Microsoft Purview Information Security Administrator Course
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.32 GB | Duration: 8h 6m
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.32 GB | Duration: 8h 6m
Learn how to expertly administer Microsoft Purview with hands on experience!
What you'll learn
Learn the concepts and perform hands on activities needed to master Microsoft Purview
Gain a tremendous amount of knowledge involving Microsoft Purview
Learn using hands on simulations on how Microsoft Purview is administered!
Learn how to set up your own test lab for practicing the concepts!
Requirements
Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more than the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the course!Understanding the Microsoft 365 and Azure EnvironmentA Solid Foundation of Active Directory DomainsA Solid Foundation of RAS, DMZ, and VirtualizationA Solid Foundation of the Microsoft Cloud ServicesDONT SKIP: Before beginning your account setupCreating a trial Microsoft 365/Azure AccountIMPORTANT Using Assignments in the courseQuestions for John ChristopherCertificate of CompletionUsing Data Classification and Sensitivity Label in Microsoft PurviewIntroducing the new Microsoft Purview portalUnderstanding requirements for sensitive informationConcepts of built-in or custom sensitive information requirementsCreating custom sensitive info typesDocument FingerprintingWorking with exact data match (EDM) classifiersUnderstanding trainable classifiersWorking with trainable classifiersUsing data explorer & content explorer for monitoring data classificationSensitive info types with optical character recognition (OCR)Understanding sensitivity labelsAdministering permissions for sensitivity labelsCreating sensitivity labelsSensitivity label protection settings and content markingPublishing sensitivity labels in Microsoft PurviewUsing auto-labeling policies for sensitivity labelsControlling sensitivity label to containersHow users can apply sensitivity labels manually using Microsoft WordConcepts of Microsoft Defender for Cloud AppsHow Microsoft Defender for Cloud Apps can apply sensitivity labelsUsing Microsoft Purview for information protection of clients and dataConcepts of the Microsoft Purview Information Protection ClientSetting up the Microsoft Purview Information Protection ClientUsing the Microsoft Purview Information Protection client to manage filesUnderstanding MS Purview Information Protection scanner bulk classificationsDeleting the Azure VM that is no longer neededUnderstanding the Microsoft 365 email Encryption solutionsMicrosoft Purview Message EncryptionMicrosoft Purview Advanced Message EncryptionUsing Data Loss Prevention with Microsoft PurviewUnderstanding data loss prevention policiesData loss prevention roles and permissionsCreating data loss prevention policiesUsing Adaptive Protection with data loss preventionData loss prevention policy and rule precedenceUsing Defender for Cloud apps to deploy DLP file policiesConcepts of Endpoint DLP device requirementsSettings used to manage Endpoint DLPManaging DLP policies using the advanced rulesWorking with just-in-time (JIT) protectionHow to monitor endpoint activitiesUsing and maintaining retention in Microsoft PurviewUnderstanding information retention and dispositionRetention Policies vs Retention Labels vs Retention Label PoliciesUsing adaptive scopesCreating retention labelsPublishing a retention label using a label policyUsing auto-apply labels for retentionUnderstanding policy precedence in regards to conflictsCreating retention policiesConcepts for recovering retained content in Microsoft 365Using Insider Risk Management in Microsoft PurviewUnderstanding Insider Risk Management in Microsoft 365Concepts of Insider Risk Management roles and permissionsUsing Insider Risk Management connectorsManaging Insider Risk Management settingsManaging the settings for policy indicatorsUnderstanding the concepts of policy templatesCreating Insider Risk Management policiesWorking with forensic evidence settingsManaging insider risk levels for Adaptive ProtectionInsider risk alerts and casesUsing notice templates within Insider Risk ManagementUsing alert monitoring and protecting data used by AI servicesUnderstanding the license concepts for Microsoft Purview Audit (Premium)\Looking into activities by using Microsoft Purview AuditWorking with audit retention policiesUsing activity explorer to analyze Microsoft Purview activitiesData loss prevention alerts in Microsoft PurviewViewing insider risk activitiesViewing Purview alerts in Microsoft Defender XDRWorking with file policy alerts using Defender for Cloud AppsPerforming content searchesUnderstanding controls for the AI services in Microsoft PurviewConcepts of Microsoft 365 workload controlsSetting up a Windows 11 VM for hands onSetting up the pre-requisites involving DSPM for AIAI policies with DSPMDSPM for AI activity monitoringDeleting the Windows 11 VM from the lab
Overview
Section 1: Introduction
Lecture 1 Understanding the Microsoft 365 and Azure Environment
Lecture 2 A Solid Foundation of Active Directory Domains
Lecture 3 A Solid Foundation of RAS, DMZ, and Virtualization
Lecture 4 A Solid Foundation of the Microsoft Cloud Services
Lecture 5 DONT SKIP: Before beginning your account setup
Lecture 6 Creating a trial Microsoft 365/Azure Account
Lecture 7 DON'T SKIP: Using Assignments in the course
Lecture 8 Questions for John Christopher
Lecture 9 Certificate of Completion
Section 2: Using Data Classification and Sensitivity Label in Microsoft Purview
Lecture 10 Introducing the new Microsoft Purview portal
Lecture 11 Understanding requirements for sensitive information
Lecture 12 Concepts of built-in or custom sensitive information requirements
Lecture 13 Creating custom sensitive info types
Lecture 14 Document Fingerprinting
Lecture 15 Working with exact data match (EDM) classifiers
Lecture 16 Understanding trainable classifiers
Lecture 17 Working with trainable classifiers
Lecture 18 Using data explorer & content explorer for monitoring data classification
Lecture 19 Sensitive info types with optical character recognition (OCR)
Lecture 20 Understanding sensitivity labels
Lecture 21 Administering permissions for sensitivity labels
Lecture 22 Creating sensitivity labels
Lecture 23 Sensitivity label protection settings and content marking
Lecture 24 Publishing sensitivity labels in Microsoft Purview
Lecture 25 Using auto-labeling policies for sensitivity labels
Lecture 26 Controlling sensitivity label to containers
Lecture 27 How users can apply sensitivity labels manually using Microsoft Word
Lecture 28 Concepts of Microsoft Defender for Cloud Apps
Lecture 29 How Microsoft Defender for Cloud Apps can apply sensitivity labels
Lecture 30 DONT SKIP: Redoing simulations in the course
Section 3: Using Microsoft Purview for information protection of clients and data
Lecture 31 Concepts of the Microsoft Purview Information Protection Client
Lecture 32 Setting up the Microsoft Purview Information Protection client
Lecture 33 Using the Microsoft Purview Information Protection client to manage files
Lecture 34 Understanding MS Purview Information Protection scanner bulk classifications
Lecture 35 Deleting the Azure VM that is no longer needed
Lecture 36 Understanding the Microsoft 365 email Encryption solutions
Lecture 37 Microsoft Purview Message Encryption
Lecture 38 Microsoft Purview Advanced Message Encryption
Section 4: Using Data Loss Prevention (DLP) with Microsoft Purview
Lecture 39 Understanding data loss prevention policies
Lecture 40 Data loss prevention roles and permissions
Lecture 41 Creating data loss prevention policies
Lecture 42 Using Adaptive Protection with data loss prevention
Lecture 43 Data loss prevention policy and rule precedence
Lecture 44 Using Defender for Cloud apps to deploy DLP file policies
Lecture 45 Concepts of Endpoint DLP device requirements
Lecture 46 Settings used to manage Endpoint DLP
Lecture 47 Managing DLP policies using the advanced rules
Lecture 48 Working with just-in-time (JIT) protection
Lecture 49 How to monitor endpoint activities
Section 5: Using and maintaining retention in Microsoft Purview
Lecture 50 Understanding information retention and disposition
Lecture 51 Retention Policies vs Retention Labels vs Retention Label Policies
Lecture 52 Using adaptive scopes
Lecture 53 Creating retention labels
Lecture 54 Publishing a retention label using a label policy
Lecture 55 Using auto-apply labels for retention
Lecture 56 Understanding policy precedence in regards to conflicts
Lecture 57 Creating retention policies
Lecture 58 Concepts for recovering retained content in Microsoft 365
Section 6: Using Insider Risk Management in Microsoft Purview
Lecture 59 Understanding Insider Risk Management in Microsoft 365
Lecture 60 Concepts of Insider Risk Management roles and permissions
Lecture 61 Using Insider Risk Management connectors
Lecture 62 Managing Insider Risk Management settings
Lecture 63 Managing the settings for policy indicators
Lecture 64 Understanding the concepts of policy templates
Lecture 65 Creating Insider Risk Management policies
Lecture 66 Working with forensic evidence settings
Lecture 67 Managing insider risk levels for Adaptive Protection
Lecture 68 Insider risk alerts and cases
Lecture 69 Using notice templates within Insider Risk Management
Section 7: Using alert monitoring and protecting data used by AI services
Lecture 70 Understanding the license concepts for Microsoft Purview Audit (Premium)
Lecture 71 Looking into activities by using Microsoft Purview Audit
Lecture 72 Working with audit retention policies
Lecture 73 Using activity explorer to analyze Microsoft Purview activities
Lecture 74 Data loss prevention alerts in Microsoft Purview
Lecture 75 Viewing insider risk activities
Lecture 76 Viewing Purview alerts in Microsoft Defender XDR
Lecture 77 Working with file policy alerts using Defender for Cloud Apps
Lecture 78 Performing content searches
Lecture 79 Understanding controls for the AI services in Microsoft Purview
Lecture 80 Concepts of Microsoft 365 workload controls
Lecture 81 Setting up a Windows 11 VM for hands on
Lecture 82 Setting up the pre-requisites involving DSPM for AI
Lecture 83 AI policies with DSPM
Lecture 84 DSPM for AI activity monitoring
Lecture 85 Deleting the Windows 11 VM from the lab
Lecture 86 Getting your Udemy certificate for this course
IT people interested in learning a tremendous amount about Microsoft Purview