Course Overview

Note- This exam retired on September 30, 2023. A replacement exam, Exam MS-102: Microsoft 365 Administrator, is available for those who are earning the certification for the first time.

The Microsoft 365 Mobility and Security certification training course from CloudThat offers candidates proper training and relevant study material to prepare and successfully clear the MS-101 exam. This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, candidates will examine all the common types of threat vectors and data breaches facing organizations today, and they will learn how Microsoft 365’s security solutions address these security threats.

After completing this course, students will be able to:

  • Device management
  • Threat protection with Microsoft Cloud App security
  • Threat protection with Microsoft Defender
  • Microsoft365 security metrics
  • Information protection
  • Information governance
  • Data loss prevention
  • Security reports and alerts
  • Windows 10 deployment
  • Device enrolment
  • Device Compliance
  • Search and Investigation

Upcoming Batches

Enroll Online
Start Date End Date















Key Features

  • Our MS-101 Microsoft training modules have 50% -60% hands-on lab sessions to encourage Thinking-Based Learning (TBL).
  • Interactive-rich virtual and face-to-face classroom teaching to inculcate Problem-Based Learning (PBL).
  • Microsoft certified instructor-led training and mentoring sessions to develop Competency-Based Learning (CBL).
  • Well-structured use-cases to simulate challenges encountered in a Real-World environment.
  • Integrated teaching assistance and support through experts designed Learning Management System (LMS) and ExamReady platform.
  • Being a Microsoft Learning Partner provides us with the edge over competition.

Who Should Attend

  • This Microsoft MS-101 certification course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

Course Outline Download Course Outline

In this module, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Active Directory Identity Protection.


  • Threat Vectors and Data Breaches
  • The Zero Trust Model
  • Security Solutions in Microsoft 365
  • Introduction to Microsoft Secure Score
  • Privileged Identity Management
  • Introduction to Azure Active Directory Identity Protection

Hands-On: Tenant Setup and PIM

  • Initialize your Microsoft 365 Tenant
  • PIM Resource Workflows

This module examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. You will be introduced to the various reports that monitor your security health.


  • Introduction to Exchange Online Protection
  • Introduction to Advanced Threat Protection
  • Managing Safe Attachments
  • Managing Safe Links
  • Monitoring and Reports

Hands-On: Manage Microsoft 365 Security Services

  • Implement a Safe Attachments policy
  • Implement a Safe Links policy

In this module, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.


  • Overview of Microsoft 365 Threat Intelligence
  • Using the Security Dashboard
  • Configuring Advanced Threat Analytics
  • Implementing Your Cloud Application Security

Hands-On: Implement Threat Intelligence

  • Conduct a Spear Phishing attack using the Attack Simulator
  • Conduct Password attacks using the Attack Simulator
  • Prepare for Alert Policies
  • Implement a Mailbox Permission Alert
  • Implement a SharePoint Permission Alert
  • Test the Default eDiscovery Alert

This module examines the key components of Microsoft 365 Compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP).


  • Introduction to Archiving in Microsoft 365
  • Introduction to Retention in Microsoft 365
  • Introduction to Information Rights Management
  • Introduction to Secure Multipurpose Internet Mail Extension
  • Introduction to Office 365 Message Encryption
  • Introduction to Data Loss Prevention

Hands-On: Implement Message Encryption and IRM

  • Configure Microsoft 365 Message Encryption
  • Validate Information Rights Management

This module delves deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center.


  • In-Place Records Management in SharePoint
  • Archiving and Retention in Exchange
  • Retention Policies in the SCC

Hands-On: Implement Archiving and Retention

  • Initialize Compliance
  • Configure Retention Tags and Policies

This module examines how to implement the key aspects of data governance, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips.


  • Evaluating Your Compliance Readiness
  • Implementing Compliance Center Solutions
  • Building Ethical Walls in Exchange Online
  • Creating a Simple DLP Policy from a Built-in Template
  • Creating a Custom DLP Policy
  • Creating a DLP Policy to Protect Documents
  • Working with Policy Tips

Hands-On: Implement DLP Policies

  • Manage DLP Policies
  • Test MRM and DLP Policies

This module focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection.


  • Managing Retention in Email
  • Troubleshooting Data Governance
  • Implementing Azure Information Protection
  • Implementing Advanced Features of AIP
  • Implementing Windows Information Protection

Hands-On: Implement AIP and WIP

  • Implement Azure Information Protection
  • Implement Windows Information Protection

This module concludes this section on data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.


  • Searching for Content in the Security and Compliance Center
  • Auditing Log Investigations
  • Managing Advanced eDiscovery

Hands-On: Manage Search and Investigations

  • Implement a Data Subject Request
  • Investigate Your Microsoft 365 Data

This module provides an in-depth examination of Microsoft 365 Device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Microsoft Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management.


  • Introduction to Co-management
  • Preparing Your Windows 10 Devices for Co-management
  • Transitioning from Configuration Manager to Intune
  • Introduction to Microsoft Store for Business
  • Planning for Mobile Application Management

Hands-On: Implement the Microsoft Store for Business

  • Configure the Microsoft Store for Business
  • Manage the Microsoft Store for Business

This module focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Windows Analytics, and planning your Windows 10 subscription activation service.,


  • Windows 10 Deployment Scenarios
  • Implementing and Managing Windows Autopilot
  • Planning Your Windows 10 Subscription Activation Strategy
  • Resolving Windows 10 Upgrade Errors
  • Introduction to Windows Analytics

This module focuses on Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.


  • Planning Mobile Device Management
  • Deploying Mobile Device Management
  • Enrolling Devices to MDM
  • Managing Device Compliance

Hands-On: Manage Devices with Intune

  • Enable Device Management
  • Configure Azure AD for Intune
  • Create Intune Policies
  • Enroll a Windows 10 Device
  • Manage and Monitor a Device in Intune


    • By earning MS-101: Microsoft 365 Mobility and Security certification, you can be competent Microsoft certified professional.
    • Demonstrate essential digital skills at workspace.
    • On successful completion of Microsoft 365 Mobility and Security training, aspirants receive a Course Completion Certificate from us.
    • By successfully clearing the MS-101 exam, aspirants earn Microsoft Certification.

Course Fee

Select Course date

Add to Wishlist

Course ID: 13484

Course Price at

$1599 + 0% TAX
Enroll Now




The training support is too good. Trainers are certified and highly knowledgeable.

Enquire Now