www.gitbit.org
Open in
urlscan Pro
2606:50c0:8003::153
Public Scan
URL:
https://www.gitbit.org/?utm_source=newsletter&utm_medium=email&utm_campaign=Whats-in-this-course&utm_id=last-time
Submission: On December 08 via manual from CA — Scanned from CA
Submission: On December 08 via manual from CA — Scanned from CA
Form analysis
0 forms found in the DOMText Content
GITBIT First lessonBlog Sign Up GET CERTIFIED IN MS-500 MICROSOFT 365 SECURITY ADMINISTRATION Get Started Now I already have an account Browse practice questions WHAT YOU'LL LEARN EVERYTHING YOU NEED TO KNOW TO PASS THE MS-500: MICROSOFT 365 SECURITY ADMINISTRATION. CREATING AND MANAGING ADMIN ROLES INCLUDING TIME-LIMITED ADMIN ROLES. CREATING AND MANAGING CONDITIONAL ACCESS POLICIES. HOW TO IMPLEMENT MULTI-FACTOR AUTHENTICATION (MFA). SETUP AND MANAGE SELF SERVICE PASSWORD RESET (SSPR). WHAT'S MICROSOFT DEFENDER. SETUP AND MANAGE MICROSOFT DEFENDER FOR IDENTITY. PROTECTING WINDOWS 10 AND OTHER USER DEVICES USING MICROSOFT DEFENDER FOR ENDPOINT. MANAGING MICROSOFT DEFENDER FOR CLOUD APPS. HOW TO CLASSIFY DATA USING LABELS. MANAGING DATA RETENTION TO CONFORM TO COMPLIANCE. PREVENTING ACCIDENTAL AND MALICIOUS DATA LOSS WITH DLP POLICIES. AND MORE! WHAT YOU'LL NEED TO KNOW BEFORE GETTING STARTED * BASIC KNOWLEDGE OF WINDOWS 10 DEVICES * BASIC UNDERSTANDING OF OFFICE 365 * SIMPLE UNDERSTANDING OF AUTHORIZATION AND AUTHENTICATION * BASIC UNDERSTANDING OF COMPUTER NETWORKING COURSE CONTENT Introduction * Is the MS-500 worth it? * Creating a free Microsoft 365 tenant for practice * Managing the Microsoft 365 tenant - Introduction to the admin centers * Managing Microsoft 365 through PowerShell Securing identity and access to Microsoft 365 * How to create users in Microsoft 365 Cloud Only * Creating and managing admins through roles * Control permissions and access through admin roles * What's AD Connect * AD Connect * Time limited admin roles in Microsoft 365 * Protecting Passwords in Microsoft 365 * Creating and managing users through groups * Time limited admin roles, protecting passwords, and Managing users through groups * Securing and implementing enterprise applications * What's a conditional access policy? * Conditional access policies * The many ways to implement multi-factor authentication (MFA) in Microsoft 365 * Configure and manage multi-factor authentication (MFA) * Implement Self-service password reset in Microsoft 365 * Locking down your Microsoft 365 tenant from Microsoft engineers * Implementing intelligent security using risk policies in Microsoft 365 * Automating Access Review in Microsoft 365 * Just in time, approval and notification for admin roles in Microsoft 365 * Lockbox, risk policies, access review, and JIT Securing Microsoft 365, clouds, and on-premises environments * What's Microsoft 365 Defender? * What's Microsoft Defender for identity? * What's Microsoft Defender for Office 365? * Protect your email and Office environment from malicious actors * Protecting email against phishing attacks * Simulating attacks with Microsoft 365 * Defending Exchange Online * Protecting Windows 10 and other devices with Microsoft Defender for Endpoint * Implement and manage Microsoft Defender for Cloud Apps * Microsoft Defender * Collect, detect, investigate, and respond to security threats using Microsoft Sentinel * Auditing sign-ins and other actions in Microsoft 365 * Auditing sign-ins and Microsoft Sentinel Protecting your environment from accidental and malicious data loss * How to classify data using labels in Microsoft 365 * Classify data using labels * Creating and managing data retention to conform to compliance * Configuring and managing retention * Preventing accidental and malicious data loss with DLP policies * Data Loss Prevention policies (DLP) * Everything you need to know about securing SharePoint Online for the MS-500 * Securing SharePoint Online Protecting User devices using Intune * Introduction to Intune * Setting up Android Devices * Setting up Apple / iOS devices in Intune * Setting up Windows 10 devices in Intune * How to manage devices using Intune * Understanding compliance policies * Restricting and managing apps on user devices * Protecting user devices using Intune Did you like the site?