MCA Microsoft 365 Modern Desktop w/ MCE Enterprise Administrator Training & Certification Boot Camp – 11 Days
What's Included
4 Microsoft Test Vouchers
4 Microsoft Official Courses
1 Retake Voucher (per exam, if needed)
Microsoft Study Labs & Simulations
Onsite Pearson Vue Test Center
Instructor Led Classroom Training
Please note - Students will have the Sunday off between Microsoft 365 Modern Desktop Admin and Microsoft 365 Enterprise Admin (Office 365)
The Microsoft Certified Associate - Microsoft 365 Modern Desktop Administrator with the Microsoft Certified Expert - Microsoft 365 Enterprise Administrator Training & Certification 11 Day Combo Boot Camp focuses on actual job task using Microsoft 365 technologies. Students learn how to perform Microsoft 365 tenant management tasks for an enterprise, including its identities, security, compliance, and supporting technologies.
The Microsoft Certified Associate / Expert - Microsoft 365 Modern Desktop & Enterprise Administrator boot camp is taught using Microsoft Official Courseware
MD-100T00: Windows Client
MD-101T00: Managing Modern Desktops
MS-100T00: Microsoft 365 Identity and Services
MS-101T00: Microsoft 365 Mobility and Security
While attending this 12 day camp - students will take four exams (MD-100 / MS-101 / MS-100 / MS-101) to achieve the Microsoft Certified Associate / Expert - Microsoft Office 365 Modern Desktop & Enterprise Administrator certification. This hands on, instructor led live camp focuses on the real world responsibilities of an Modern Desktop / Enterprise Administrator while covering the information needed for the certification exams which are administered while attending.
Skills Gained:
Designing, configuring, and managing your Microsoft 365 tenant
Office 365 product functionality
Configuring Office 365
Managing Office 365 ProPlus deployments
Planning and implementing identity synchronization
Implementing application and external access
Microsoft 365 Security Metrics
Microsoft 365 Security Services
Microsoft 365 Threat Intelligence
Data Governance in Microsoft 365
Archiving and Retention in Office 365
Data Governance in Microsoft 365 Intelligence
Search and Investigations
Device Management
Windows 10 Deployment Strategies
Mobile Device Management
Install and customize Windows clients
Configure Updates for Windows.
Configure devices and drivers for Windows.
Configure storage for Windows.
Configure network and remote management settings in Windows.
Configure and manage browsers and applications in Windows.
Configure account access and authentication.
Configure file and folder permissions.
Describe methods for securing Windows clien, common threats and methods for mitigating against them.
Troubleshoot Windows and application installations.
Troubleshoot hardware and driver issues.
Troubleshoot file issues and perform recoveries.
Plan, develop, and implement an Operating System deployment, upgrade, and update strategy.
Understand the benefits and methods of co-management strategies.
Plan and implement device enrollment and configuration.
Manage and deploy applications and plan a mobile application management strategy.
Manage users and authentication using Azure AD and Active Directory DS.
Describe and implement methods used to protect devices and data.
Topics Covered in this Official Boot Camp
Installing Windows
This module covers installing the Windows client OS. Students will learn the different editions of Windows client, requirements, and new features introduced. This module covers how to install the OS, as well as methods for migrations and upgrading. Students will also learn about common tools used in the deployment process.Lesson
- Introducing Windows Client
- Windows Client Editions and Requirements
- Installation Methods
- Upgrading and Migrating Windows Clients
- Deployment Methods
Lab : Deploying Windows using Windows ADK toolsLab : Migrating User Settings using USMTAfter completing this module, students will be able to:
- Understanding the different editions and features of Windows client.
- Understand the Windows client installation options.
- Practice installing Windows client.
- Migrate content using the User State Migration Tool.
Configuring Authorization & Authentication
This module introduces the tools and features of Windows for authorizing access to Windows clients. Students will learn about methods for how users sign-in to Windows. This module also covers restricting what users can or cannot do on a device through methods like UAC and account types.Lesson
- Authentication
- Managing Users and Groups
- Configuring User Account Control
- Implementing Device Registration
Lab : Managing Local User and Microsoft Account AuthenticationLab : Managing Domain AuthenticationLab : Managing password and account optionsLab : Managing Azure AD AuthenticationAfter completing this module, students will be able to:
- Describe the different methods for securing data and the Windows OS.
- Describe the different types of user and service accounts.
- Configure Windows Hello.
- Configure user account control.
- Register a device with a domain.
Post-installation Configuration and Personalization
This module covers common post-installation tasks in Windows client. Students will learn how to customize the user interface, as well as using the control panel and settings app to configure common OS settings. This course will also introduce students to Windows PowerShell. This module will cover how device drivers work and how they work. Students will also be introduced to managing and configuring hardware peripherals such as printers.Lesson
- Configure and Customize the Windows Start Menu
- Common Configuration Options
- Advanced Configuration Methods
- Managing Drivers and Devices
Lab : Managing Windows 10 SettingsLab : Synchronizing settings between devicesLab : Managing local and network printersAfter completing this module, students will be able to:
- Customize the Windows client UI
- Configure device specific settings such as power plans and mobile device options.
- Use the Windows control panel and setting app to configure settings.
- Perform tasks using Windows PowerShell.
- Describe concepts related to drivers.
- Describe printer management concepts.
- Configure client-side printing and managing print server properties.
Updating Windows
In this module, Students will learn about keeping Windows clients up-to-date. Students will be introduced to the new Windows servicing model and how it applies to various scenarios. Students will learn the various different methods for updating Windows and applications, as well as managing updates using tools like group policy and Windows Update for Business.Lesson
- Windows Servicing Model
- Updating Windows
Lab : Managing Windows Update SettingsAfter completing this module, students will be able to:
- Describe the Windows servicing model.
- Configure Windows update settings.
- Describe updating Windows using WSUS.
- Describe updating Windows using Windows Update for Business.
- Configure Windows update using group policy.
Configuring Networking
In this module, Students will learn about networking concepts. This module will introduce to IPv4 and IPv6, and concepts like DNS. Students will learn how to configure network settings in Windows, as well as learn about wireless network technologies. The module will conclude with methods of managing Windows remotely.Lesson
- Configure IP Network Connectivity
- Implement Name Resolution
- Implement Wireless Network Connectivity
- Remote Access Overview
- Remote Management
Lab : Configuring Network ConnectivityLab : Configuring and Testing Name ResolutionLab : Administering Windows 10 Using Remote ManagementAfter completing this module, students will be able to:
- Configure IP network connectivity.
- Describe how name resolution works.
- Describe remote access technologies like VPNs.
- Configure Windows for remote management and access.
Configuring Storage
This module covers storage configuration and management in Windows 10. Students will be introduced to local, cloud and virtual storage options. This course will also cover configuring storage on client devices and introduce storage spaces.Lesson
- Managing Storage
- Managing Disks and Volumes
- Managing Storage Spaces
Lab : Managing StorageLab : Creating a Storage SpaceAfter completing this module, students will be able to:
- Describe the options and benefits of local, cloud, and virtual storage.
- Configure local disk partitions and volumes.
- Describe the capabilities and benefits of Storage spaces.
Configuring Data Access and Usage
In this module, Students will learn about permissions. This module will cover considerations for different files systems. Students will learn how to configure file and folder permissions as well as shared folders. Students will also learn configuring settings through methods such as local and group policy. The module will conclude with configuring OneDrive and Work Folders.Lesson
- Overview of File Systems
- Configuring and Managing File Access
- Configuring and Managing Shared Folders
- Managing User Files
Lab : Configuring and Managing Permissions and SharesLab : Using Conditions to Control Access and Effective PermissionsLab : Work FoldersLab : Synchronizing files with OneDriveAfter completing this module, students will be able to:
- Describe the differences and benefits of supported file systems.
- Configure file and folder permissions.
- Configure shared folders.
- Secure Windows through local policy settings.
Managing Apps in Windows Client
In this module, Students will be introduced to App management in Windows. This module will cover the different types of apps and supported installation methods. Students will learn how to install apps using manual and automated methods, as well as manage app delivery using the Windows Store. Finally, this module will cover managing Microsoft Edge.Lesson
- Providing Apps to Users
- Managing Universal Windows Apps
- Managing the Microsoft Edge Browser
Lab : Installing Apps in Windows 10Lab : Configuring Microsoft Edge to support Internet Explorer Enterprise ModeAfter completing this module, students will be able to:
- Describe the different types of applications.
- Install applications manually and using automated methods.
- Manage application deployment using the Windows Store.
- Learn about web browser features in Windows.
Configuring Threat Protection and Advanced Security
This module introduces students to protecting devices from external threats. Students will learn about the different types of common threats. This module will teach students about using encryption, firewalls, and IPSec to help protect against threats. The module will conclude with how to configure and use Windows Defender and AppLocker.Lesson
- Malware and Threat Protection
- Microsoft Defender
- Connection Security Rules
- Advanced Protection Methods
Lab : Configuring Microsoft Defender Antivirus and Windows SecurityLab : Configuring Firewall and Connection SecurityLab : Configuring BitLockerAfter completing this module, students will be able to:
- Identify common security threats .
- Describe the methods by which you can mitigate these common security threats.
- Describe the different methods of encryption.
- Describe how Windows firewall can secure the device.
- Describe the benefits of using IPSec.
- Describe the different features of Microsoft Defender.
- Describe the benefits of using AppLocker.
Supporting the Windows Client Environment
This module will cover the Windows architecture and common environments. Students will be introduced to the various tools used in maintaining Windows. This module will also discuss methodologies for effectively troubleshooting issues and how to proactively manage and optimize Windows .Lesson
- Windows Architecture
- Support and Diagnostic Tools
- Monitoring and Troubleshooting Computer Performance
Lab : Monitoring EventsLab : Monitoring Reliability and PerformanceAfter completing this module, students will be able to:
- Describe the Windows architecture.
- Describe key stages in troubleshooting.
- Describe the purpose and benefits of the various tools in Windows.
- Use monitoring tools to establish a performance baseline
- Optimize performance on Windows clients.
Troubleshooting Files & Applications
This module helps students plan for file backup and recovery. Students will learn how to plan and configure data protection strategies and how to perform various file and system recovery methods. This module also includes common methods for troubleshooting application installation issues, compatibility issues, and resolving browser issues.Lesson
- File Recovery in Windows
- Application Troubleshooting
Lab : Using File History to Recover FilesAfter completing this module, students will be able to:
- Describe the different methods of file recovery.
- Configure Windows to support individual file and system recovery.
- Recover a device using the Reset This PC function.
- Solve application compatibility issues with the Application Compatibility Toolkit.
- Troubleshoot common browser issues.
Troubleshooting the OS
In this module, Students will learn how to troubleshoot startup and service issues related to the operating system. This module will teach the different startup and recovery options, and how to troubleshoot different Windows services.Lesson
- Troubleshooting Windows Startup
- Troubleshooting Operating System Service Issues
Lab : Using Advanced Startup and Windows RE to recover from Boot FailuresLab : Recovering Windows using Reset This PCAfter completing this module, students will be able to:
- Describe the various methods identifying and recovering from startup issues.
- Describe when to use the various advanced startup options.
- Identify and disable a failed service.
- Identify and mitigate common locked account scenarios.
Troubleshooting Hardware and Drivers
This module introduces hardware troubleshooting. Students will learn about driver management and how to troubleshoot devices. Students will also learn steps for troubleshooting system hardware and external peripherals such as USB drives and printers, including diagnostic methods and remediation.Lesson
- Troubleshooting Device Driver Failures
- Overview of Hardware Troubleshooting
- Troubleshooting Physical Failures
Lab : Recovering Windows by using a Restore PointLab : Troubleshooting Hardware by Using Windows Memory DiagnosticsAfter completing this module, students will be able to:
- Troubleshoot and remediate driver issues.
- Troubleshoot Peripherals
Modern Management
This module explains the concepts of supporting the desktop through it’s entire lifecycle. Students will be introduced to the tools and strategies used for desktop deployment. Students will be introduced to the concept of directory in the cloud with Azure AD. Students will learn the similarities and differences between Azure AD and Active Directory DS and how to synchronize between the two. Students will explore identity management in Azure AD and learn about identity protection using Windows Hello for Business, as well as Azure AD Identity Protection and multi-factor authentication.Lesson
- The Enterprise Desktop
- Azure AD Overview
- Managing Identities in Azure AD
Lab : Managing identities in Azure ADLab : Using Azure AD Connect to connect Active DirectoriesAfter completing this module, students will be able to:
- Describe the enterprise desktop lifecycle.
- Describe the capabilities of Azure AD.
- Manage users using Azure AD with Active Directory DS.
- Implement Windows Hello for Business.
- Join devices to Azure AD.
Device Enrollment
This module will also cover Azure AD join and will be introduced to Microsoft Endpoint Manager, as well as learn how to configure policies for enrolling devices to Endpoint Manager and Intune.Lesson
- Manage Device Authentication
- Device Enrollment using Microsoft Endpoint Configuration Manager
- Device Enrollment using Microsoft Intune
Lab : Configuring and managing Azure AD JoinLab : Manage Device Enrollment into IntuneLab : Enrolling devices into Microsoft IntuneAfter completing this module, students will be able to:
- Configure and join devices to Azure AD
- Configure device enrollment in Microsoft Endpoint Manager
- Enroll devices in Endpoint Configuration Manager and Intune
Configuring Profiles
This module dives deeper into Intune device profiles including the types of device profiles and the difference between built-in and custom profiles. The student will learn about assigning profiles to Azure AD groups and monitoring devices and profiles in Intune. You will be introduced to the various user profile types that exist in Windows for on-premises devices. You will learn about the benefits of various profiles and how to switch between types of profiles. You will examine how Folder Redirection works and how to set it up. The lesson will then conclude with an overview of Enterprise State roaming and how to configure it for Azure AD devices.Lesson
- Configuring Device Profiles
- Managing User Profiles
Lab : Creating and Deploying Configuration ProfilesLab : Monitor device and user activity in IntuneLab : Configuring Enterprise State RoamingAfter completing this module, students will be able to:
- Describe the various types of device profiles in Intune
- Create, manage and monitor profiles
- Manage PowerShell scripts in Intune
- Explain the various user profile types that exist in Windows.
- Explain how to deploy and configure Folder Redirection.
- Configure Enterprise State Roaming for Azure AD devices.
Application Management
In this module, students learn about application management using on-premise and cloud-based solutions. This module will cover how to manage Office 365 ProPlus deployments in Endpoint Manager as well as how to manage apps on non-enrolled devices. The module will also include managing Win32 apps and deployment using the Microsoft Store for Business. This module will conclude with an overview of Microsoft Edge and Enterprise Mode.Lesson
- Implement Mobile Application Management (MAM)
- Deploying and updating applications
- Administering applications
Lab : Deploying cloud apps using IntuneLab : Configure App Protection Policies for Mobile DeviceLab : Deploy Apps using Endpoint Configuration ManagerLab : Deploy Apps using Microsoft Store for BusinessAfter completing this module, students will be able to:
- Describe the methods for application management.
- Deploy applications using Endpoint Manager and Group Policy.
- Configure Microsoft Store for Business.
- Deploy Office365 ProPlus using Intune.
- Manage and report application inventory and licenses.
Managing Authentication in Azure AD
This module covers the various solutions for managing authentication. The student will also learn about the different types of VPNs. This module also covers compliance policies and how to create conditional access policies.Lesson
- Protecting Identities in Azure AD
- Enabling Organization Access
- Implement Device Compliance Policies
- Using Reporting
Lab : Configuring Multi-factor AuthenticationLab : Configuring Self-service password reset for user accounts in Azure ADLab : Configuring and validating device complianceLab : Creating device inventory reportsAfter completing this module, students will be able to:
- Describe Windows Hello for Business
- Describe Azure AD Identity Protection
- Describe and manage multi-factor authentication
- Describe VPN types and configuration
- Deploy device compliance and conditional access policies
- Generate inventory reports and Compliance reports using Endpoint Manager
Managing Security
In this module, students will learn about data protection. Topics will include Windows & Azure Information Protection, and various encryption technologies supported in Windows. This module also covers key capabilities of Microsoft Defender for Endpoint and how to implement these capabilities on devices in your organization. The module concludes using Microsoft Defender and using functionalities such as antivirus, firewall and Credential Guard.Lesson
- Implement device data protection
- Managing Microsoft Defender for Endpoint
- Managing Microsoft Defender in Windows Client
Lab : Configure and Deploy Windows Information Protection Policies by using IntuneLab : Configuring Endpoint security using IntuneLab : Configuring Disk Encryption Using IntuneAfter completing this module, students will be able to:
- Describe the methods protecting device data.
- Describe the capabilities and benefits of Windows ATP.
- Deploy and manage settings for Windows Defender clients.
Deployment using Microsoft Endpoint Manager - Part 1
In this two-part module, students well be introduced to deployment using Microsoft Endpoint Manager. Part 1 will cover the tools for assessing the infrastructure and planning a deployment, followed by deployment using the Microsoft Deployment Toolkit and Endpoint Configuration Manager.Lesson
- Assessing Deployment Readiness
- On-Premise Deployment Tools and Strategies
Lab : Deploying Windows 10 using Microsoft Deployment ToolkitLab : Deploying Windows 10 using Endpoint Configuration ManagerAfter completing this module, students will be able to:
- Describe the tools for planning a deployment.
- Deploy Windows clients using the Microsoft Deployment Toolkit
- Deploy Windows clients using Endpoint Configuration Manager
Deployment using Microsoft Endpoint Manager - Part 2
This module continues with deployment using Microsoft Endpoint Manager. In part two, the student will learn about using Windows Autopilot and deployment using Microsoft Intune. This module will also include dynamic OS deployment methods, such as Subscription Activation. The module will conclude learning how Co-Management can be used to transitioning to modern management. Finally, students will be introduced to Azure Virtual Desktops and how to configure and manage cloud PC using Windows 365.Lesson
- Deploying New Devices
- Dynamic Deployment Methods
- Planning a Transition to Modern Management
- Managing Virtual Desktops
Lab : Deploying Windows 10 with AutopilotLab : Configuring Co-Management Using Configuration ManagerAfter completing this module, students will be able to:
- Deploy Windows 10 using Autopilot
- Configure OS deployment using subscription activation and provisioning packages
- Upgrade, migrate and manage devices using modern management methods
Managing Updates and Using Analytics
This module covers managing updates to Windows. This module introduces the servicing options for Windows clients. Students will learn the different methods for deploying updates and how to configure windows update policies. Finally, students will learn how to ensure and monitor updates using Desktop Analytics.Lesson
- Updating Windows Clients
- Windows Update for Business
- Desktop Analytics
- Endpoint Analytics
Lab : Managing Windows 10 security and feature updatesAfter completing this module, students will be able to:
- Describe the Windows client servicing channels.
- Configure a Windows update policy using Group Policy settings.
- Configure Windows Update for Business to deploy OS updates.
- Use Desktop Analytics to assess upgrade readiness.
- Use Endpoint Analytics to monitor user experience and assess Windows 11 readiness
Design Your Microsoft 365 Tenant
This module focuses on planning your Microsoft 365 experience. This includes planning for the proper Microsoft 365 subscription, planning for Microsoft 365 in your on-premises infrastructure, planning which identity and authentication solution best fits your organizational requirements, planning your service setup, planning for hybrid environments, and planning your migration to Microsoft 365.
Lessons
- Planning your Microsoft 365 Experience
- Planning Microsoft 365 in your On-premises Infrastructure
- Planning Your Identity and Authentication Solution
- Planning Your Service Setup
- Planning Your Hybrid Environment
- Planning Your Migration to Office 365
Lab : Transition to Microsoft 365
- Transition to Microsoft 365
After completing this module, students will be able to:
- Determine which Microsoft 365 subscription offering best suits your organization’s requirements
- Understand how to best use Microsoft 365 component services to meet your organizational needs
- Plan your Microsoft 365 subscription
- Identify the steps necessary to successfully migrate existing data to Microsoft 365
- Prepare your organization for Microsoft 365
- Estimate your network’s bandwidth
- Test your existing network using the tools provided by Microsoft
- Describe the best practices for integrating to Microsoft 365
- Identify the different deployment strategies for implementing Microsoft 365 services
- Describe authentication behavior when connecting with or without modern authentication
- Explain multi-factor authentication in Microsoft 365 deployments
- Create a plan for directory synchronization and Azure AD Connect Pass-through authentication
- Describe the issues, benefits, and best practices when implementing ADFS
- Plan for Azure AD Seamless Single Sign-On
- Plan your Email migration to Office 365
- Plan your file storage and collaboration requirements
- Plan your Microsoft Teams environment
- Plan for user and group synchronization using Azure AD Connect
- Plan for hybrid Exchange, SharePoint, and Skype for Business environments
- Plan your deployment using the Deployment Planning Checklist
- Analyze your Active Directory and plan any necessary clean-up using the ID Fix tool
- Determine which migration strategy to use to move your mail, calendar, and contact information
- Describe the performance and network issues to consider when planning your migration strategy
Configure Your Microsoft 365 Tenant
While the prior learning path focused on planning your Microsoft 365 tenant, this learning path transitions to configuring your tenant. This includes configuring your Microsoft 365 experience, including your organization profile, your tenant subscription, your services and add-ins, and your tenant configuration. You will then learn how to manage Microsoft 365 user accounts and licenses, security groups, and domain services. You’ll also learn how to configure client connectivity. The module concludes by examining how to leverage FastTrack and partner services.,Lesson
- Configure your Microsoft 365 experience
- Manage user accounts and licenses in Microsoft 365
- Manage groups in Microsoft 365
- Add a custom domain in Microsoft 365
- Configure client connectivity to Microsoft 365
- Use FastTrack and Partner Services to support Microsoft 365
Lab : Configure your Microsoft 365 Tenant
- Initialize your Microsoft 365 Tenant
- Manage Users and Groups
- Add a Custom Domain
After completing this module, students will be able to:
- Complete your company’s organization profile
- Maintain minimum subscription requirements for your company
- Manage your services and add-ins
- Describe the user identities in Microsoft 365
- Create user accounts from both the Microsoft 365 admin center and in Windows PowerShell
- Manage user accounts and licenses
- Recover deleted user accounts
- Describe the various types of groups available in Microsoft 365
- Create and manage groups from Microsoft 365 admin center and using Windows PowerShell
- Implement your domain services
- Plan DNS for custom domains
- Identify DNS record requirements for custom domains
- Add a custom domain to Microsoft 365
- Describe how FastTrack for Microsoft 365 helps customers deploy Microsoft 365
- Request a partner to assist you with the FastTrack process
- Describe how automatic client configuration works
- Describe the DNS records required for client configuration
- Configure Outlook clients
- Configure Azure Active Directory multifactor authentication
- Troubleshoot client connectivity
Manage Your Microsoft 365 Tenant
In the prior learning paths, you learned how to plan for and configure your Microsoft 365 tenant. In this learning path, you will take the next step in the deployment process by learning how to manage your tenant once it has been implemented. This includes configuring your Microsoft 365 administrator roles, managing tenant health and services, managing user-driven deployments of Microsoft 365 Apps for enterprise (formerly Office 365 ProPlus), managing Office Telemetry,Lesson
- Configure administrative roles in Microsoft 365
- Manage tenant health and services in Microsoft 365
- Manage user-driven Microsoft 365 Apps for Enterprise deployments
- Implement Office Telemetry
- Implement Workplace Analytics
Lab : Manage Your Microsoft 365 Tenant
- Manage Administration Delegation
- Monitor and Troubleshoot Microsoft 365
- Install Microsoft 365 Apps for enterprise
After completing this module, students will be able to:
- Describe the key admin roles in Microsoft 365
- Identify the key responsibilities of the primary admin roles
- Configure tenant roles
- Monitor your organization’s Microsoft 365 service health in the Microsoft 365 admin center
- Develop an incident response plan to deal with incidents in your Microsoft 365 services
- Request assistance from Microsoft to address technical, pre-sales, billing, and subscription support
- Describe how Microsoft 365 Apps for enterprise click-to-run technology works
- Describe the Microsoft 365 Apps for enterprise licensing and activation processes
- Plan which update branch might be applicable for your organization
- Plan which method to use for applying update branches to your users
- Identify typical obstacles that prevent successful Microsoft 365 Apps for enterprise installations
- Identify how to prevent users from installing Microsoft 365 Apps for enterprise
- Install and configure Microsoft 365 Apps for enterprise with the Office Deployment Tool
- Plan an Office Telemetry installation
- Install and configure Office Telemetry
- Describe data protection and data privacy in Workplace Analytics
- Configure Workplace Analytics
Explore the Microsoft 365 platform services
This learning path examines the primary features and functionality of the key Microsoft 365 services, including Exchange Online, SharePoint Online, Microsoft Teams, and the Microsoft Power Platform, including Power Apps, Power Automate, Power BI, and Power Virtual Agents.Lesson
- Explore Exchange Online as a Microsoft 365 Enterprise Administrator
- Explore SharePoint Online as a Microsoft 365 Enterprise Administrator
- Explore Microsoft Teams as a Microsoft 365 Enterprise Administrator
- Explore Microsoft Power Platform as a Microsoft 365 Enterprise Administrator
- Create apps as a Microsoft 365 Enterprise Administrator with Power Apps
- Create flows as a Microsoft 365 Enterprise Administrator with Power Automate
- Create reports and dashboards as a Microsoft 365 Enterprise Administrator with Power BI
- Create chatbots as a Microsoft 365 Enterprise Administrator with Power Virtual Agents
Lab : Reviewing Office 365 Functionality
- Review Exchange Online
- Review SharePoint Online
- Implement a Ticketing System in SharePoint Online
- Review Microsoft Teams
- Explore the Power Platform Admin Center
- Create a Power App from a SharePoint data source
- Create a Power App from scratch
- Create and share a flow using Power Automate
- Implement a DLP Policy using Power Automate
- Build a Power BI report and dashboard
After completing this module, students will be able to:
- Describe the most common recipient types are available in Exchange Online
- Manage anti-malware and anti-spam policies in Exchange Online
- Plan your organization’s disaster recovery needs related to company and user emails
- Determine retention tags and policies that will help you manage your organization’s email lifecycle
- Describe migration and coexistence strategies and understand the differences between them
- Select the right mail migration strategy for your organization
- Determine when you want to change the DNS MX record for a domain in a Microsoft 365 migration
- Describe the different ways to migrate mailboxes to Microsoft 365 in a hybrid Exchange environment
- Determine the permission levels that your organization should use in SharePoint Online
- Describe the levels of encryption for data at rest and data in transit within SharePoint Online
- Describe the SharePoint Online options for maintaining and recovering content in an intranet
- Describe the different options that provide anti-malware protection in SharePoint Online
- Describe basic Teams functionality and the infrastructure that supports its goals
- Describe how Teams compares to the other collaboration apps in Microsoft 365
- Manage user licenses in the Microsoft 365 Admin Center and PowerShell to provide Teams access
- Describe the functionality provided by Guess access in Microsoft Teams
- Describe audio conferencing functionality that is available in Microsoft Teams
- Manage user settings for audio conferencing
- Implement phone systems in Microsoft Teams
- Identify the components that make up the Microsoft Power Platform product family
- Describe the basic features of the Microsoft Power Platform Admin center
- Describe what Power Apps are, including their business impact and primary components
- Describe how Power Apps connect to data sources
- Create a basic Power App
- Test and monitor a Power App
- Run a Power App
- Describe the Power Apps security structure
- Build and run a basic workflow using Power Automate
- Administer Power Automate
- Build and share a basic Power BI report and dashboard
- Administer Power BI
- Explain what Power Virtual Agents are and how they empower teams to easily create powerful bots
- Describe key features of Power Virtual Agents
- Describe how to create a chatbot using Power Virtual Agents
Plan and implement identity synchronization
This learning path provides an in-depth examination of Microsoft 365 Identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect and, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multi-factor authentication and self-service password management.Lesson
- Explore identity synchronization
- Plan for Azure AD Connect implementation
- Implement Azure AD Connect
- Manage synchronized identities
- Explore password management in Microsoft 365
Lab : Manage Identities
- Prepare for Identity Synchronization
- Implement Identity Synchronization
- Implement Password Management
After completing this module, students will be able to:
- Describe the Microsoft 365 authentication options
- Explain directory synchronization
- Provide an overview of Azure AD Connect
- Plan directory synchronization to synchronize your on-premises Active Directory objects to Azure AD
- Plan an Azure AD Connect implementation
- Plan for Azure AD Connect in a multi-forest scenario
- Configure Azure AD Connect Prerequisites
- Set up Azure AD Connect
- Describe Azure AD Connect Health
- Perform tasks to ensure users synchronize efficiently and successfully deploy Azure AD Connect
- Manage groups with directory synchronization
- Use Azure AD Connect Sync Security Groups to delegate control in Azure AD Connect to other users
- Troubleshoot directory synchronization using a variety of troubleshooting tasks and tools
- Describe the available password management features in Microsoft 365
Implement applications and external access in Azure AD
This learning path provides a comprehensive look at implementing application and external access. You will learn how to add and manage applications in Azure Active Directory, including how to configure multi-tenant applications. You will then examine how to configure Azure AD Application Proxy, including how to install and register a connector and how to publish an on-premises app for remote access. Finally, you will examine how to design and manage solutions for external access. This includes licensing guidance for Azure AD B2B collaboration, creating a collaborative user, and troubleshooting a B2B collaboration.Lesson
- Implement applications in Azure AD
- Configure Azure AD Application Proxy
- Explore solutions for external access
After completing this module, students will be able to:
- Register an application or service within your Azure AD tenant
- Update an application within the Azure AD consent framework
- Modify the configuration of a single-tenant application to make it a multi-tenant application
- Remove an application’s registration from your Azure AD tenant
- Describe the benefits of Azure AD Application Proxy and how it works
- Identify Azure AD application proxy prerequisites
- Install and register a connector and verify that it installed correctly
- Publish an on-premises app for remote access and test the published app to verify that it functions
- Manage External Access with Azure AD B2B collaboration.
- Explain the difference between Microsoft 365 external access and Azure AD B2B collaboration
- Explain the attributes of a collaborative User.
- Demonstrate Azure B2B Collaboration
- Manage external access and guest access using Microsoft Teams
- Manage customer lockbox requests
Explore security metrics in Microsoft 365
In this learning path, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Identity Protection and Microsoft Defender for Office 365.Lesson
- Examine threat vectors and data breaches
- Explore the Zero Trust security model
- Explore security solutions in Microsoft 365
- Examine Microsoft Secure Score
- Examine Privileged Identity Management
- Examine Azure Identity Protection
Lab : Tenant Setup and Privileged Identity Management
- Initialize your Microsoft 365 Tenant
- PIM Resource Workflows
After completing this module, students will be able to:
- Describe several techniques hackers use to compromise user accounts through email
- Describe techniques hackers use to gain control over resources
- Describe techniques hackers use to compromise data
- Describe the Zero Trust approach to security in Microsoft 365.
- Describe the components of Zero Trust security.
- Describe and five steps to implementing a Zero Trust model in your organization.
- Explain Zero Trust networking
- List the types of threats that can be avoided by using EOP and Microsoft Defender for Office 365
- Describe how Microsoft 365 Threat Intelligence can be benefit your organization
- Monitor your organization through auditing and alerts
- Describe how ASM enhances visibility and control over your tenant through three core areas
- Describe the benefits of Secure Score and what kind of services can be analyzed
- Describe how to collect data using the Secure Score API
- Know where to identify actions that will increase your security by mitigating risks
- Explain how to determine the threats each action will mitigate and the impact it has on use
- Explain Privileged Identity Management (PIM) in Azure administration
- Configure PIM for use in your organization
- Audit PIM roles
- Explain Microsoft Identity Manager
- Explain Privileged Access Management in Microsoft 365
- Describe Azure Identity Protection and what kind of identities can be protected
- Understand how to enable Azure Identity Protection
- Know how to identify vulnerabilities and risk events
- Plan your investigation in protecting cloud-based identities
- Plan how to protect your Azure Active Directory environment from security breaches
Manage your Microsoft 365 security services
This learning path examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Microsoft Defender for Office 365, Safe Attachments, and Safe Links. You will also be introduced to the various reports that help an organization monitor its security health.Lesson
- Examine Exchange Online Protection
- Examine Microsoft Defender for Office 365
- Manage Safe Attachments
- Manage Safe Links
- Explore reporting in the Microsoft 365 security services
Lab : Manage Microsoft 365 Security Services
- Implement a Safe Attachments policy
- Implement a Safe Links policy
After completing this module, students will be able to:
- Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection
- List several mechanisms used to filter spam and malware
- Describe additional solutions to protect against phishing and spoofing
- Describe the benefits of the Spoof Intelligence feature
- Describe how Safe Attachments is used to block zero-day malware in email attachments and documents
- Describe how Safe Links protect users from malicious URLs embedded in email and documents
- Create and modify a Safe Attachments policy in the Security & Compliance Center
- Create a Safe Attachments policy by using Windows PowerShell
- Configure a Safe Attachments policy to take certain actions
- Understand how a transport rule can be used to disable the Safe Attachments functionality
- Describe the end-user experience when an email attachment is scanned and found to be malicious
- Create and modify a Safe Links policy in the Security & Compliance Center
- Create a Safe Links policy by using Windows PowerShell
- Understand how a transport rule can be used to disable the Safe Links functionality
- Describe the end-user experience when Safe Links identifies a link to a malicious website or file
- Describe how the Microsoft 365 security reports show how your organization is being protected
- Understand where to access reports generated by EOP and Microsoft Defender for Office 365
- Understand how to access detailed information from the generated reports generated
Implement threat intelligence in Microsoft 365
In this learning path, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard, Microsoft Defender for Identity, and Microsoft Cloud Application Security to stay ahead of potential security breaches.Lesson
- Explore threat intelligence in Microsoft 365
- Explore the Security Dashboard
- Implement Microsoft Defender for Identity
- Implement Microsoft Cloud Application Security
Lab : Implement Threat Intelligence
- Conduct a Spear Phishing attack using the Attack Simulator
- Conduct Password attacks using the Attack Simulator
- Prepare for Alert Policies
- Implement a Mailbox Permission Alert
- Implement a SharePoint Permission Alert
- Test the Default eDiscovery Alert
After completing this module, students will be able to:
- Understand how threat intelligence is powered by the Microsoft Intelligent Security Graph
- Describe how the threat dashboard can benefit C-level security officers
- Understand how Threat Explorer can be used to investigate threats and help to protect your tenant
- Describe how the Security Dashboard displays top risks, global trends, and protection quality
- Describe what Microsoft Defender for Identity is and what requirements are needed to deploy it
- Configure Microsoft Defender for Identity
- Manage the Microsoft Defender for Identity services
- Describe Cloud App Security
- Explain how to deploy Cloud App Security
- Control your Cloud Apps with Policies
- Troubleshoot Cloud App Security
Introduction to Data Governance in Microsoft 365
This learning path examines the key components of Microsoft 365 Compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Office 365 message encryption, In-place Records Management in SharePoint, and data loss prevention (DLP).Lesson
- Explore archiving in Microsoft 365
- Explore retention in Microsoft 365
- Explore Information Rights Management
- Explore Office 365 Message Encryption
- Explore In-place Records Management in SharePoint
- Explore Data Loss Prevention in Microsoft 365
Lab : Implement Data Governance
- Configure Microsoft 365 Message Encryption
- Validate Information Rights Management
- Initialize Compliance
- Configure Retention Tags and Policies
After completing this module, students will be able to:
- Understand Data Governance in Microsoft 365
- Describe the difference between In-Place Archive and Records Management
- Explain how data is archived in Exchange
- Recognize the benefits of In Place Records Management in SharePoint
- Understand how Messaging Records Management works in Exchange
- List the types of retention tags that can be applied to mailboxes
- Know the different Microsoft 365 Encryption Options
- Understand how Information Rights Management (IRM) can be used in Exchange
- Configure IRM protection for Exchange mails
- Explain how IRM can be used in SharePoint
- Apply IRM protection to SharePoint documents
- Tell the differences between IRM protection and AIP classification
- Understand how message encryption works
- Perform encryption on a message
- Accomplish decryption of a message
- Understand the co-operation of signing and encryption simultaneously
- Explain what triple-wrapped messages are
- Describe when you can use Office 365 Message Encryption
- Explain how Office 365 Message Encryption works
- Describe Data Loss Prevention (DLP)
- Understand what sensitive information and search patterns are that DLP is using
- Know what a DLP policy is and what it contains
- Recognize how actions and conditions work together for DLP
- Express how actions contain functions to send emails on matches
- Show policy tips to the users if a DLP rule applies
- Use policy templates to implement DLP policies for commonly used information
- Explain document finger
- Understand how to use DLP to protect documents in Windows Server FCI
Implement data governance in Microsoft 365
This learning path examines how to implement the key aspects of data governance, including the building of information barriers in Microsoft 365 and ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips.Lesson
- Evaluate your compliance readiness
- Implement compliance solutions
- Create information barriers in Microsoft 365
- Create a DLP policy from a built-in template
- Create a custom DLP policy
- Create a DLP policy to protect documents
- Implement policy tips for DLP policies
Lab : Implement DLP Policies
- Manage DLP Policies
- Test MRM and DLP Policies
After completing this module, students will be able to:
- Describe the Microsoft 365 Compliance Center and how to access it
- Describe the purpose and function of Compliance score
- Explain the components of of how an organization’s Compliance score is determined
- Explain how assessments are used to formulate compliance scores
- Explain how Microsoft 365 helps address Global Data Protection Regulation
- Describe insider risk management functionality in Microsoft 365
- Configure insider risk management policies
- Configure insider risk management policies
- Explain the communication compliance capabilities in Microsoft 365
- Describe what an ethical wall in Exchange is and how it works
- Explain how to create information barriers in Microsoft 365
- Identify best practices for building and working with ethical walls
- Understand the different built-in templates for a DLP policies
- Determine how to choose the correct locations for a DLP policy
- Configure the correct rules for protecting content
- Enable and review the DLP policy correctly
- Describe how to modify existing rules of DLP policies
- Explain how to add and modify custom conditions and action to a DLP rule
- Describe how to change user notifications and policy tips
- Configure the user override option to a DLP rule
- Explain how incident reports are sent by a DLP rule violation
- Describe how to work with managed properties for DLP policies
- Explain how SharePoint Online creates crawled properties from documents
- Describe how to create a managed property from a crawled property in SharePoint Online
- Explain how to create a DLP policy with rules that apply to managed properties via PowerShell
- Describe the user experience when a user creates an email or site containing sensitive information
- Explain the behavior in Office apps when a user enters sensitive information
Manage data governance in Microsoft 365
This learning path focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement sensitivity labels and Windows Information Protection.Lesson
- Manage retention in email
- Troubleshoot data governance
- Explore sensitivity labels
- Implement sensitivity labels
- Implement Data Governance
Lab : Implement Data Governance
- Implement sensitivity labels
- Implement Windows Information Protection
After completing this module, students will be able to:
- Determine when and how to use retention tags in mailboxes
- Assign retention policy to an email folder
- Add optional retention policies to email messages and folders
- Remove a retention policy from an email message
- Explain how the retention age of elements is calculated
- Repair retention policies that do not run as expected
- Understand how to systematically troubleshoot when a retention policy appears to fail
- Perform policy tests in test mode with policy tips
- Describe how to monitor DLP policies through message tracking
- Manage data protection using sensitivity labels
- Describe the requirements to create a sensitivity label
- Develop a data classification framework for your sensitivity labels
- Create, publish, and remove sensitivity labels
- Describe WIP and what it is used for
- Plan a deployment of WIP policies
- Implement WIP policies with Intune and SCCM
- Implement WIP policies in Windows desktop apps
Manage content search and investigations in Microsoft 365
This learning path conclude this section on data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.Lesson
- Search for content in the Microsoft 365 Compliance center
- Conduct audit log investigations
- Manage Advanced eDiscovery
Lab : Manage Search and Investigations
- Conduct a data search
- Investigate Your Microsoft 365 Data
After completing this module, students will be able to:
- Describe how to use content search
- Design your content search
- Configure search permission filtering
- Explain how to search for third-party data
- Describe when to use scripts for advanced searches
- Describe what the audit log is and the permissions required to search a Microsoft 365 audit
- Configure Audit Policies
- Enter criteria for searching the audit log
- View, sort, and filter search results
- Export search results to a CSV file
- Search the unified audit log by using Windows PowerShell
- Describe Advanced eDiscovery
- Configure permissions for users in Advanced eDiscovery
- Create Cases in Advanced eDiscovery
- Search and prepare data for Advanced eDiscovery
Prepare for device management in Microsoft 365
This learning path provides an in-depth examination of Microsoft 365 Device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Microsoft Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management.Lesson
- Explore Co-management of Windows 10 device
- Prepare your Windows 10 devices for Co-management
- Transition from Configuration Manager to Intune
- Examine the Microsoft Store for Business
- Plan for application management
Lab : Implement the Microsoft Store for Business
- Configure the Microsoft Store for Business
- Manage the Microsoft Store for Business
After completing this module, students will be able to:
- Describe the benefits of Co-management
- Plan your organization’s Co-management Strategy
- Describe the main features of Configuration Manager
- Describe how Azure Active Directory enables co-management
- Identify the prerequisites for using Co-management
- Configure Configuration Manager for Co-management
- Enroll Windows 10 Devices to Intune
- Modify your co-management settings
- Transfer workloads to Intune
- Monitor your co-management solution
- Check compliance for co-managed devices
- Describe the feature and benefits of the Microsoft Store for Business
- Configure the Microsoft Store for Business
- Manage settings for the Microsoft Store for Business
Plan your Windows 10 deployment strategy
This learning path focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Desktop Analytics, and planning your Windows 10 subscription activation service.Lesson
- Examine Windows 10 deployment scenarios
- Explore Windows Autopilot deployment models
- Plan your Windows 10 Subscription Activation strategy
- Resolve Windows 10 upgrade errors
- Analyze Windows 10 diagnostic data using Desktop Analytics
After completing this module, students will be able to:
- Plan for Windows as a Service
- Plan a Modern Deployment
- Plan a Dynamic Deployment
- Plan a Traditional Deployment
- Describe Windows Autopilot requirements
- Configure Autopilot
- Describe Autopilot Self-deployments, Pre-provisioned deployments, and User-driven deployments
- Deploy BitLocker Encryption for Autopiloted Devices
- Understand Windows 10 Enterprise E3 in CSP
- Configure VDA for Subscription Activation
- Deploy Windows 10 Enterprise licenses
- Describe common fixes for Windows 10 upgrade errors
- Use SetupDiag
- Troubleshooting upgrade errors
- Describe Windows error reporting
- Understand the upgrade error codes and resolution procedure
- Describe Desktop Analytics
- Describe Device Health
- Describe Update Compliance
- Determine Upgrade Readiness
Implement Mobile Device Management in Microsoft 365
This learning path focuses on Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.Lesson
- Explore Mobile Device Management
- Deploy Mobile Device Management
- Enroll devices to Mobile Device Management
- Manage device compliance
Lab : Manage devices with Intune
- Enable device management
- Configure Azure AD for Intune
- Create Intune policies
- Enroll a Windows 10 device
- Manage and monitor a device in Intune
After completing this module, students will be able to:
- Manage devices with MDM
- Compare MDM for Microsoft 365 and Intune
- Understand policy settings for mobile devices
- Control Email and Document Access
- Activate Mobile Device Management Services
- Deploy Mobile Device Management
- Configure Domains for MDM
- Configure an APNs Certificate for iOS devices
- Manage Device Security Policies
- Define a Corporate Device Enrollment Policy
- Enroll devices to MDM
- Understand the Apple Device Enrollment Program
- Understand Enrollment Rules
- Configure a Device Enrollment Manager Role
- Describe Multi-factor Authentication considerations
- Plan for device compliance
- Configure conditional users and groups
- Create Conditional Access policies
- Monitor enrolled devices
Microsoft 365 Training & Certification Roadmap
Certification Camps has developed a comprehensive training / delivery format focused on learning beyond the generic book content (accessible to any Microsoft training provider). Our program incorporates interactive demonstrations and detailed real world explanations. When possible - additional content, videos, labs & demonstrations are provided to expand on advanced topics - providing additional insight and perspective. Certification Camps training is not the typical book & PowerPoint presentation found at any local training center.
As a Microsoft Certified Partner with Gold Learning Competency - we adhere to the strict guidelines, standards and requirements to use Microsoft's exclusive curriculum. More over - our standards go beyond the "minimum requirements" set forth by Microsoft Learning.
We leverage our partnership benefits of courseware customization to build end to end technology training solutions. Students gain practical skills which can be implemented immediately.
At most training centers - learning starts on the first day of class and ends on the last day. Our boot camp training program is designed to offer resources before, during and after the training.
CERTIFICATION CAMPS FACILITIES
CAMPUS - Certification Camps built out a stand alone training center (not a hotel conference room) with spacious classrooms, new desk, Herman Miller Aeron chairs & comfortable common areas. Each student has a dedicated desk with two monitors. Each classroom has a maximum of two rows - so everyone is able to be engaged without the "back row" feeling.
CLASSROOM EQUIPMENT - Students work on a dedicated Dell Client Desktop with 32GB memory with 512GB SSD drives - All Labs are executed the extremely fast Microsoft Data Center Hosted Lab Environment .
CAMPUS INTERNET - The campus is connected with a 1Gbps (1,000 Mbps) Verizon Fios Business Connection which provides complete internet (including VPN) access for students.
COMMON AREA - Amenties including snacks, drinks (Coffee, 100% juices, sodas, etc) all complimentary.
LODGING - We use the Hyatt Place Lakewood Ranch. This "upgraded" hotel offers extremely comfortable beds, great breakfast and very fast internet access.
NEAR BY - Many shops, restaurants and grocery options are available within walking distance. Additionally - the hotel provided scheduled shuttle services. Restaurants like Cheesecake Factory, California Pizza Kitchen, Panera Bread, Bone Fish Grill, Ruby Tuesday's, Five Guys, Chipotle, Chili's and over 20 additional choices in the immediate area.