MS-500: Microsoft 365 Security Administration

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Introduction to the course
Lectures | Duration |
---|---|
1. Creating a free Microsoft 365/Azure account for practice | 6m |
1. Creating a free Microsoft 365/Azure account for practice
6m
Creating and Managing User Identities
Lectures | Duration |
---|---|
1. Introduction to Creating and Managing User Identities | 8m |
2. Demonstration of Creating and Managing User Identities | 6m |
3. Stepping through the hands on tutorial for User Identities | 1m |
1. Introduction to Creating and Managing User Identities
8m
2. Demonstration of Creating and Managing User Identities
6m
3. Stepping through the hands on tutorial for User Identities
1m
Group Creation in Microsoft 365
Lectures | Duration |
---|---|
1. Introduction to Group Creation in Microsoft 365 | 4m |
2. Demonstration of Creating Groups in Microsoft 365 | 4m |
3. Stepping through the hands on tutorial for Dynamic Group Creation | 2m |
1. Introduction to Group Creation in Microsoft 365
4m
2. Demonstration of Creating Groups in Microsoft 365
4m
3. Stepping through the hands on tutorial for Dynamic Group Creation
2m
Password Expiration Management in Microsoft 365
Lectures | Duration |
---|---|
1. Introduction to Password Expiration Management in Microsoft 365 | 4m |
2. Demonstration of configuring Password Expiration in Microsoft 365 | 2m |
3. Stepping through the hands on tutorial for configuring password expiration | 1m |
1. Introduction to Password Expiration Management in Microsoft 365
4m
2. Demonstration of configuring Password Expiration in Microsoft 365
2m
3. Stepping through the hands on tutorial for configuring password expiration
1m
Password Lockout Management in Microsoft 365
Lectures | Duration |
---|---|
1. Introduction to Password Lockout Management in Microsoft 365 | 4m |
2. Demonstration of configuring the Password Lockout settings | 3m |
3. Stepping through the hands on tutorial for Password Lockout in Microsoft 365 | 2m |
1. Introduction to Password Lockout Management in Microsoft 365
4m
2. Demonstration of configuring the Password Lockout settings
3m
3. Stepping through the hands on tutorial for Password Lockout in Microsoft 365
2m
Role Based Access Control and Privileged Identity Management (PIM)
Lectures | Duration |
---|---|
1. Introduction to Assigning Roles | 12m |
2. Demonstration on role permissions as well as assigning roles to identities | 6m |
3. Stepping through the hands on tutorial for assigning roles | 1m |
4. Understanding Privileged Identity Management (PIM) | 14m |
5. Configuring Privileged Identity Management (PIM) | 9m |
6. Activating a PIM role as a user | 5m |
7. Stepping through the tutorial for PIM | 1m |
1. Introduction to Assigning Roles
12m
2. Demonstration on role permissions as well as assigning roles to identities
6m
3. Stepping through the hands on tutorial for assigning roles
1m
4. Understanding Privileged Identity Management (PIM)
14m
5. Configuring Privileged Identity Management (PIM)
9m
6. Activating a PIM role as a user
5m
7. Stepping through the tutorial for PIM
1m
Multi-Factor Authentication In Microsoft 365
Lectures | Duration |
---|---|
1. Introduction to Multi-Factor Authentication | 9m |
2. Demonstration on how to implement Multi-Factor Authentication | 6m |
3. Stepping through the tutorial for implementing Multi-Factor Authentication | 1m |
1. Introduction to Multi-Factor Authentication
9m
2. Demonstration on how to implement Multi-Factor Authentication
6m
3. Stepping through the tutorial for implementing Multi-Factor Authentication
1m
Self Service Password Reset
Lectures | Duration |
---|---|
1. Introduction to SSPR (Self Service Password Reset) | 5m |
2. Demonstration on how to implement and configure SSPR | 5m |
3. Stepping through the hands on tutorial for SSPR | 1m |
1. Introduction to SSPR (Self Service Password Reset)
5m
2. Demonstration on how to implement and configure SSPR
5m
3. Stepping through the hands on tutorial for SSPR
1m
Azure AD Identity Protection
Lectures | Duration |
---|---|
1. Introduction to Azure AD Identity Protection | 7m |
2. Demonstration of using Azure AD Identity Protection | 6m |
3. Stepping through the hands on tutorial for Azure AD Identity Protection Policies | 2m |
1. Introduction to Azure AD Identity Protection
7m
2. Demonstration of using Azure AD Identity Protection
6m
3. Stepping through the hands on tutorial for Azure AD Identity Protection Policies
2m
Conditional Access and Compliance Policies
Lectures | Duration |
---|---|
1. Introduction to Conditional Access Policies | 10m |
2. Demonstration of controlling access using Conditional Access Policies | 11m |
3. Stepping through the hands on tutorial for Conditional Access Policies | 2m |
4. Understanding Device Compliance Policies | 6m |
5. Implementing Device Compliance Policies using Enpoint Manager | 10m |
1. Introduction to Conditional Access Policies
10m
2. Demonstration of controlling access using Conditional Access Policies
11m
3. Stepping through the hands on tutorial for Conditional Access Policies
2m
4. Understanding Device Compliance Policies
6m
5. Implementing Device Compliance Policies using Enpoint Manager
10m
AIP (Azure Information Protection)
Lectures | Duration |
---|---|
1. Introduction to Azure Information Protection | 7m |
2. Demonstration on creating and managing AIP Sensitivity Labels | 10m |
3. Stepping through the hands on tutorial for creating AIP Sensitivity Labels | 2m |
4. Publishing AIP Labels in Microsoft 365 | 4m |
5. Demonstration on publishing AIP Labels | 4m |
6. Stepping through the hands on tutorial for publishing AIP Labels | 2m |
7. Demonstration for using keyword based AIP Policies | 5m |
8. Stepping through the hands on tutorial for using keyword based AIP Policies | 1m |
9. Using AIP to block actions based upon keywords | 5m |
10. Stepping through the tutorial for using AIP to block actions based on keywords | 2m |
1. Introduction to Azure Information Protection
7m
2. Demonstration on creating and managing AIP Sensitivity Labels
10m
3. Stepping through the hands on tutorial for creating AIP Sensitivity Labels
2m
4. Publishing AIP Labels in Microsoft 365
4m
5. Demonstration on publishing AIP Labels
4m
6. Stepping through the hands on tutorial for publishing AIP Labels
2m
7. Demonstration for using keyword based AIP Policies
5m
8. Stepping through the hands on tutorial for using keyword based AIP Policies
1m
9. Using AIP to block actions based upon keywords
5m
10. Stepping through the tutorial for using AIP to block actions based on keywords
2m
Data Governance with DLP (Data Loss Prevention)
Lectures | Duration |
---|---|
1. Introduction to Data Loss Prevention | 7m |
2. Demonstration of implementing Data Loss Prevention | 7m |
3. Stepping through the first hands on tutorial for creating a DLP policy | 2m |
4. Demonstration for editing an existing DLP Policy to apply an exception rule | 9m |
5. Stepping through the tutorial for editing an existing DLP Policy | 2m |
6. Demonstration in editing a DLP Policy to add incident report support for a user | 4m |
7. Stepping through the tutorial for adding incident report support to a DLP Policy | 2m |
8. Data Governance and Retention using Security and Compliance | 3m |
1. Introduction to Data Loss Prevention
7m
2. Demonstration of implementing Data Loss Prevention
7m
3. Stepping through the first hands on tutorial for creating a DLP policy
2m
4. Demonstration for editing an existing DLP Policy to apply an exception rule
9m
5. Stepping through the tutorial for editing an existing DLP Policy
2m
6. Demonstration in editing a DLP Policy to add incident report support for a user
4m
7. Stepping through the tutorial for adding incident report support to a DLP Policy
2m
8. Data Governance and Retention using Security and Compliance
3m
ATP (Advance Threat Protection)
Lectures | Duration |
---|---|
1. Introduction to ATP (Advanced Threat Protection) | 9m |
2. Demonstration on configuring and creating ATP Safe Attachments and Safe Links | 9m |
3. Stepping through the hands on tutorial for creating an ATP Safe Links Policy | 2m |
4. Windows Defender ATP Guard Technologies | 7m |
1. Introduction to ATP (Advanced Threat Protection)
9m
2. Demonstration on configuring and creating ATP Safe Attachments and Safe Links
9m
3. Stepping through the hands on tutorial for creating an ATP Safe Links Policy
2m
4. Windows Defender ATP Guard Technologies
7m
eDiscovery, Reporting, Auditing and Alerts
Lectures | Duration |
---|---|
1. Introduction to eDiscovery in Microsoft 365 | 6m |
2. Demonstration for adding privileges to a user to manage eDiscovery | 2m |
3. Stepping through the hands on tutorial for assigning eDiscovery Manager rights | 1m |
4. Demonstration using eDiscovery and placing a hold on a user | 4m |
5. Stepping through the hands on tutorial for placing an eDiscovery Hold | 2m |
6. Working with Security Reports in Microsoft 365 | 6m |
7. Working with Auditing Alerts and Content Searches in Microsoft 365 | 6m |
1. Introduction to eDiscovery in Microsoft 365
6m
2. Demonstration for adding privileges to a user to manage eDiscovery
2m
3. Stepping through the hands on tutorial for assigning eDiscovery Manager rights
1m
4. Demonstration using eDiscovery and placing a hold on a user
4m
5. Stepping through the hands on tutorial for placing an eDiscovery Hold
2m
6. Working with Security Reports in Microsoft 365
6m
7. Working with Auditing Alerts and Content Searches in Microsoft 365
6m
Microsoft Intune with Endpoint Manager
Lectures | Duration |
---|---|
1. Introduction to Microsoft Intune | 12m |
2. Using Intune with the Endpoint Manager Portal | 13m |
3. Understanding how Device Configuration Profiles can help secure devices | 6m |
4. Implementing a Device Configuration Profile with Intune | 6m |
5. Using App Protection Policies to help protect Office 365 Apps | 8m |
1. Introduction to Microsoft Intune
12m
2. Using Intune with the Endpoint Manager Portal
13m
3. Understanding how Device Configuration Profiles can help secure devices
6m
4. Implementing a Device Configuration Profile with Intune
6m
5. Using App Protection Policies to help protect Office 365 Apps
8m
Securing Microsoft 365 Hybrid Environments
Lectures | Duration |
---|---|
1. Foundation of Active Directory Domains | 13m |
2. A foundation for Remote Access, DMZs, and Virtualization | 8m |
3. A foundation of the Microsoft Cloud Services | 12m |
4. Setting up custom domain settings toprepare for Azure AD Connect | 6m |
5. Setting up custom domain name setting in AzureAD | 5m |
6. Performing cleanup to prepare for Azure AD connect | 6m |
7. Setting up a Hybrid environment using AzureAD Connect | 17m |
8. Verifying Azure AD Connect Health | 4m |
1. Foundation of Active Directory Domains
13m
2. A foundation for Remote Access, DMZs, and Virtualization
8m
3. A foundation of the Microsoft Cloud Services
12m
4. Setting up custom domain settings toprepare for Azure AD Connect
6m
5. Setting up custom domain name setting in AzureAD
5m
6. Performing cleanup to prepare for Azure AD connect
6m
7. Setting up a Hybrid environment using AzureAD Connect
17m
8. Verifying Azure AD Connect Health
4m
Cloud App Security
Lectures | Duration |
---|---|
1. Understanding Cloud App Security | 9m |
2. Utilizing Cloud App Security | 12m |
1. Understanding Cloud App Security
9m
2. Utilizing Cloud App Security
12m