Course Details | Cloudthat

Course Overview

The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant.

They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies.

This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.

After completing this course, students will be able to:

  • Implement information protection
  • Implement data loss prevention
  • Implement information governance

Upcoming Batches

India Online Enroll
Start Date End Date

To be Decided

Key Features

  • Our training modules have 50% -60% hands-on lab sessions to encourage Thinking-Based Learning (TBL)
  • Interactive-rich virtual and face-to-face classroom teaching to inculcate Problem-Based Learning (PBL)
  • Microsoft certified instructor-led training and mentoring sessions to develop Competency-Based Learning (CBL)
  • Well-structured use-cases to simulate challenges encountered in a Real-World environment
  • Integrated teaching assistance and support through experts designed Learning Management System (LMS) and ExamReady platform
  • Being a Microsoft Learning Partner provides us with the edge over competition

Who Should Attend

  • The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant. They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies. This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.

Prerequisites

  • Foundational knowledge of Microsoft security and compliance technologies.
  • Basic knowledge of information protection concepts.
  • Understanding of cloud computing concepts.
  • Understanding of Microsoft 365 products and services.

Course Outline Download Course Outline

  • Create and manage sensitive information types
  • select a sensitive information type based on an organization's requirements
  • create and manage custom sensitive information types
  • create custom sensitive information types with exact data match
  • implement document fingerprinting
  • create a keyword dictionary

Create and manage trainable classifiers

  • identify when to use trainable classifiers
  • create a trainable classifier
  • verify a trainable classifier is performing properly
  • retrain a classifier

Implement and manage sensitivity labels

  • identify roles and permissions for administering sensitivity labels
  • create sensitivity labels
  • configure and manage sensitivity label policies
  • apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
  • configure and publish automatic labeling policies (excluding MCAS scenarios)
  • monitor data classification and label usage by using label analytics tools such as content explorer and activity explorer
  • apply bulk classification to on-premises data by using the AIP unified labelling scanner
  • manage protection settings and marking for applied sensitivity labels
  • apply protections and restrictions to email including content marking, usage, permission, encryption, expiration, etc.
  • apply protections and restrictions to files including content marking, usage, permission, encryption, expiration, etc.

Plan and implement encryption for email messages

  • define requirements for implementing Office 365 Message Encryption
  • implement Office 365 Advanced Message Encryption

Create and configure data loss prevention policies

  • recommend a data loss prevention solution for an organization
  • configure data loss prevention for policy precedence
  • configure policies for Microsoft Exchange email
  • configure policies for Microsoft SharePoint sites
  • configure policies for Microsoft OneDrive accounts
  • configure policies for Microsoft Teams chat and channel messages
  • integrate Microsoft Cloud App Security (MCAS) with Microsoft Information Protection
  • configure policies in Microsoft Cloud App Security (MCAS)
  • implement data loss prevention policies in test mode

Implement and monitor Microsoft Endpoint data loss prevention

  • configure policies for endpoints
  • configure Endpoint data loss prevention settings
  • recommend configurations that enable devices for Endpoint data loss prevention policies
  • monitor endpoint activities

Manage and monitor data loss prevention policies and activities

  • manage and respond to data loss prevention policy violations
  • review and analyze data loss prevention reports
  • manage permissions for data loss prevention reports
  • manage data loss prevention violations in Microsoft Cloud App Security (MCAS)

Configure retention policies and labels

  • create and apply retention labels
  • create and apply retention label policies
  • configure and publish auto-apply label policies

Manage data retention in Microsoft 365

  • create and apply retention policies in Microsoft SharePoint and OneDrive
  • create and apply retention policies in Microsoft Teams
  • recover content in Microsoft Teams, SharePoint, and OneDrive
  • recover content in Microsoft Exchange
  • implement retention policies and tags in Microsoft Exchange
  • apply mailbox holds in Microsoft Exchange
  • implement Microsoft Exchange Online archiving policies

Implement records management in Microsoft 365

  • configure labels for records management
  • manage and migrate retention requirements with a file plan
  • configure automatic retention using File Plan descriptors
  • classify records using retention labels and policies
  • implement in-place records management in Microsoft SharePoint
  • configure event-based retention
  • manage disposition of records

Certification

    • By earning SC-400: Microsoft Information Protection Administrator certification, you can be competent Microsoft Certified Security Analyst
    • Demonstrate skills to secure information technology systems for the organization
    • On successful completion of SC-400: Microsoft Information Protection Administrator training aspirants receive a Course Completion Certificate from us
    • By successfully clearing the SC-400 exams, aspirants earn Microsoft Certification

Our Top Trainers

Course Fee

Select Course date

Add to Wishlist

Course Price at

₹ 19900 + 18% GST

Enroll Now

Reviews

K

Prarthit Mehta

Had a good learning experience with CloudThat.