- Module 1: Protect sensitive data in a digital world.
After completing this module, you'll be able to:
- Describe challenges in protecting sensitive data across cloud and AI environments.
- Explain how Microsoft Purview enables data classification, labeling, and protection.
- Identify how data loss prevention (DLP) prevents unauthorized data sharing.
- Understand how Insider Risk Management helps detect potential threats.
- Explore security monitoring tools for detecting and responding to data risks.
- Module 2: Learn about the information available to help you understand your data landscape and know your data.
Upon completion of this module, you should be able to:
- List the components of the Data Classification solution.
- Identify the cards available on the Data Classification overview tab.
- Explain the Content explorer and Activity explorer.
- Describe how to use sensitive information types and trainable classifiers.
- Module 3: Review and analyze data classification and protection.
After completing this module, you'll be able to:
- Interpret Information Protection Reports to assess classification and protection trends.
- Investigate labeled content using Data explorer and Content explorer to identify classification patterns.
- Analyze user activity in Activity explorer to detect policy violations and potential security risks.
- Use Microsoft Purview tools to improve data security, maintain compliance, and refine protection strategies.
- Module 4: Create and manage sensitive information types.
After completing this module, you'll be able to:
- Recognize the difference between built-in and custom sensitivity labels.
- Configure sensitive information types with exact data match-based classification.
- Implement document fingerprinting.
- Create custom keyword dictionaries.
- Module 5: Microsoft Purview sensitivity labels enable you to classify and protect sensitive data throughout your organization, including in the cloud and on devices. This module covers how to classify and protect sensitive information to ensure its security and compliance.
Upon completion of this module, you should be able to:
- Understand the basics of Microsoft Purview sensitivity labels in Microsoft 365.
- Create and publish sensitivity labels to classify and safeguard data.
- Configure encryption settings with sensitivity labels for improved data security.
- Implement auto-labeling for consistent data classification and protection.
- Use the Microsoft Purview data classification dashboard to monitor sensitivity label usage.
- Module 6: Apply sensitivity labels for data protection.
After completing this module, you'll be able to:
- Understand the foundations of sensitivity label integration in Microsoft 365.
- Manage sensitivity label use in Office apps for security compliance.
- Secure Outlook and Teams meetings with sensitivity labels.
- Apply labels to Microsoft 365 Groups, SharePoint, and OneDrive for data protection.
- Module 7: Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
Upon completion of this module, you should be able to:
- Explain how encryption mitigates the risk of unauthorized data disclosure.
- Describe Microsoft data-at-rest and data-in-transit encryption solutions.
- Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
- Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
- Module 8: Deploy Microsoft Purview Message Encryption
After completing this module, you will be able to:
- Configure Microsoft Purview Message Encryption for end users
- Implement Microsoft Purview Advanced Message Encryption
Overview
Syllabus
- Module 1: Module 1: Protect sensitive data in a digital world
- Introduction
- The growing need for data protection
- The challenges of managing sensitive data
- Protect data in a Zero Trust world
- Understand data classification and protection
- Prevent data leaks and insider threats
- Manage security alerts and respond to threats
- Protect AI-generated and AI-processed data
- Knowledge check
- Summary
- Module 2: Module 2: Classify data for protection and governance
- Introduction
- Data classification overview
- Classify data using sensitive information types
- Classify data using trainable classifiers
- Create a custom trainable classifier
- Review sensitive information and label usage
- Explore labeled and sensitive content
- Understand activities related to your data
- Knowledge check
- Summary
- Module 3: Module 3: Review and analyze data classification and protection
- Introduction
- Review classification and protection insights
- Analyze classified data with data and content explorer
- Monitor and review actions on labeled data
- Knowledge check
- Summary
- Module 4: Module 4: Create and manage sensitive information types
- Introduction
- Sensitive information type overview
- Compare built-in versus custom sensitive information types
- Create and manage custom sensitive information types
- Create and manage exact data match sensitive info types
- Implement document fingerprinting
- Describe named entities
- Create a keyword dictionary
- Knowledge check
- Summary and resources
- Module 5: Module 5: Create and configure sensitivity labels with Microsoft Purview
- Introduction
- Sensitivity label overview
- Create and configure sensitivity labels and label policies
- Configure encryption with sensitivity labels
- Implement auto-labeling policies
- Use the data classification dashboard to monitor sensitivity labels
- Knowledge check
- Summary
- Module 6: Module 6: Apply sensitivity labels for data protection
- Introduction
- Foundations of sensitivity label integration in Microsoft 365
- Manage sensitivity labels in Office apps
- Apply sensitivity labels with Microsoft 365 Copilot for secure collaboration
- Protect meetings with sensitivity labels
- Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
- Knowledge check
- Summary and resources
- Module 7: Module 7: Understand Microsoft 365 encryption
- Introduction to Microsoft 365 encryption
- Learn how Microsoft 365 data is encrypted at rest
- Understand service encryption in Microsoft Purview
- Explore customer key management using Customer Key
- Learn how data is encrypted in-transit
- Summary and knowledge check
- Module 8: Module 8: Deploy Microsoft Purview Message Encryption
- Introduction
- Implement Microsoft Purview Message Encryption
- Implement Microsoft Purview Advanced Message Encryption
- Use Microsoft Purview Message Encryption templates in mail flow rules
- Knowledge check
- Summary and resources