1. Intro - Microsoft 365 Certified Security Administrator Associate (MS-500) CBT Nuggets
2. Azure AD Authentication Options
3. Monitoring Azure AD Connect
4. Troubleshooting Azure AD Connect
5. Implementing Azure AD Group Membership
6. Implementing Password Management
7. Implementing MFA Using Conditional Access Policies
8. Managing And Monitoring MFA
9. Passwordless Authentication
10. Conditional Access Policies
11. Application Based Conditional Access Policies
12. Configuring Access Management
13. Configuring Cloud Application Security
14. What Is Role Based Access
15. Configuring Roles And Role Groups
16. Implement Azure AD Group Membership
17. Auditing Roles For Least Privileged Access
18. Introduction To Azure AD Identity Protection
19. User Risk Policies
20. Implementing Sign-in Risk Policies - Microsoft 365 Certified Security Administrator Associate (MS-500) CBT Nuggets
21. Risk Alerts And Detection
22. Configuring Identity Synchronization
23. Microsoft Defender For EndPoint
24. Microsoft Defender For Identity Solutions
25. Integrating Microsoft Defender With Endpoint Manager
26. Attack Surface Reduction
27. EndPoint Security Controls
28. Disk Encryption And Firewall Policies
29. Creating Security Baselines
30. Introduction To Device And Application Protection
31. Configuring Microsoft Defender Application Guard
32. Managing Exploit Protection
33. Device Encryption
34. Windows Information Protection
35. Verifying WIP Policy
36. Configuring Microsoft Sentinel And Defender For Office 365
37. Getting Started With Microsoft Sentinel
38. Managing And Monitoring With Microsoft Sentinel
39. Creating Office 365 Security Policies
40. Using KQL to Analyze Sign in Activities
41. Conducting Simulated Attacks
42. What Is A Sensitivity Label
43. Managing Sensitive Information Types
44. Configuring Sensitivity Label Policies
45. Sensitivity Labels Teams, SharePoint ,OneDrive and Office Apps.
46. Using The Activity Explorer
47. Working With DLP
48. Creating DLP Policies In Microsoft 365
49. DLP Full Functionality Test
50. Implementing Endpoint DLP
51. Microsoft Defender For Cloud Apps
52. Configuring Mass Download Monitoring Policy
53. Review And Interpret Cloud App Alerts
54. Connecting Cloud Apps to Microsoft Defender.
55. Log and Snapshot Reports
56. Configuring Data Retention Labels
57. Data Classification
58. Creating Retention Policies
59. Setting Up A Litigation Hold
60. Records Management
61. Microsoft 365 Retention Policies
62. Planning Compliance Solutions
63. Creating Compliance Assessments
64. Communication Compliance Policies
65. Creating Data Loss Prevention Policies
66. Creating DSR Cases for GDPR Compliance
67. Service Assurance
68. Introduction to Insider Risk Solutions In Microsoft 365
69. Managing Customer Lockbox
70. Implementing Customer Lockbox
71. Managing Communication Compliance
72. Verifying Communication Compliance
73. Implementing Insider Risk Management Policies
74. Creating An Insider Risk Policy
75. Implementing Information Barrier Policies
76. Working With eDiscovery
77. Using eDiscovery Content Search
78. Deleting Malicious Emails
79. Creating Audit Retention Policies
80. Usage Reports
81. Insider Risk Management