SC-401 Information Security Administrator - ITEL
SC-401 Information Security Administrator
Course Code:
SC-401
Duration:
4 Days
Delivery Mode:
Instructor-led training (ILT)/Online Learning (OLL)
Start Date:
Contact Us
End Date:
Contact Us
Fees:
$3,052.00

The Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services. The course covers essential topics such as information protection, data loss prevention (DLP), retention, and insider risk management. You learn how to protect data within Microsoft 365 collaboration environments from internal and external threats. Additionally, you learn how to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. You also learn how to protect data used by AI services
within Microsoft environments and implement controls to safeguard content in these environments.

Course Outline

Lesson 1: Implement Microsoft Purview Information Protection Protect sensitive data in a digital world

  • Introduction
  • The growing need for data protection
  • The challenges of managing sensitive data
  • Protect data in a Zero Trust world
  • Understand data classification and protection
  • Prevent data leaks and insider threats
  • Manage security alerts and respond to threats
  • Protect AI-generated and AI-processed data
  • Module assessment
  • Summary
Lesson 2: Classify data for protection and governance

  • Introduction
  • Data classification overview
  • Classify data using sensitive information types
  • Classify data using trainable classifiers
  • Create a custom trainable classifier
  • Module assessment
  • Summary
Lesson 3: Review and analyze data classification and protection

  • Introduction
  • Review classification and protection insights
  • Analyze classified data with data and content explorer
  • Monitor and review actions on labeled data
  • Module assessment
  • Summary
Lesson 4: Create and manage sensitive information types

  • Introduction
  • Sensitive information type overview
  • Compare built-in versus custom sensitive information types
  • Create and manage custom sensitive information types
  • Create and manage exact data match sensitive info types
  • Implement document fingerprinting
  • Describe named entities
  • Create a keyword dictionary
  • Module assessment
  • Summary and resources
Lesson 5: Create and configure sensitivity labels with Microsoft Purview

  • Introduction
  • Sensitivity label overview
  • Create and configure sensitivity labels and label policies
  • Configure encryption with sensitivity labels
  • Implement auto-labeling policies
  • Use the data classification dashboard to monitor sensitivity labels
  • Module assessment
  • Summary
Lesson 6: Apply sensitivity labels for data protection

  • Introduction
  • Foundations of sensitivity label integration in Microsoft 365
  • Manage sensitivity labels in Office apps
  • Apply sensitivity labels with Microsoft 365 Copilot for secure collaboration
  • Protect meetings with sensitivity labels
  • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
  • Module assessment
  • Summary and resources
Lesson 7: Classify and protect on-premises data with Microsoft Purview

  • Introduction
  • Protect on-premises files with Microsoft Purview
  • Prepare your environment for the Microsoft Purview Information Protection scanner
  • Configure and install the Microsoft Purview Information Protection scanner
  • Run and manage the scanner
  • Enforce data loss prevention policies on on-premises files
  • Module assessment
  • Summary
Lesson 8: Understand Microsoft 365 encryption

  • Introduction to Microsoft 365 encryption
  • Learn how Microsoft 365 data is encrypted at rest
  • Understand service encryption in Microsoft Purview
  • Explore customer key management using Customer Key
  • Learn how data is encrypted in-transit
  • Summary and knowledge check
Lesson 9: Deploy Microsoft Purview Message Encryption

  • Introduction
  • Implement Microsoft Purview Message Encryption
  • Implement Microsoft Purview Advanced Message Encryption
  • Use Microsoft Purview Message Encryption templates in mail flow rules
  • Module assessment
  • Summary and resources
Lesson 10: Implement and manage Microsoft Purview Data Loss Prevention Prevent data loss in Microsoft Purview

  • Introduction
  • Data loss prevention overview
  • Plan and design DLP policies
  • Understand DLP policy deployment and simulation mode
  • Create and manage DLP policies
  • Integrate Adaptive Protection with DLP
  • Use DLP analytics (preview) to identify data risks
  • Understand DLP alerts and activity tracking
  • Module assessment
  • Summary and resources
Lesson 11: Implement endpoint data loss prevention (DLP) with Microsoft Purview

  • Introduction
  • Endpoint data loss prevention (DLP) overview
  • Understand the endpoint DLP implementation workflow
  • Onboard devices for endpoint DLP
  • Configure settings for endpoint DLP
  • Create and manage endpoint DLP policies
  • Deploy the Microsoft Purview browser extension
  • Configure just-in-time (JIT) protection
  • Module assessment
  • Summary and resources
Lesson 12: Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform

  • Introduction
  • Configure data loss prevention policies for Power Platform
  • Integrate data loss prevention in Microsoft Defender for Cloud Apps
  • Configure policies in Microsoft Defender for Cloud Apps
  • Manage data loss prevention violations in Microsoft Defender for Cloud Apps
  • Module assessment
  • Summary and resources
Lesson 13: Investigate and respond to Microsoft Purview Data Loss Prevention alerts

  • Introduction
  • Understand data loss prevention (DLP) alerts
  • Understand the DLP alert lifecycle
  • Configure DLP policies to generate alerts
  • Investigate DLP alerts in Microsoft Purview
  • Investigate DLP alerts in Microsoft Defender XDR
  • Respond to DLP alerts
  • Module assessment
  • Summary
Lesson 14: Understand Microsoft Purview Insider Risk Management

  • Introduction
  • What is an insider risk?
  • Microsoft Purview Insider Risk Management overview
  • Microsoft Purview Insider Risk Management features
  • Case study: Protect sensitive data with Insider Risk Management
  • Module assessment
  • Summary
Lesson 15: Prepare for Microsoft Purview Insider Risk Management

  • Introduction
  • Plan for Insider Risk Management
  • Prepare your organization for Insider Risk Management
  • Configure settings for Insider Risk Management
  • Integrate Insider Risk Management with data sources and tools
  • Module assessment
  • Summary
Lesson 16: Create and manage Insider Risk Management policies

  • Introduction
  • Understand Insider Risk Management policy templates
  • Compare quick and custom insider risk policies
  • Create a custom Insider Risk Management policy
  • Manage policies in Insider Risk Management
  • Module assessment
  • Summary
Lesson 17: Investigate insider risk alerts and related activity

  • Introduction
  • Understand insider risk alerts and investigations
  • Manage alert volume in insider risk management
  • Investigate and triage insider risk alerts in Microsoft Purview
  • Analyze alert context with the All risk factors tab
  • Investigate activity details with the Activity explorer tab
  • Review patterns over time with the User activity tab
  • Investigate insider risk alerts in Microsoft Defender XDR
  • Manage and take action on insider risk cases
  • Module assessment
  • Summary
Lesson 18: Implement Adaptive Protection in Insider Risk Management

  • Introduction
  • Adaptive Protection overview
  • Understand and configure risk levels in Adaptive Protection
  • Configure Adaptive Protection
  • Manage Adaptive Protection
  • Summary and knowledge check
Lesson 19: Discover AI interactions with Microsoft Purview

  • Introduction
  • Understand AI security risks
  • Microsoft Purview Data Security Posture Management (DSPM) for AI overview
  • Configure DSPM for AI
  • Review AI security reports
  • Audit Microsoft 365 Copilot activities and AI interactions with Microsoft Purview
  • Module assessment
  • Summary
Lesson 20: Protect sensitive data from AI-related risks

  • Introduction
  • Apply AI security recommendations with DSPM for AI
  • Use sensitivity labels to protect Microsoft 365 Copilot content
  • Use Endpoint DLP to prevent generative AI data exposure
  • Module assessment
  • Summary
Lesson 21: Govern AI usage with Microsoft Purview

  • Introduction
  • Apply retention policies to Microsoft 365 Copilot prompts and responses
  • Investigate and delete Copilot interactions with Microsoft Purview eDiscovery
  • Detect and manage Copilot and AI communications with Microsoft Purview
  • Module assessment
  • Summary
Lesson 22: Assess and mitigate AI risks with Microsoft Purview

  • Introduction
  • Use data assessments to detect oversharing risks
  • Detect risky AI usage with Insider Risk Management
  • Case study: Use Adaptive Protection to respond to AI-related risk
  • Module assessment
  • Summary
Lesson 23: Understand retention in Microsoft Purview

  • Introduction
  • Overview of retention and the data lifecycle
  • Understand retention labels and retention policies
  • Decide when to apply retention
  • Module assessment
  • Summary
Lesson 24: Implement and manage retention and recovery in Microsoft Purview

  • Introduction
  • Plan for retention and disposition with retention labels
  • Create and publish retention labels
  • Create and manage auto-apply retention labels
  • Create and configure adaptive scopes
  • Create and configure retention policies
  • Understand policy and label precedence in Microsoft Purview
  • Recover content in Microsoft 365 workloads
  • Module assessment
  • Summary

Course Fee (inclusive of 9% GST)

$3,052.00 *Funding not available
Course Prerequisite
You should be familiar with all Microsoft 365 services, PowerShell, Microsoft Entra, the Microsoft Defender portal, and Microsoft Defender for Cloud Apps.
Important Notes
Course Completion Requirements:
  1. Attended at least 75% of the course
  2. Declared as competent during the assessments
Who Should Attend?
As an Information Security Administrator, you plan and implement information security for sensitive data using Microsoft Purview and related services. You’re responsible for mitigating risks by protecting data within Microsoft 365 collaboration environments from internal and external threats, as well as safeguarding data used by AI services. Your role involves implementing information protection, data loss prevention (DLP), retention, and insider risk management. You also manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. In this role, you collaborate with other roles responsible for governance, data, and security to develop policies that address your organization’s information security and risk reduction goals. You work with workload administrators, business application owners, and governance stakeholders to implement technology solutions that support these policies and controls.

Why ITEL?

  • Diverse Range of IT Courses

    We offer a diverse range of IT courses tailored to student needs. Our curriculum covers foundational to advanced topics, ensuring comprehensive learning. We stay updated with industry trends to deliver relevant courses.

  • Skilled & Experienced Instructors

    We are proud to have a team of highly skilled and experienced instructors. Our instructors are industry professionals with in-depth knowledge and expertise across various IT domains.

  • Practical & Hands-on Exercises

    Our courses feature hands-on exercises, projects, and simulations to build practical skills. Students gain confidence by applying knowledge to real-world scenarios.

Course Enquiry for SC-401 Information Security Administrator

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
I want to find out more about:*
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cloud Technology Solutions Architect Associate (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Security Analysis and Penetration Testing (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Information Systems Security (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified: Azure Fundamentals (AZ-900) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Azure Network Engineer Associate (AZ-700) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Threat Intelligence Analyst (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Forensics Investigator (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Security Incident Handling and Response (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Advanced Certificate in Cyber Security Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Higher Certificate in Network Administration Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Strategic Cyber Security Leadership (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cisco Certified Network Associate (CCNA) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Course Listing Download Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Cisco Certified Network Associate Download Course Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List