection with Microsoft Defender for Cloud Apps

  1. Deploy and integrate Microsoft Defender for Cloud Apps

  2. Configure file policies for data protection

  3. Use alerts and incident response features

  4. Implement and monitor Cloud Discovery

  5. Troubleshoot app visibility and risk issues


Module 27: Implement Endpoint Protection with Microsoft Defender for Endpoint

  1. Onboard and configure devices in Microsoft Defender

  2. Deploy Defender policies via Microsoft Intune

  3. Assess vulnerabilities with Defender Vulnerability Management

  4. Enable device discovery and inventory

  5. Reduce attack surface across endpoints


Module 28: Implement Threat Protection with Microsoft Defender for Office 365

  1. Understand the protection stack and policy structure

  2. Configure Threat Explorer and Trackers for investigation

  3. Set up Attack Simulation Training

  4. Identify and respond to ongoing threats

  5. Align policies with business risk tolerance


Module 29: Examine Data Governance in Microsoft Purview

  1. Explore Microsoft Purview Information Protection and lifecycle tools

  2. Implement data classification and sensitivity labels

  3. Minimize internal risk using Insider Risk Management

  4. Manage legal holds and eDiscovery

  5. Understand the full data governance lifecycle


Module 30: Explore Archiving and Records Management

  1. Enable and manage archive mailboxes

  2. Implement Microsoft Purview Records Management

  3. Configure retention labels and policies for records

  4. Restore deleted data from Exchange and SharePoint

  5. Ensure regulatory compliance with retention


Module 31: Explore Retention in Microsoft 365

  1. Compare retention policies and retention labels

  2. Define scopes, retention periods, and triggers

  3. Implement Preservation Lock for critical policies

  4. Apply policies using compliance center and PowerShell

  5. View retained items and audit history


Module 32: Explore Microsoft Purview Message Encryption

  1. Configure Microsoft Purview Message Encryption (OME)

  2. Create mail flow rules to enforce encryption

  3. Add custom branding for secure emails

  4. Explore advanced encryption options and scenarios

  5. Ensure secure sharing inside and outside the organization


Module 33: Explore Compliance in Microsoft 365

  1. Plan your compliance and data protection strategy

  2. Use Microsoft Purview Compliance Manager to assess readiness

  3. Implement controls aligned with compliance frameworks

  4. Analyze and improve the Microsoft Compliance Score

  5. Monitor audit logs and regulatory compliance posture


Module 34: Implement Microsoft Purview Insider Risk Management

  1. Understand use cases for Insider Risk Management

  2. Plan and configure policies and data indicators

  3. Investigate and manage insider alerts

  4. Collaborate with HR and legal teams

  5. Review and close insider risk cases


Module 35: Implement Microsoft Purview Information Barriers

  1. Configure Information Barriers to prevent data leaks

  2. Apply barriers to Teams, SharePoint, and OneDrive

  3. Understand user segmentation logic and restrictions

  4. Monitor barrier policies and violations

  5. Ensure compliance with industry regulations


Module 36: Explore Microsoft Purview Data Loss Prevention

  1. Understand DLP policy use cases across workloads

  2. Explore Endpoint DLP and Adaptive Protection

  3. View DLP activity using logs and dashboards

  4. Protect sensitive data from exfiltration

  5. Monitor and fine-tune policy results


Module 37: Implement Microsoft Purview Data Loss Prevention

  1. Deploy default and custom DLP policies

  2. Use templates for fast DLP implementation

  3. Configure email alerts and policy tips

  4. Define DLP rules and conditions

  5. Audit and validate DLP incidents


Module 38: Implement Data Classification of Sensitive Information

  1. Classify data using built-in and trainable classifiers

  2. Detect sensitive data with document fingerprinting

  3. View content analytics in Content Explorer

  4. Use Activity Explorer for behavior insights

  5. Customize classification rules for your organization


Module 39: Explore Sensitivity Labels

  1. Define the role of sensitivity labels in data protection

  2. Determine label scopes and content types

  3. Configure automatic and recommended labeling

  4. Assign label policies to users or groups

  5. Understand label impact on email and documents


Module 40: Implement Sensitivity Labels

  1. Plan and test label deployment strategy

  2. Enable label support in SharePoint and OneDrive

  3. Create, publish, and manage sensitivity labels

  4. Set up label-based encryption and permissions

  5. Remove and retire labels when no longer needed

Question About this Course?

Need help picking the right course?

Contact Us

Call Now

Call Now800-453-5961