課程簡介
現今很多企業開始將內部電腦運作移往雲端,公司內的使用者透過 Office 365 雲端系統處理日常文件,作為 I.T.
管理人員可使用 Microsoft 365 Security Center
用來監控和管理使用者的身分、資料、裝置、應用程式等,並取得可疑的活動警報,了解網絡安全狀況。在 Microsoft 365
Security Center 特別適用於安全性系統管理和更妥善地保護組織的網絡作業安全。
|
Microsoft 365 Security Center |
|
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
![]() |







課程電腦設備:


授課語言:

Microsoft 365 Certified Security Administrator Associate 課程
* 單科 MS-500 : Microsoft 365 Security Administration
6 堂 x 3 小時 ( 理論 + 實戰 ) , 合共 18 小時
開課及上課日期 ( 真人教授 , 1 人1 機 , 學員全程同步實機實戰 , 100% 保證開班 ) :
立即報名即可以 優惠價 預留下期學額 !
注意 : 本中心於編定課程日程的時候已照顧在職人仕需要 , 於一般 香港公眾假期 ( 紅日 ) 及 節慶日 ( 如 : 冬至 / 平安夜 / 除夕 )
不用上課 .
* 特別列明的課程除外 ( 例如 星期日班 , 聖誔特別班 等等 . )
學員報讀課程時 , 可以 選擇 保留學額 , 並於 12 個月 內完成所有已報讀的 課程組合 , 進修日程更具彈性 !
( 登記成為 基本會員 或 金會員 或 365 特級會員 即可 免費報讀 本課程 , 詳情按此 )
立即報名即可以 優惠價 預留下期學額 !
HK$ 4,280 ( 正價 )
HK$ 3,680 ( 優惠價 )
( 通過 WhatsApp 即可查詢優惠詳情 )
請即致電 2380 9888 ( 來電請設有 來電顯示) / WhatsApp 確認優惠 . * 需於 2025 年 3 月 15 日 (星期六) 或前 #完成報名手續 . |
|
*** 我們致力提供 最優質 的服務 , 學員親身報名前 , 敬請預先 確認學額 , 以便安排 . *** 星期一 至 星期五 : 13:30 PM - 20:00 PM 其他公眾假期 : 報名處 休息 ( 電話留位 , 全天候如常服務 . 歡迎於上述 辦公時間 致電 / WhatsApp 查詢 ) |
提示 : 你可在薪俸稅下申請扣除你的個人進修開支 (包括本課程的 課程費用 及 考試費用) .
學員報讀課程時 , 可以 選擇 保留學額 , 並於 12 個月 內 展開 所報讀的 課程組合 , 進修日程更具彈性 !
成功通過考試後獲得的國際認可證書及資格:
Microsoft 365 Certified Security Administrator Associate 課程內容 :
Secure Microsoft 365 hybrid environments
• configure and manage security integration components in Microsoft 365 hybrid environments
• plan Azure AD authentication options
• plan Azure AD synchronization options
• monitor and interpret Azure AD Connect events
Secure user accounts
• implement Azure AD dynamic group membership
• implement Azure AD Self-service password reset
• manage Azure AD access reviews
Implement authentication methods
• plan sign-on security
• implement multi-factor authentication (MFA)
• manage and monitor MFA
• implement device sign-on methods
• manage authentication methods
• monitor authentication methods
Implement conditional access
• plan for compliance and conditional access policies
• configure and manage device compliance policy
• configure and manage conditional access policy
• monitor Conditional Access and Device Compliance
Implement role-based access control (RBAC)
• plan for RBAC
• configure RBAC
• monitor RBAC usage
Implement Azure AD Privileged Identity Management (PIM)
• plan for Azure PIM
• configure and manage Azure PIM
• monitor Azure PIM
Implement Azure AD Identity Protection
• implement user risk policy
• implement sign-in risk policy
• configure Identity Protection alerts
• review and respond to risk events
Implement an enterprise hybrid threat protection solution
• plan an Azure Advanced Threat Protection (ATP) solution
• install and configure Azure ATP
• manage Azure ATP workspace health
• generate Azure ATP reports
• integrate Azure ATP with Windows Defender ATP
• monitor Azure ATP
• manage suspicious activities
Implement device threat protection
• plan and implement a Windows Defender ATP solution
• manage Windows Defender ATP
• monitor Windows Defender ATP
Implement and manage device and application protection
• plan for device protection
• configure and manage Windows Defender Application Guard
• configure and manage Windows Defender Application Control
• configure and manage Windows Defender Exploit Guard
• configure Secure Boot
• configure and manage Windows 10 device encryption
• configure and manage non-Windows device encryption
• plan for securing applications data on devices
• define managed apps for Mobile Application Management (MAM)
• protect your enterprise data using Windows Information Protection (WIP)
• configure WIP policies
• configure Intune App Protection policies for non-Windows devices
Implement and manage Office 365 messaging protection
• configure Office 365 ATP anti-phishing protection
• configure Office 365 ATP anti-phishing policies
• define users and domains to protect with Office 365 ATP Anti-phishing
• configure Office 365 ATP anti-spoofing
• configure actions against impersonation
• configure Office 365 ATP anti-spam protection
• enable Office 365 ATP Safe-Attachments
• configure Office 365 ATP Safe Attachments policies
• configure Office 365 ATP Safe Attachments options
• configure Office 365 ATP Safe Links options
• configure Office 365 ATP Safe Links blocked URLs
• configure Office 365 ATP Safe Links policies
Implement and manage Office 365 threat protection
• configure Office 365 Threat Intelligence
• integrate Office 365 Threat Intelligence with Office 365 services
• integrate Office 365 Threat Intelligence with Windows Defender ATP
• review threats and malware trends on the Office 365 ATP Threat Management dashboard
• review threats and malware trends with Office 365 ATP Threat Explorer and Threat Tracker
• create and review Office 365 ATP incidents
• review quarantined items in ATP including Microsoft SharePoint Online, OneDrive, Exchange Online
• monitor online anti-malware solutions using Office 365 ATP reports
• perform tests using Attack Simulator
Secure data access within Office 365
• plan secure data access within Office 365
• implement and manage Customer Lockbox
• configure data access in Office 365 collaboration workloads
• configure B2B sharing for external users
Manage Azure information Protection (AIP)
• plan an AIP solution
• activate Azure Rights Management
• configure usage rights
• configure and manage super users
• customize policy settings
• create and configure labels and conditions
• create and configure templates
• configure languages
• configure and use the AIP scanner
• deploy the RMS connector
• manage tenant keys
• deploy the AIP client
• track and revoke protected documents
• integrate AIP with Microsoft Online Services
Manage Data Loss Prevention (DLP)
• plan a DLP solution
• create and manage DLP policies
• create and manage sensitive information types
• monitor DLP reports
• manage DLP notifications
• create queries to locate sensitive data
Implement and manage Microsoft Cloud App Security
• plan Cloud App Security implementation
• configure Office 365 Cloud App Security
• perform productivity app discovery using Cloud App Security
• manage entries in the Cloud app catalog
• manage third-party apps in Office 365 Cloud App Security
• manage Microsoft Cloud App Security
• configure Cloud App Security connectors
• configure Cloud App Security policies
• configure and manage Cloud App Security templates
• configure Cloud App Security users and permissions
• review and respond to Cloud App Security alerts
• review and interpret Cloud App Security dashboards and reports
• review and interpret Cloud App Security activity log and governance log
Configure and analyze security reporting
• interpret Windows Analytics
• configure Windows Telemetry options
• configure Office Telemetry options
• review and interpret security reports and dashboards
• plan for custom security reporting with Intelligent Security Graph
• review Office 365 secure score action and recommendations
• configure reports and dashboards in Azure Log Analytics
• review and interpret reports and dashboards in Azure Log Analytics
• configure alert policies in the Office 365 Security and Compliance Center
Manage and analyze audit logs and reports
• plan for auditing and reporting
• configure Office 365 auditing and reporting
• perform audit log search
• review and interpret compliance reports and dashboards
• configure audit alert policy
Configure Office 365 classification and labeling
• plan for data governance classification and labels
• search for personal data
• apply labels to personal data
• monitor for leaks of personal data
• create and publish Office 365 labels
• configure label policies
Manage data governance and retention
• plan for data governance and retention
• review and interpret data governance reports and dashboards
• configure retention policies
• define data governance event types
• define data governance supervision policies
• configure Information holds
• find and recover deleted Office 365 data
• import data in the Security and Compliance Center
• configure data archiving
• manage inactive mailboxes
Manage search and investigation
• plan for content search and eDiscovery
• delegate permissions to use search and discovery tools
• use search and investigation tools to perform content searches
• export content search results
• manage eDiscovery cases
Manage data privacy regulation compliance
• plan for regulatory compliance in Microsoft 365
• review and interpret GDPR dashboards and reports
• manage Data Subject Requests (DSRs)
• review Compliance Manager reports
• create and perform Compliance Manager assessments and action items