Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 1: Implement information protection -Create and manage sensitive info types-Identify sensitive information requirements for an organization's data
Chapter 2: Implement information protection -Create and manage sensitive info types-Translate sensitive information requirements into built-in or custom sensitive info types
Chapter 3: Implement information protection -Create and manage sensitive info types-Create and manage custom sensitive info types
Chapter 6: Implement information protection -Create and manage trainable classifiers-Identify when to use trainable classifiers
Chapter 7: Implement information protection -Create and manage trainable classifiers-Design and create a trainable classifier
Chapter 8: Implement information protection -Create and manage trainable classifiers-Test a trainable classifier
Chapter 9: Implement information protection -Create and manage trainable classifiers-Retrain a trainable classifier
Chapter 11: Implement information protection -Implement and manage sensitivity labels-Define and create sensitivity labels
Chapter 12: Implement information protection -Implement and manage sensitivity labels-Configure and manage sensitivity label policies
Chapter 14: Implement information protection -Implement and manage sensitivity labels-Monitor data classification and label usage by using Content explorer, Activity explorer, and audit search
Chapter 15: Implement information protection -Implement and manage sensitivity labels-Apply bulk classification to on-premises data by using the Microsoft Purview Information Protection scanner
Chapter 17: Implement information protection -Design and implement encryption for email messages-Design an email encryption solution based on methods available in Microsoft 365
Chapter 18: Implement information protection -Design and implement encryption for email messages-Implement Microsoft Purview Message Encryption
Chapter 19: Implement information protection -Design and implement encryption for email messages-Implement Microsoft Purview Advanced Message Encryption
Chapter 20: Implement DLP -Create and configure DLP policies-Design DLP policies based on an organization’s requirements
Chapter 21: Implement DLP -Create and configure DLP policies-Configure permissions for DLP
Chapter 22: Implement DLP -Create and configure DLP policies-Create and manage DLP policies
Chapter 23: Implement DLP -Create and configure DLP policies-Interpret policy and rule precedence in DLP
Chapter 25: Implement DLP -Implement and monitor Endpoint DLP-Configure advanced DLP rules for devices in DLP policies
Chapter 26: Implement DLP -Implement and monitor Endpoint DLP-Configure Endpoint DLP settings
Chapter 27: Implement DLP -Implement and monitor Endpoint DLP-Recommend a deployment method for device onboarding
Chapter 28: Implement DLP -Implement and monitor Endpoint DLP-Identify endpoint requirements for device onboarding
Chapter 29: Implement DLP -Implement and monitor Endpoint DLP-Monitor endpoint activities
Chapter 32: Implement DLP -Monitor and manage DLP activities-Analyze DLP activities by using Activity explorer
Chapter 34: Implement DLP -Monitor and manage DLP activities-Remediate DLP alerts generated by Defender for Cloud Apps
Chapter 35: Implement data lifecycle and records management-Retain and delete data by using retention labels-Plan for information retention and disposition by using retention labels
Chapter 36: Implement data lifecycle and records management-Retain and delete data by using retention labels-Create retention labels for data lifecycle management
Chapter 37: Implement data lifecycle and records management-Retain and delete data by using retention labels-Configure and manage adaptive scopes
Chapter 38: Implement data lifecycle and records management-Retain and delete data by using retention labels-Configure a retention label policy to publish labels
Chapter 39: Implement data lifecycle and records management-Retain and delete data by using retention labels-Configure a retention label policy to auto-apply labels
Chapter 40: Implement data lifecycle and records management-Retain and delete data by using retention labels-Interpret the results of policy precedence, including using Policy lookup
Chapter 41: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for SharePoint and OneDrive
Chapter 42: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for Microsoft 365 groups
Chapter 43: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for Teams
Chapter 44: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for Yammer
Chapter 45: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for Exchange Online
Chapter 46: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Apply mailbox holds in Exchange Online
Chapter 47: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Implement Exchange Online archiving policies
Chapter 49: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Recover retained content in Microsoft 365
Chapter 50: Implement data lifecycle and records management-Implement Microsoft Purview records management-Create and configure retention labels for records management
Chapter 51: Implement data lifecycle and records management-Implement Microsoft Purview records management-Manage retention labels by using a file plan, including file plan descriptors
Chapter 52: Implement data lifecycle and records management-Implement Microsoft Purview records management-Classify records by using retention labels and retention label policies
Chapter 53: Implement data lifecycle and records management-Implement Microsoft Purview records management-Manage event-based retention
Chapter 54: Implement data lifecycle and records management-Implement Microsoft Purview records management-Manage the disposition of content in records management
Chapter 55: Implement data lifecycle and records management-Implement Microsoft Purview records management-Configure records management settings, including retention label settings and disposition settings
Chapter 56: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Plan for regulatory compliance in Microsoft 365
Chapter 57: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Create and manage assessments
Chapter 58: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Create and modify custom templates
Chapter 59: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Interpret and manage improvement actions
Chapter 60: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Create and manage alert policies for assessments
Chapter 61: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Choose between eDiscovery (Standard) and eDiscovery (Premium) based on an organization’s requirements
Chapter 62: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Plan and implement eDiscovery
Chapter 63: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Delegate permissions to use eDiscovery and Content search
Chapter 64: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Perform searches and respond to results from eDiscovery
Chapter 65: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Manage eDiscovery cases
Chapter 66: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Perform searches by using Content search
Chapter 67: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Choose between Audit (Standard) and Audit (Premium) based on an organization’s requirements
Chapter 68: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Plan for and configure auditing
Chapter 69: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Investigate activities by using the unified audit log
Chapter 70: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Review and interpret compliance reports and dashboards
Chapter 71: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Configure alert policies
Chapter 72: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Configure audit retention policies
Chapter 73: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Communication Compliance-Plan for communication compliance
Chapter 74: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Communication Compliance-Create and manage communication compliance policies
Chapter 75: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Communication Compliance-Investigate and remediate communication compliance alerts and reports
Chapter 76: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Plan for insider risk management
Chapter 77: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Create and manage insider risk management policies
Chapter 78: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Investigate and remediate insider risk activities, alerts, and reports
Chapter 79: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Manage insider risk cases
Chapter 80: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Manage forensic evidence settings
Chapter 81: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Manage notice templates
Chapter 82: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Information Barriers (IBs)-Plan for IBs
Chapter 83: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Information Barriers (IBs)-Create and manage IB segments and policies
Chapter 84: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Information Barriers (IBs)-Configure Teams, SharePoint, and OneDrive to enforce IBs, including setting barrier modes
Chapter 85: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Information Barriers (IBs)-Investigate issues with IB policies
Chapter 86: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Configure and maintain privacy risk management
Chapter 87: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Create and manage Privacy Risk Management policies
Chapter 88: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Identify and monitor potential risks involving personal data
Chapter 89: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Evaluate and remediate alerts and issues
Chapter 90: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Implement and manage subject rights requests

Combo Packages at a Discount: Get one that best fits your learning needs.