• Blog
  • Reviews
  • Contact Us
  • Locations
1-844-BOOTCAMP
or 1-941-218-0007
Certification Camps
  • BOOTCAMPS
    • Microsoft MCE Combo Classes
      • MCA/MCE Azure Administrator & Architect
      • MCA/MCE Azure Developer & DevOps Engineer
      • MCA/MCE MS 365 Endpoint & Admin Expert
      • MCA/MCE MS SecOps & Cyber Security Architect
      • MCA/MCE Power Platform Consult & Architect
    • Microsoft 365 Enterprise
      • MCE Microsoft 365 Administrator Expert
      • MCA Microsoft 365 Endpoint Administrator
      • MCA Microsoft 365 Teams Administrator
    • Microsoft Azure Admin
      • MCE Azure Solutions Architect
      • MCE Azure DevOps Engineer
      • MCA Azure Administrator
      • MCA Azure Network Engineer
      • MCA Azure Security Engineer
      • MCA Windows Server Hybrid Administrator
      • Microsoft Windows PowerShell
    • Microsoft Azure AI
      • MCA Microsoft Azure AI Engineer
    • Microsoft Azure Data
      • MCA Azure Database Administrator
      • MCA Azure Data Analyst Power BI
      • MCA Azure Data Scientist
      • MCA Microsoft Fabric Analytics & Data Engineer
    • Microsoft Developer
      • MCE Azure DevOps Engineer
      • MCA Azure Developer
      • MCA Power Platform Developer
    • Microsoft Power Platform
      • MCE Microsoft Power Platform Architect
      • MCA Power Platform Developer
      • MCA Power BI Data Analyst
    • Microsoft Security
      • MCE Cyber Security Architect Expert
      • MCA Identity & Access + Information Protection
      • MCA Azure Security Engineer
    • Amazon Web Services
      • AWS Cloud Prac Solutions & Architect Associate
      • AWS Certified Solutions Architect Associate & Professional
    • CompTia
      • CompTia A+ Essentials
      • CompTIA Cloud+
      • CompTIA CySA+ (Cyber Security Analyst+)
      • CompTia Network+
      • CompTia Security+
    • Information Security
      • (ISC)² CISSP
    • Cisco
      • Cisco CCNA
  • Find Training
    • Training By Job Role
      • Administrator
      • AI Engineer
      • Architect
      • Data Analyst
      • Data Engineer
      • Data Scientist
      • Developer
      • DevOps Engineer
      • Security
      • Solutions Architect
    • Vendors
      • Microsoft
      • Amazon
      • Cisco
      • CompTIA
      • Ec-Council
    • Microsoft Technical
      • Azure Admin
      • Azure AI
      • Azure Data
      • EndPoint Admin
      • Microsoft 365
      • Messaging
      • Power Platform
      • Security
      • Windows Server
    • Click here to find your course
  • Role Based Certifications
  • Pay an Invoice
MCE Microsoft 365 Administrator Expert (w/ MCA Microsoft 365  Endpoint Administrator) ACCELERATED COMBO Training & Certification Boot Camp – 6 Days (2 Courses, 2 Exams, 2 Certs)
Exam Pass Guarantee
ADMINISTRATOR BOOTCAMP

Microsoft 365 Certified Enterprise Administrator Expert Training

Transform Your Career In 6 days
The Microsoft Official Boot Camp provides the training and exams for Microsoft 365 Endpoint Administrator Associate and the MCE Microsoft 365 Administrator Expert. This is a complete end-to-end training for those who administer Microsoft 365 environments on both client and Active Directory sides.
View Pricing Download Course Details
Course Essentials

Administrator Training At a Glance

MCE Microsoft 365 Administrator Expert (w/ MCA Microsoft 365 Endpoint Administrator) ACCELERATED COMBO Training & Certification Boot Camp – 6 Days (2 Courses, 2 Exams, 2 Certs)
Delivery Options
Classroom Live
Remote Classroom Live
Duration 6 days
Exams MD-102 Endpoint Administrator MS-102 Microsoft 365 Administrator
Certifications Microsoft 365 Endpoint Administrator Associate Microsoft 365 Administrator Expert
Vouchers Test & One Retake Voucher Per Exam (if needed)
Certification Badge
What's Included

Everything You Need To Succeed

  • 2 Microsoft Official Courses
  • 2 Microsoft Test Vouchers
  • 1 Retake Voucher (per exam, if needed)
  • Microsoft Official Labs
  • Onsite Pearson Vue Test Center
  • Instructor Led Live Training
Boot Camp Pricing

Training Schedule and Cost

Our training model blends knowledge and certification prep into one solution. You can interact face-to-face with vendor-certified trainers at our training facilities or attend the same instructor-led live camp online.

Select Delivery Format:
Classroom Live
Remote Classroom Live
Check Box To Include:
  • Jun
    23
    2025
    Delivery Format:
    CLASSROOM LIVE
    Date:
    06.23.2025 - 06.28.2025
    Location:
    SARASOTA, FL
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $4,995
    6 days
    Enroll Generate a Quote Ask a Question
  • Jul
    28
    2025
    Delivery Format:
    CLASSROOM LIVE
    Date:
    07.28.2025 - 08.02.2025
    Location:
    SARASOTA, FL
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $4,995
    6 days
    Enroll Generate a Quote Ask a Question
  • Aug
    25
    2025
    Delivery Format:
    CLASSROOM LIVE
    Date:
    08.25.2025 - 08.30.2025
    Location:
    SARASOTA, FL
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $4,995
    6 days
    Enroll Generate a Quote Ask a Question
  • [View Entire Schedule]
  • Sep
    29
    2025
    Delivery Format:
    CLASSROOM LIVE
    Date:
    09.29.2025 - 10.04.2025
    Location:
    SARASOTA, FL
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $4,995
    6 days
    Enroll Generate a Quote Ask a Question
  • Oct
    27
    2025
    Delivery Format:
    CLASSROOM LIVE
    Date:
    10.27.2025 - 11.01.2025
    Location:
    SARASOTA, FL
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $4,995
    6 days
    Enroll Generate a Quote Ask a Question
  • Nov
    17
    2025
    Delivery Format:
    CLASSROOM LIVE
    Date:
    11.17.2025 - 11.22.2025
    Location:
    SARASOTA, FL
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $4,995
    6 days
    Enroll Generate a Quote Ask a Question
Syllabus

Course Description

This Microsoft Official Boot Camp is an end-to-end training and certification program for Microsoft 365 Endpoint Administrator Associate and Microsoft 365 Administrator Expert. The MCE certification requires the MCA prerequisite. Certification Camps exclusively offers this 6 day Microsoft Official Accelerated Combo Boot Camp where students advance their skills and test to achieve certification while attending.

Student learn how to deploy, configure, protect, manage, monitor services, devices and client applications in a Microsoft 365 environment. They manage identity, security, access, policies, updates, and apps for endpoints. They implement and manage endpoints using Microsoft Intune, Windows 365, Windows Autopilot, Microsoft Defender for Endpoint, and Azure Active Directory (Azure AD), part of Microsoft Entra.

The Microsoft 365 Certified MCA/MCE combo boot camp is taught using TWO Microsoft Official Courseware Courses - 

MD-102T00: Microsoft 365 Endpoint Administrator
MS-102T00: Microsoft 365 Administrator Essentials

While attending this 6 day camp - students take two exams MD-102 Endpoint Administrator and MS-102 Microsoft 365 Administrator to achieve the Microsoft MCA & MCE Official Certifications.

MCE Microsoft 365 Administrator Expert (w/ MCA Microsoft 365  Endpoint Administrator) ACCELERATED COMBO Training & Certification Boot Camp – 6 Days (2 Courses, 2 Exams, 2 Certs)
  • Topics Covered
  • Microsoft Solutions Partner
  • Facilities

Topics Covered in this Official Boot Camp

Explore the Enterprise DesktopExplore Windows EditionsUnderstand Microsoft Entra IDManage Microsoft Entra identitiesManage device authenticationEnroll devices using Microsoft Configuration ManagerEnroll devices using Microsoft IntuneExecute, oversee, maintain device profilesExecute mobile application managementDeploy and update applicationsAdminister endpoint applicationsProtect identities in Microsoft Entra IDEnable organizational accessImplement device complianceGenerate inventory and compliance reportsDeploy device data protectionManage Microsoft Defender for Endpoint, Windows Client & Cloud AppsAssess deployment readinessDeploy using the Microsoft Deployment Toolkit, Configuration Manager & Windows AutopilotImplement dynamic deployment methodsPlan a transition to modern endpoint managementManage Windows 365 & Azure Virtual DesktopConfigure your MIcrosoft 365 experienceManage users, licenses, guests, and contacts in Microsoft 365Manage groups in Microsoft 365Add a custom domain in Microsoft 365Configure client connectivity to Microsoft 365Configure administrative roles in Microsoft 365Manage tenant health and services in Microsoft 365Deploy Microsoft 365 Apps for enterpriseAnalyze your Microsoft 365 workplace data using Microsoft Viva InsightsExplore identity synchronizationPrepare for identity synchronization to Microsoft 365 1100 XP Implement directory synchronization toolsManage synchronized identitiesManage secure user access in Microsoft 365Explore security solutions in Microsoft Defender XDRExamine Microsoft Secure ScoreExamine Privileged Identity Management in Microsoft Entra IDExamine Microsoft Entra ID ProtectionEnhance your email protection using Microsoft Defender for Office 365Manage Safe AttachmentsManage Safe LinksExplore threat intelligence in Microsoft Defender XDRImplement app protection by using Microsoft Defender for Cloud AppsImplement endpoint protection by using Microsoft Defender for EndpointImplement threat protection by using Microsoft Defender for Office 365Examine data governance solutions in Microsoft PurviewExplore data management practices in Microsoft 365Explore retention in Microsoft 365Explore compliance in Microsoft 365Implement Microsoft Purview Insider Risk ManagementImplement Microsoft Purview Information BarriersExplore Microsoft Purview Data Loss PreventionImplement Microsoft Purview Data Loss PreventionImplement data classification of sensitive informationExplore sensitivity labelsImplement sensitivity labels
Explore the Enterprise Desktop

Explore the Enterprise Desktop

Describe the benefits of Modern Management.
Explain the enterprise desktop life-cycle model.
Describe considerations for planning hardware strategies.
Describe considerations for post-deployment and retirement.

Examine the enterprise desktop life-cycle model
Examine planning and purchasing
Examine desktop deployment
Plan an application deployment
Plan for upgrades and retirement

Explore Windows Editions

Explore Windows Editions

Explain the differences between the different editions of Windows.
Select the most suitable Windows device for your needs.
Describe the minimum recommended hardware requirements for installing Windows 11

Examine Windows client editions and capabilities
Select client edition
Examine hardware requirements

Understand Microsoft Entra ID

Understand Microsoft Entra ID

Describe Microsoft Entra ID.
Compare Microsoft Entra ID to Active Directory Domain Services (AD DS).
Describe how Microsoft Entra ID is used as a directory for cloud apps.
Describe Microsoft Entra ID P1 and P2.
Describe Microsoft Entra Domain Services.

Examine Microsoft Entra ID
Compare Microsoft Entra ID and Active Directory Domain Services
Examine Microsoft Entra ID as a directory service for cloud apps
Compare Microsoft Entra ID P1 and P2 plans
Examine Microsoft Entra Domain Services

Manage Microsoft Entra identities

Manage Microsoft Entra identities

Describe RBAC and user roles in Microsoft Entra ID.
Create and manage users in Microsoft Entra ID.
Create and manage groups in Microsoft Entra ID.
Use Windows PowerShell cmdlets to manage Microsoft Entra ID.
Describe how you can synchronize objects from AD DS to Microsoft Entra ID.

Examine RBAC and user roles in Microsoft Entra ID
Create and manage users in Microsoft Entra ID
Create and manage groups in Microsoft Entra ID
Manage Microsoft Entra objects with Microsoft Graph PowerShell
Synchronize objects from AD DS to Microsoft Entra ID

Manage device authentication

Manage device authentication

Describe Microsoft Entra join.
Describe Microsoft Entra join prerequisites, limitations, and benefits.
Join device to Microsoft Entra ID.
Manage devices joined to Microsoft Entra ID.

Describe Microsoft Entra join
Examine Microsoft Entra join prerequisites limitations and benefits
Join devices to Microsoft Entra ID
Manage devices joined to Microsoft Entra ID

Enroll devices using Microsoft Configuration Manager

Enroll devices using Microsoft Configuration Manager

Describe Microsoft Endpoint Manager.
Understand the advantages of managing a client with Configuration Manager.
Deploy the Configuration Manager client.
Monitor the Configuration Manager client.
Manage Configuration Manager devices.

Deploy the Microsoft Configuration Manager client
Monitor the Microsoft Configuration Manager client
Manage the Microsoft Configuration Manager client

Enroll devices using Microsoft Intune

Enroll devices using Microsoft Intune

Prepare Microsoft Intune for device enrollment.
Configure Microsoft Intune for automatic enrollment.
Explain how to enroll Windows, Android, and iOS devices in Intune.
Explain when and how to use Intune Enrollment Manager.
Understand how to monitor and perform remote actions on enrolled devices.

Manage mobile devices with Intune
Enable mobile device management
Explain considerations for device enrollment
Manage corporate enrollment policy
Enroll Windows devices in Intune
Enroll Android devices in Intune
Enroll iOS devices in Intune
Explore device enrollment manager
Monitor device enrollment
Manage devices remotely

Execute, oversee, maintain device profiles

Execute, oversee, maintain device profiles

Describe the various types of device profiles in Intune.
Explain the difference between built-in and custom profiles.
Create and manage profiles.

Explore Intune device profiles
Create device profiles
Create a custom device profile

Monitor device profiles in Intune
Manage device sync in Intune
Manage devices in Intune using scripts

Examine user profile
Explore user profile types
Examine options for minimizing user profile size
Deploy and configure folder redirection
Sync user state with Enterprise State Roaming
Configure Enterprise State Roaming in Azure

Execute mobile application management

Execute mobile application management

Explain Mobile Application Management.
Understand application considerations in MAM.
Explain how to use Configuration Manager for MAM.
Use Intune for MAM.
Implement and manage MAM policies.

Examine mobile application management
Examine considerations for mobile application management
Prepare line-of-business apps for app protection policies
Implement mobile application management policies in Intune
Manage mobile application management policies in Intune

Deploy and update applications

Deploy and update applications

Explain how to deploy applications using Intune and Configuration Manager.
Learn how to deploy applications using Group Policy.
Understand Microsoft Store Apps.
Learn how to deploy apps using Microsoft Store Apps.
Learn how to configure Microsoft Store Apps.

Deploy applications with Intune
Add apps to Intune
Manage Win32 apps with Intune
Deploy applications with Configuration Manager
Deploying applications with Group Policy
Assign and publish software
Explore Microsoft Store for Business
Implement Microsoft Store Apps
Update Microsoft Store Apps with Intune
Assign apps to company employees

Administer endpoint applications

Administer endpoint applications

Explain how to manage apps in Intune.
Understand how to manage apps on nonenrolled devices.
Understand how to deploy Microsoft 365 Apps using Intune.
Learn how to configure and manage IE mode in Microsoft Edge.
Learn about app inventory options in Intune.

Manage apps with Intune
Manage Apps on non-enrolled devices
Deploy Microsoft 365 Apps with Intune
Additional Microsoft 365 Apps Deployment Tools
Configure Microsoft Edge Internet Explorer mode
App Inventory Review

Protect identities in Microsoft Entra ID

Protect identities in Microsoft Entra ID

Describe Windows Hello for Business
Describe Windows Hello deployment and management
Describe Microsoft Entra ID Protection
Describe and manage self-service password reset in Microsoft Entra ID
Describe and manage multi-factor authentication

Explore Windows Hello for Business
Deploy Windows Hello
Manage Windows Hello for Business
Explore Microsoft Entra ID Protection
Manage self-service password reset in Microsoft Entra ID
Implement multi-factor authentication

Enable organizational access

Enable organizational access

Describe how you can access corporate resources
Describe VPN types and configuration
Describe Always On VPN
Describe how to configure Always On VPN

Enable access to organization resources
Explore VPN types and configuration
Explore Always On VPN
Deploy Always On VPN

Implement device compliance

Implement device compliance

Describe device compliance policy
Deploy a device compliance policy
Describe conditional access
Create conditional access policies

Protect access to resources using Intune
Explore device compliance policy
Deploy a device compliance policy
Explore conditional access
Create conditional access policies

Generate inventory and compliance reports

Generate inventory and compliance reports

Generate inventory reports and Compliance reports using Microsoft Intune
Report and monitor device compliance
Create custom reports using the Intune Data Warehouse
Use the Microsoft Graph API for building custom reports

Report enrolled devices inventory in Intune
Monitor and report device compliance
Build custom Intune inventory reports
Access Intune using Microsoft Graph API

Deploy device data protection

Deploy device data protection

Describe Windows Information Protection
Plan for Windows Information Protection usage
Implement and use Windows Information Protection
Describe the Encrypting File System (EFS)
Describe BitLocker

Explore Windows Information Protection
Plan Windows Information Protection
Implement and use Windows Information Protection
Explore Encrypting File System in Windows client
Explore BitLocker

Manage Microsoft Defender for Endpoint, Windows Client & Cloud Apps

Manage Microsoft Defender for Endpoint, Windows Client & Cloud Apps

Describe Microsoft Defender for Endpoint.
Describe key capabilities of Microsoft Defender for Endpoint.
Describe Microsoft Defender Application Guard.
Describe Microsoft Defender Exploit Guard.
Describe Windows Defender System Guard.

Explore Microsoft Defender for Endpoint
Examine key capabilities of Microsoft Defender for Endpoint
Explore Windows Defender Application Control and Device Guard
Explore Microsoft Defender Application Guard
Examine Windows Defender Exploit Guard
Explore Windows Defender System Guard

Explore Windows Security Center
Explore Windows Defender Credential Guard
Manage Microsoft Defender Antivirus
Manage Windows Defender Firewall
Explore Windows Defender Firewall with Advanced Security

Explore Microsoft Defender for Cloud Apps
Planning Microsoft Defender for Cloud Apps
Implement Microsoft Defender for Cloud Apps

Assess deployment readiness

Assess deployment readiness

Describe the guidelines for an effective enterprise desktop deployment.
Explain how to assess the current environment.
Describe the tools that you can use to assess your current environment.
Describe the methods of identifying and mitigating application compatibility issues.
Explain considerations for planning a phased rollout.

Examine deployment guidelines
Explore readiness tools
Assess application compatibility
Explore tools for application compatibility mitigation
Prepare network and directory for deployment
Plan a pilot

Deploy using the Microsoft Deployment Toolkit, Configuration Manager & Windows Autopilot

Deploy using the Microsoft Deployment Toolkit, Configuration Manager & Windows Autopilot

Describe the fundamentals of using images in traditional deployment methods.
Describe the key benefits, limitations, and decisions when planning a deployment of – Windows using Microsoft Deployment Toolkit (MDT).
Describe how Configuration Manager builds upon MDT and how both can work in harmony.
Explain the different options and considerations when choosing the user interaction experience during deployment, and which methods and tools support these experiences.

Evaluate traditional deployment methods
Set up the Microsoft Deployment Toolkit for client deployment
Manage and deploy images using the Microsoft Deployment Toolkit

Explore client deployment using Configuration Manager
Examine deployment components of Configuration Manager
Manage client deployment using Configuration Manager
Plan in-place upgrades using Configuration Manager

Use Autopilot for modern deployment
Examine requirements for Windows Autopilot
Prepare device IDs for Autopilot
Implement device registration and out-of-the-box customization
Examine Autopilot scenarios
Troubleshoot Windows Autopilot

Implement dynamic deployment methods

Implement dynamic deployment methods

Describe how Subscription Activation works.
Describe the benefits of Provisioning Packages.
Explain how Windows Configuration Designer creates Provisioning Packages.
Describe the benefits of using MDM enrollment with Microsoft Entra join.
Examine subscription activation
Deploy using provisioning packages
Use Windows Configuration Designer
Use Microsoft Entra join with automatic MDM enrollment

Plan a transition to modern endpoint management

Plan a transition to modern endpoint management

Identify usage scenarios for Microsoft Entra join.
Identify workloads that you can transition to Intune.
Identify prerequisites for co-management.
Identify considerations for transitioning to modern management.
Plan a transition to modern management using existing technologies.
Plan a transition to modern management using Microsoft Intune.

Explore using co-management to transition to modern endpoint management
Examine prerequisites for co-management
Evaluate modern management considerations
Evaluate upgrades and migrations in modern transitioning
Migrate data when modern transitioning
Migrate workloads when modern transitioning

Manage Windows 365 & Azure Virtual Desktop

Manage Windows 365 & Azure Virtual Desktop

Describe the key features of Windows 365.
Describe the Windows 365 management experience.
Describe the Windows 365 security model.
Describe the Windows 365 deployment options.
Describe the Windows 365 licensing model.

Explore Windows 365
Configure Windows 365
Administer Windows 365

Describe the key features of Azure Virtual Desktop
Describe the Azure Virtual Desktop management experience
Describe the Azure Virtual Desktop security model
Describe the Azure Virtual Desktop deployment options

Examine Azure Virtual Desktop
Explore Azure Virtual Desktop
Configure Azure Virtual Desktop
Administer Azure Virtual Desktop

Configure your MIcrosoft 365 experience

Configure your MIcrosoft 365 experience

Explore your Microsoft 365 cloud environment
Configure your Microsoft 365 organizational profile
Manage your tenant subscriptions in Microsoft 365
Integrate Microsoft 365 with customer engagement apps
Configure tenant-level sharing settings for SharePoint and OneDrive
Configure tenant-level settings for Microsoft Teams
Enable Unified Audit Logging in Microsoft 365
Complete your tenant configuration in Microsoft 365

Manage users, licenses, guests, and contacts in Microsoft 365

Manage users, licenses, guests, and contacts in Microsoft 365

Determine the user identity model for your organization
Create user accounts in Microsoft 365
Manage user account settings in Microsoft 365
Manage user licenses in Microsoft 365
Recover deleted user accounts in Microsoft 365
Perform bulk user maintenance in Microsoft Entra ID
Create and manage guest users using B2B collaboration
Collaborate with guests in a SharePoint site
Create and manage contacts

Manage groups in Microsoft 365

Manage groups in Microsoft 365

Examine groups in Microsoft 365
Create and manage groups in Microsoft 365
Create dynamic groups using Microsoft Entra rule builder
Create a Microsoft 365 group naming policy
Create groups in Exchange Online and SharePoint Online

Add a custom domain in Microsoft 365

Add a custom domain in Microsoft 365

Plan a custom domain for your Microsoft 365 deployment
Plan the DNS zones for a custom domain
Plan the DNS record requirements for a custom domain
Create a custom domain in Microsoft 365

Configure client connectivity to Microsoft 365

Configure client connectivity to Microsoft 365

Examine how automatic client configuration works
Explore the DNS records required for client configuration
Configure Outlook clients
Troubleshoot client connectivity

Configure administrative roles in Microsoft 365

Configure administrative roles in Microsoft 365

Explore the Microsoft 365 permission model
Explore the Microsoft 365 admin roles
Assign admin roles to users in Microsoft 365
Delegate admin roles to partners
Manage permissions using administrative units in Microsoft Entra ID
Elevate privileges using Microsoft Entra Privileged Identity Management
Examine best practices when configuring administrative roles

Manage tenant health and services in Microsoft 365

Manage tenant health and services in Microsoft 365

Monitor the health of your Microsoft 365 services
Monitor tenant health using Microsoft 365 Adoption Score
Monitor tenant health using Microsoft 365 usage analytics
Implement Microsoft 365 Network Connectivity Assessments and Insights
Implement Microsoft 365 Backup (Preview)
Develop an incident response plan
Request assistance from Microsoft

Deploy Microsoft 365 Apps for enterprise

Deploy Microsoft 365 Apps for enterprise

Explore Microsoft 365 Apps for enterprise functionality
Complete a self-service installation of Microsoft 365 Apps for enterprise
Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager
Deploy Microsoft 365 Apps for enterprise from the cloud
Deploy Microsoft 365 Apps for enterprise from a local source
Manage updates to Microsoft 365 Apps for enterpris
Explore the update channels for Microsoft 365 Apps for enterprise
Manage your cloud apps using the Microsoft 365 Apps admin center

Analyze your Microsoft 365 workplace data using Microsoft Viva Insights

Analyze your Microsoft 365 workplace data using Microsoft Viva Insights

Examine the analytical features of Microsoft Viva Insights
Explore Personal insights
Explore Team insights
Explore Organization insights
Explore Advanced insights

Explore identity synchronization

Explore identity synchronization

Examine identity models for Microsoft 365
Examine authentication options for the hybrid identity model
Explore directory synchronization

Prepare for identity synchronization to Microsoft 365

Prepare for identity synchronization to Microsoft 365

Plan your Microsoft Entra ID deployment
Prepare for directory synchronization
Choose your directory synchronization tool
Plan directory synchronization using Microsoft Entra Connect Sync
Plan for directory synchronization using Microsoft Entra Cloud Sync

1100 XP Implement directory synchronization tools

1100 XP Implement directory synchronization tools

Configure Microsoft Entra Connect Sync prerequisites
Configure Microsoft Entra Connect Sync
Monitor synchronization services using Microsoft Entra Connect Health
Configure Microsoft Entra Cloud Sync prerequisites
Configure Microsoft Entra Cloud Sync

Manage synchronized identities

Manage synchronized identities

Manage users with directory synchronization
Manage groups with directory synchronization
Maintain directory synchronization using Microsoft Entra Connect Sync security groups
Configure object filters for directory synchronization
Explore Microsoft Identity Manager
Troubleshoot directory synchronization

Manage secure user access in Microsoft 365

Manage secure user access in Microsoft 365

Examine the identity and access tools used in Microsoft 365
Manage user passwords
Implement Conditional Access policies
Enable pass-through authentication
Implement multifactor authentication
Explore passwordless authentication options
Explore self-service password management
Implement Microsoft Entra Smart Lockout
Explore Security Defaults in Microsoft Entra ID
Investigate authentication issues using sign-in logs

Explore security solutions in Microsoft Defender XDR

Explore security solutions in Microsoft Defender XDR

Enhance Exchange Online Protection with Microsoft Defender for Office 365
Protect your organization’s identities using Microsoft Defender for Identity
Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint
Protect against cyber attacks using Microsoft 365 Threat Intelligence
Provide insight into suspicious activity using Microsoft Defender for Cloud App Security
Review the security reports in Microsoft Defender XDR

Examine Microsoft Secure Score

Examine Microsoft Secure Score

Explore Microsoft Secure Score
Assess your security posture with Microsoft Secure Score
Improve your secure score
Track your Microsoft Secure Score history and meet your goals

Examine Privileged Identity Management in Microsoft Entra ID

Examine Privileged Identity Management in Microsoft Entra ID

Explore Privileged Identity Management in Microsoft Entra ID
Configure Privileged Identity Management
Audit Privileged Identity Management

Examine Microsoft Entra ID Protection

Examine Microsoft Entra ID Protection

Explore Microsoft Entra ID Protection
Enable the default protection policies in Microsoft Entra ID Protection
Explore the vulnerabilities and risk events detected by Microsoft Entra ID Protection
Plan your identity investigation

Enhance your email protection using Microsoft Defender for Office 365

Enhance your email protection using Microsoft Defender for Office 365

Climb the security ladder from EOP to Microsoft Defender for Office 365
Expand EOP protections by using Safe Attachments and Safe Links
Manage spoofed intelligence
Configure outbound spam filtering policies
Manage email access in Microsoft 365
Submit messages, URLs, files, and attachments to Microsoft for analysis

Manage Safe Attachments

Manage Safe Attachments

Protect users from malicious attachments by using Safe Attachments
Create Safe Attachment policies using Microsoft Defender for Office 365
Create Safe Attachments policies using PowerShell
Modify an existing Safe Attachments policy
Create a transport rule to bypass a Safe Attachments policy
Examine the end-user experience with Safe Attachments

Manage Safe Links

Manage Safe Links

Protect users from malicious URLs by using Safe Links
Create Safe Links policies using Microsoft 365 Defender
Create Safe Links policies using PowerShell
Modify an existing Safe Links policy
Create a transport rule to bypass a Safe Links policy
Examine the end-user experience with Safe Links

Explore threat intelligence in Microsoft Defender XDR

Explore threat intelligence in Microsoft Defender XDR

Explore Microsoft Intelligent Security Graph
Explore alert policies in Microsoft 365
Run automated investigations and responses
Explore threat hunting with Microsoft Threat Protection
Explore advanced threat hunting in Microsoft Defender XDR
Explore threat analytics in Microsoft 365
Identify threat issues using Microsoft Defender reports

Implement app protection by using Microsoft Defender for Cloud Apps

Implement app protection by using Microsoft Defender for Cloud Apps

Explore Microsoft Defender Cloud Apps
Deploy Microsoft Defender for Cloud Apps
Configure file policies in Microsoft Defender for Cloud Apps
Manage and respond to alerts in Microsoft Defender for Cloud Apps
Configure Cloud Discovery in Microsoft Defender for Cloud Apps
Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps

Implement endpoint protection by using Microsoft Defender for Endpoint

Implement endpoint protection by using Microsoft Defender for Endpoint

Explore Microsoft Defender for Endpoint
Configure Microsoft Defender for Endpoint in Microsoft Intune
Onboard devices in Microsoft Defender for Endpoint
Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management
Manage device discovery and vulnerability assessment
Reduce your threat and vulnerability exposure

Implement threat protection by using Microsoft Defender for Office 365

Implement threat protection by using Microsoft Defender for Office 365

Explore the Microsoft Defender for Office 365 protection stack
Examine the security policies and rules used in Microsoft Defender for Office 365
Investigate security attacks by using Threat Explorer
Identify cybersecurity issues by using Threat Trackers
Prepare for attacks with Attack simulation training

Examine data governance solutions in Microsoft Purview

Examine data governance solutions in Microsoft Purview

Explore data governance and compliance in Microsoft Purview9 min
Protect sensitive data with Microsoft Purview Information Protection7 min
Govern organizational data using Microsoft Purview Data Lifecycle Management
Minimize internal risks with Microsoft Purview Insider Risk Management
Explore Microsoft Purview eDiscovery solution

Explore data management practices in Microsoft 365

Explore data management practices in Microsoft 365

Explore archive mailboxes in Microsoft 365
Enable archive mailboxes in Microsoft 365
Restore deleted data in Exchange Online
Restore deleted data in SharePoint Online

Explore retention in Microsoft 365

Explore retention in Microsoft 365

Explore retention by using retention policies and retention labels
Compare capabilities in retention policies and retention labels
Define the scope of a retention policy
Examine the principles of retention
Implement retention using retention policies, retention labels, and eDiscovery holds
Restrict retention changes by using Preservation Lock

Explore compliance in Microsoft 365

Explore compliance in Microsoft 365

Plan for security and compliance in Microsoft 365
Plan your beginning compliance tasks in Microsoft Purview
Manage your compliance requirements with Compliance Manager
Examine the Compliance Manager dashboard
Analyze the Microsoft Compliance score

Implement Microsoft Purview Insider Risk Management

Implement Microsoft Purview Insider Risk Management

Explore insider risk management
Plan for insider risk management
Explore insider risk management policies
Create insider risk management policies
Investigate insider risk management activities and alerts
Explore insider risk management cases

Implement Microsoft Purview Information Barriers

Implement Microsoft Purview Information Barriers

Explore Microsoft Purview Information Barriers
Configure information barriers in Microsoft Purview
Examine information barriers in Microsoft Teams
Examine information barriers in OneDrive
Examine information barriers in SharePoint

Explore Microsoft Purview Data Loss Prevention

Explore Microsoft Purview Data Loss Prevention

Examine data loss prevention for workloads
Examine DLP policies
Explore Endpoint data loss prevention
Explore adaptive protection in Microsoft Purview
View DLP policy results

Implement Microsoft Purview Data Loss Prevention

Implement Microsoft Purview Data Loss Prevention

Plan to implement Microsoft Purview Data Loss Protection
Implement Microsoft Purview’s default DLP policies
Design a custom DLP policy
Create a custom DLP policy from a template
Configure email notifications for DLP policies
Configure policy tips for DLP policies

Implement data classification of sensitive information

Implement data classification of sensitive information

Explore data classification
Implement data classification in Microsoft 365
Explore trainable classifiers
Create and retrain a trainable classified
View sensitive data using Content explorer and Activity explorer
Detect sensitive information documents using Document Fingerprinting

Explore sensitivity labels

Explore sensitivity labels

Manage data protection using sensitivity labels
Explore what sensitivity labels can do
Determine a sensitivity label’s scope
Apply sensitivity labels automatically
Explore sensitivity label policies

Implement sensitivity labels

Implement sensitivity labels

Plan your deployment strategy for sensitivity labels
Enable sensitivity labels for files in SharePoint and OneDrive
Examine the requirements to create a sensitivity label
Create sensitivity labels
Publish sensitivity labels
Remove and delete sensitivity labels

Certification Camps training is not the typical PowerPoint & Lecture presentation training center.

Certification Camps has developed a comprehensive training / delivery format which focuses on learning beyond the core content accessible to any Microsoft training provider. Our program incorporates interactive demonstrations with explanations which go beyond the content of the book. Additional content, videos, labs & demonstrations are provided to expand on advanced topics - providing additional insight and perspective.

As a Microsoft Certified Solutions Partner - we adhere to the strict guidelines, standards and requirements to use Microsoft's exclusive curriculum. More over - our standards go beyond the "minimum requirements" set forth by Microsoft Learning.

We leverage our partnership benefits of courseware customization to build end to end technology training solutions. Students gain practical skills which can be implemented immediately.

With many training centers - learning starts on the first day of class and ends on the last day. Our boot camp training program is designed to offer resources before, during and after the training event.

CERTIFICATION CAMPS FACILITIES

CAMPUS - Certification Camps built out a stand alone training center (not a hotel conference room) with spacious classrooms, new desk, Herman Miller Aeron chairs & comfortable common areas. Each student has a dedicated desk with two monitors. Each classroom has a maximum of two rows - so everyone is able to be engaged without the "back row" feeling.

CLASSROOM EQUIPMENT - Students work on a dedicated Dell Client Desktop with 32GB memory with 512GB SSD drives - All Labs are executed the extremely fast Microsoft Data Center Hosted Lab Environment .

CAMPUS INTERNET - The campus is connected with a 1Gbps (1,000 Mbps) Verizon Fios Business Connection which provides complete internet (including VPN) access for students.

COMMON AREA - Amenties including snacks, drinks (Coffee, 100% juices, sodas, etc) all complimentary.

LODGING - We use the Hyatt Place Lakewood Ranch. This "upgraded" hotel offers extremely comfortable beds, great breakfast and very fast  internet access.

NEAR BY - Many shops, restaurants and grocery options are available within walking distance. Additionally - the hotel provided scheduled shuttle services. Restaurants like Cheesecake Factory, California Pizza Kitchen, Panera Bread, Bone Fish Grill, Ruby Tuesday's, Five Guys, Chipotle, Chili's and over 20 additional choices in the immediate area.

What's Included

Every Administrator Boot Camp Comes With

Live Training
Accelerated Live Training by Certified Trainers
Exam Voucher
Exam voucher
Exam Pass Guarantee
One Retake Voucher Per exam, if Needed
Satisfaction Guarantee
Re-sit Your Class at no Additional Charge up to 6 Months
Practice Exams
Vetted and Monthly Updated Practice Exam Resources
Extended Access
90-day Extended Access to Boot Camps Components
How it Works

How Does the Certification Camps Boot Camps Work?

Start your learning immediately with access to content as soon as your registration is processed.
1
Step 1
Before the Boot Camp
Start learning now. Once your registration is processed, you will receive access to materials. Prepare for your live boot camp, identify knowledge gaps to maximize your boot camp experience.
2
Step 2
During the Boot Camp
Attend instructor led live training at our facility in Florida or online (same class, same instructor, same interaction). In person or online – you are actively engaged with the instructor and other students participating in presentations, labs, hands on demonstrations and other learning tools. Students take the certification exam(s) while attending the camp.
3
Step 3
After the Boot Camp
Continue to access your student lab environment for 90 days after your camp is over. In the event you need to defer your exams or would like to re-sit the training – you have up to 6 months after the camp is complete.
Popular Bootcamps

Students Also Like

Course Logo
Microsoft Teams Administrator Certification (MS-700 Training)
Become a Microsoft Certified Teams Administrator. Take the MS-700 exam to achieve the MCA Microsoft Teams Administrator Associate Certification.
4 days
MS-700
Microsoft Certified Teams Administrator
Course Logo
Microsoft 365 Administrator Bootcamp (MS-102 Training)
Get trained and pass the MS-102 exam to become a certified Microsoft 365 Administrator in 5 days.
5 days
MS-102
MCE Microsoft 365 Administrator Expert
Course Logo
Microsoft 365 Endpoint Administrator Bootcamp (MD-102, MS-900)
5 day bootcamp to achieve the Microsoft 365 Certified: Fundamentals and MCA Endpoint Administrator Associate Official Certifications.
5 days
<strong>MS-900:</strong> Microsoft 365 Fundamentals <strong>MD-102:</strong> Endpoint Administrator
MCA Microsoft 365 Endpoint Administrator Associate
Guaranteed Results

The Certification Camps Difference

Expert Instructors
We guarantee you’ll pass your exam or you can retake the class for free.
Guaranteed Classes
Our classes run as scheduled, no cancellations, ensuring you can plan ahead.
High Exam Pass Rate
95% of our students pass their certification exams on first attempt.
20+ Years Experience
With over 20 years in training, we’ve helped thousands achieve certification success.
Your Questions Answered
What is the difference between a bootcamp and a traditional class?
+
At Certification Camps, we offer instructor-led, accelerated training programs—commonly referred to as “bootcamps.” Unlike traditional classroom courses that span weeks or months, our bootcamps are designed to deliver intensive, focused learning in a much shorter timeframe. This means students can master key technologies and prepare for certification in just a few days, without sacrificing quality or depth of instruction.
My company is paying for training. Can I get a quote for approval and an invoice?
+
Yes! You can use the “Generate a Quote” button on our website to receive an instant, formal quote for approval. Once you’re ready and complete registration, an invoice will be sent to you automatically.
Are these bootcamps the official vendor certified courses?
+
Yes – Certification Camps is a certified training partner for all vendors on our website, all training materials are official courseware (no third-party courseware).
Are exams administered while attending the training?
+
Yes – if you attend in person – the exams are administered at our training facility by Pearson Vue. If you are attending online – you have the option to take the exam online or we will provide you with a voucher to take the exam at a local Pearson Vue test center.
Are these courses instructor led live training events?
+
Yes – every bootcamp regardless of in person (at our Florida training center) or online are the same instructor led live training events. You see the instructor, interact with the instructor, view the instructors screen – the instructor is able to assist with labs, answer questions – completely the same experience if you attend online or in-person.
Are your instructor’s vendor certified?
+
Yes – every instructor is certified by the related vendor. For example – every instructor delivering our Microsoft bootcamps are Microsoft Certified Trainers (MCT), every instructor delivering Amazon AWS are Amazon Authorized Instructors (AAI).
Can I attend your instructor led live courses in Florida?
+
Yes – regardless of where you are located – you can attend any of our bootcamp from our facility in Sarasota, FL. In addition to the training – we offer an add on optional domestic travel option which includes up to $500 in airfare and lodging starting the day of the camp and checking out on the final day of camp.

About

  • About Us
  • Blog
  • Contact Us
  • Reviews

Bootcamps

  • Amazon Web Services
  • Microsoft 365 Enterprise
  • Microsoft Azure Admin
  • Microsoft Developer
  • Microsoft Power Platform
  • Microsoft Security
  • Windows Server
  • Windows Client

Vendors

  • Amazon
  • Cisco
  • CompTia
  • Microsoft

Job Role

  • Administrator
  • Architect
  • Data Engineer
  • Developer
  • DevOps
  • Security

Registration

  • More Info
  • Pay Invoice
  • Register for a Bootcamp

Copyright © 2025 Certification Camps. All rights reserved.

  • Terms & Conditions
  • Privacy Policy