- Published 4/30/2026
- 2nd Edition
- Book 978-0-13-559078-2
- eBook 978-0-13-559259-5
This video course will provide appropriate instruction and walk-throughs to provide M365 admins, system admins and security professionals to be able to administer Information Security in Microsoft 365.
This video series will provide comprehensive instruction on how to design and implement enterprise-grade information protection, data governance, and risk management strategies using Microsoft Purview and related Microsoft 365 security tools. It will guide learners through the practical application of Microsofts security and compliance capabilities, including data classification, sensitivity labelling, data loss prevention, insider risk management, and audit monitoring.
Skill Level:
Learn How To:
- Design and implement data classification and sensitive information types
- Apply information protection across devices, services, and cloud environments
- Develop and enforce data loss prevention (DLP) strategies
- Configure and monitor Endpoint DLP for device-level protection
- Plan and manage data retention and lifecycle policies
- Implement Insider Risk Management policies and workflows
- Monitor and investigate security activities using Microsoft Purview and Defender
- Secure data in environments that use AI through DSPM and Microsoft 365 controls.
Course requirement:
Individuals should have subject matter expertise in:
Additionally, individuals should have knowledge and experience with:
- PowerShell
- Microsoft Entra
- The Microsoft Defender suite
Who Should Take This Course:
- Cybersecurity professionals responsible for designing and evolving enterprise security strategies
- IT professionals working with Microsoft 365 and Azure security solutions who want to deepen their expertise in information protection and compliance
- Security engineers and administrators aiming to validate their skills through the SC-401 Microsoft Cybersecurity Architect certification
- Consultants and solution architects who design secure Microsoft cloud environments for clients or internal stakeholders
- Individuals preparing for advanced Microsoft security certifications to enhance their career in cloud security architecture
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
Table of Contents
Introduction
Module 1: Implement Information Protection
Lesson 1: Implement and Manage Data Classification
1.1 Identify sensitive information requirements for an organizations data
1.2 Translate requirements into built-in or custom sensitive info types
1.3 Create and manage custom sensitive info types
1.4 Implement document fingerprinting
1.5 Create and manage exact data match (EDM) classifiers
1.6 Create and manage trainable classifiers
1.7 Monitor classification with data explorer and content explorer
1.8 Configure optical character recognition (OCR) support for sensitive info types
Lesson 2: Implement and Manage Sensitivity Labels in Microsoft Purview
2.1 Implement roles and permissions for sensitivity labels
2.2 Define and create sensitivity labels for items and containers
2.3 Configure protection settings and content marking for sensitivity labels
2.4 Configure and manage publishing policies for sensitivity labels
2.5 Configure and manage auto-labeling policies for sensitivity labels
2.6 Apply sensitivity labels to containers, such as Microsoft Teams, Microsoft 365 Groups, Microsoft Power BI, and Microsoft SharePoint
2.7 Apply sensitivity labels by using Defender for Cloud Apps
Lesson 3: Implement Information Protection for Windows, File Shares, and Exchange
3.1 Implement protection for Windows, file shares, and Exchange
3.2 Plan and implement the Purview Information Protection client
3.3 Manage files using the Purview client
3.4 Apply bulk classification to on-premises data by using the Microsoft Purview Information Protection scanner
3.5 Design and implement Microsoft Purview Message Encryption
3.6 Design and implement Microsoft Purview Advanced Message Encryption
Module 2: Implement Data Loss Prevention and Retention
Lesson 4: Create and Configure Data Loss Prevention (DLP) Policies
4.1 Design DLP policies based on an organizations requirements
4.2 Implement roles and permissions for DLP
4.3 Create and manage DLP policies
4.4 Configure DLP policies for Adaptive Protection
4.5 Interpret policy and rule precedence in DLP
4.6 Create file policies in Microsoft Defender for Cloud Apps by using a DLP policy
Lesson 5: Implement and Monitor Microsoft Purview Endpoint DLP
5.1 Specify device requirements for Endpoint DLP, including extensions
5.2 Configure advanced DLP rules for devices in DLP policies
5.3 Configure Endpoint DLP settings
5.4 Configure just-in-time protection
5.5 Monitor endpoint activities
Lesson 6: Implement and Manage Retention
6.1 Plan for information retention and disposition by using retention labels
6.2 Create, configure, and manage adaptive scopes
6.3 Create retention labels for data lifecycle management
6.4 Configure retention label policies (publish/auto-apply)
6.5 Interpret the results of policy precedence, including using Policy lookup
6.6 Create and configure retention policies
6.7 Recover retained content in Microsoft 365
Module 3: Manage Risks, Alerts, and Activities
Lesson 7: Implement and Manage Microsoft Purview Insider Risk Management
7.1 Implement roles and permissions for Insider Risk Management
7.2 Plan and implement Insider Risk Management connectors
7.3 Plan and implement integration with Microsoft Defender for Endpoint
7.4 Configure and manage Insider Risk Management settings
7.5 Configure policy indicators
7.6 Select an appropriate policy template
7.7 Create and manage Insider Risk Management policies
7.8 Manage forensic evidence settings
7.9 Enable and configure insider risk levels for Adaptive Protection
7.10 Manage insider risk alerts and cases
7.11 Manage Insider Risk Management workflow, including notice templates
Lesson 8: Manage Information Security Alerts and Activities
8.1 Assign Microsoft Purview Audit (Premium) user licenses
8.2 Investigate activities by using Microsoft Purview Audit
8.3 Configure audit retention policies
8.4 Analyze Purview activities by using activity explorer
8.5 Respond to data loss prevention alerts in the Microsoft Purview portal
8.6 Investigate insider risk activities by using the Microsoft Purview portal
8.7 Respond to Purview alerts in Microsoft Defender XDR
8.8 Respond to Defender for Cloud Apps file policy alerts
8.9 Perform searches by using Content search
Lesson 9: Protect Data Used by AI Services
9.1 Implement controls in Microsoft Purview to protect content in an environment that uses AI services
9.2 Implement controls in Microsoft 365 workloads to protect content in an environment that uses AI services
9.3 Implement prerequisites for Data Security Posture Management (DSPM) for AI
9.4 Manage roles and permissions for DSPM for AI
9.5 Configure DSPM for AI policies
9.6 Monitor activities in DSPM for AI