Administrando el Futuro: MS-102 y el Poder de Microsoft 365

Cupón Udemy | Administrando el Futuro: MS-102 y el Poder de Microsoft 365

Prepárate para el éxito junto a más de 700 estudiantes: más de 420 pruebas de práctica actualizadas de MS-102 con explicaciones.

Autor: Vahid Ghafarpour

Categoría: Tecnología e informática

📅 Publicado el 27/04/2025 • 🔄 Actualizado el 03/05/2025 • 🎟️ Cupón verificado el 05/05/2025

Skills at a glance

  • Deploy and manage a Microsoft 365 tenant (25–30%)

  • Implement and manage Microsoft Entra identity and access (25–30%)

  • Manage security and threats by using Microsoft Defender XDR (30–35%)

  • Manage compliance by using Microsoft Purview (10–15%)

Deploy and manage a Microsoft 365 tenant (25–30%)

Implement and manage a Microsoft 365 tenant

  • Create a tenant

  • Implement and manage domains

  • Configure org settings, including security & privacy and organizational profile

  • Monitor the health of Microsoft 365 services by using Service Health, including configuration of notifications

  • Configure and review network connectivity insights

  • Configure and monitor software updates by using the Microsoft 365 admin center

  • Monitor Microsoft 365 adoption and usage

  • Configure and manage Microsoft 365 Backup

Manage users and groups

  • Create and manage users in Microsoft Entra, including external users

  • Create and manage contacts in the Microsoft 365 admin center

  • Create and manage groups, including Microsoft 365 groups and shared mailboxes

  • Manage and monitor Microsoft 365 licenses, including group-based licensing

  • Perform bulk user management, including PowerShell

Manage roles and role groups

  • Implement and manage roles in Microsoft 365 and Microsoft Entra

  • Manage role groups in Microsoft Defender XDR, Microsoft Purview, and Microsoft 365 workloads

  • Manage delegation by using administrative units

  • Manage Microsoft Entra roles in Microsoft Entra privileged identity management (PIM)

Implement and manage Microsoft Entra identity and access (25–30%)

Implement and manage identity synchronization with Microsoft Entra tenant

  • Prepare for identity synchronization, including IdFix

  • Implement and manage directory synchronization by using Microsoft Entra Connect Sync or Microsoft Entra Cloud Sync

  • Monitor synchronization by using Microsoft Entra Connect Health

  • Troubleshoot synchronization, including Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync

Implement and manage authentication

  • Implement and manage authentication methods

  • Implement and manage self-service password reset (SSPR)

  • Implement and manage Microsoft Entra Password Protection

  • Investigate and resolve authentication issues

Implement and manage secure access

  • Plan for identity protection

  • Implement and manage Microsoft Entra ID Protection

  • Plan conditional access policies

  • Implement and manage conditional access policies

  • Implement and manage multi-factor authentication (MFA) by using conditional access policies

Manage security and threats by using Microsoft Defender XDR (30–35%)

Review and respond to security reports and alerts generated by Microsoft Defender XDR

  • Review and respond to threats using Exposure Management, including the Microsoft Secure Score

  • Review and respond to incidents and alerts generated by Microsoft Defender XDR, including guided hunting

  • Review and respond to issues identified in Microsoft Defender XDR reports

  • Review and respond to threats identified by Threat intelligence

Implement and manage email and collaboration protection by using Microsoft Defender for Office 365

  • Implement threat policies and rules in Microsoft Defender for Office 365

  • Configure alert policies in Microsoft Defender for Office 365

  • Investigate and respond to email and collaboration threats by using Microsoft Defender for Office 365

  • Manage attack simulations, including training campaigns

  • Manage restricted entities, including blocked users

Implement and manage endpoint protection by using Microsoft Defender for Endpoint

  • Onboard devices to Defender for Endpoint

  • Configure endpoint settings

  • Review and respond to vulnerabilities identified in the Microsoft Defender Vulnerability Management dashboard

Implement and manage Microsoft Defender for Cloud Apps

  • Configure the app connector for Microsoft 365

  • Configure Microsoft Defender for Cloud Apps policies, including triggering alerts

  • Interpret activity log

  • Configure Cloud App Discovery

  • Review and respond to issues identified in Cloud App Discovery

Manage compliance by using Microsoft Purview (10–15%)

Implement Microsoft Purview information protection and data lifecycle management

  • Implement and manage sensitive information types by using keywords, keyword lists, or regular expressions

  • Implement retention labels, retention label policies, and retention policies

  • Implement sensitivity labels and sensitivity label policies

  • Monitor label usage by using Content Explorer, Activity Explorer, and label reports

Implement Microsoft Purview data loss prevention (DLP)

  • Configure DLP policies for Exchange, SharePoint, OneDrive, and Teams

  • Configure Endpoint DLP

  • Review and respond to DLP alerts, events, and reports

Udemy dice que el cupón expiró. Inténtalo, puede seguir activo.

😄 Agradecemos tu visita. Debes esperar 15 segundos para acceder al curso, eso nos ayuda a traer más cupones gratuitos de Udemy para ti. Mientras puedes ver nuestra sección "También te puede interesar" de más abajo. ¡El enlace aparecerá enseguida!😁

⏳ Cargando...

Acceder al curso



¿No era lo que buscabas? Hay más cursos esperándote 👇

Ver más cupones