Information Protection and Compliance Training Course Training 課程
  Facebook: Information Protection and Compliance Training Course Training 課程
 
Information Protection and Compliance Training Course Training 課程
Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程  
Information Protection and Compliance Training Course Training 課程 Information Protection and Compliance Training Course Training 課程

想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!

【基礎普通話拼音課程】費用全免!

Microsoft Certified Information Protection and Compliance Administrator Associate (1 科 Microsoft 365 商務雲端保安) 國際認可證書課程
課程簡稱:Information Protection and Compliance Training Course

  • 課程時間
  • 課程簡介
  • 課程特點
  • 認證要求
  • 考試須知
  • 課程內容
  • 認證考試

課程優惠!現凡同時報讀以下三個課程:
即減 $1,230!報讀其中兩個即減 $730!

地區 地址 電話 教育局註冊編號
旺角 九龍旺角亞皆老街 109 號,皆旺商業大廈 18 樓 1802 - 1807 室 2332-6544 533459
觀塘 九龍觀塘成業街 7 號寧晉中心 12 樓 G2 室 3563-8425 588571
北角 香港北角馬寶道 41-47 號華寶商業大廈 3 樓 01-02 號舖 3580-1893 591262
沙田 新界沙田石門安群街 3 號京瑞廣場 1 期 10 樓 M 室 2151-9360 604488
屯門 新界屯門屯喜路 2 號屯門柏麗廣場 17 樓 1708 室 3523-1560 592552
注意! 客戶必須查問報讀學校的教育局註冊編號,以確認該校為註冊學校,以免蒙受不必要的損失!


本中心是 Microsoft 認可的合作夥伴 (Microsoft Certified Partner)。


Preface

With the recent mass data leaks, encompassing sensitive information such as human resources data, ID card numbers, dates of birth, social media accounts, academic and banking details, as well as health information, there has been a significant damage to the reputation of Asia I.T. Hub – Hong Kong.

Government sectors, enterprises and international communities are expressing heightened concerns regarding the effective storage and security of information, accompanied by proactive defense measures and compliance controls.

As a leading provider of security services, Microsoft took the initiative by releasing a Threat Intelligence Analyst Report in July 2022. This report presented actionable recommendations to proactively defend against potential cyberattacks.

microsoft-365-fundamentals/microsoft-365-fundamentals-course-training

Microsoft’s approach includes the following key elements:

Threat Intelligence Analyst Reports
These reports are valuable resources for comprehending the evolving threat landscape. They provide insights into emerging threats, attack patterns, and vulnerabilities that organizations should remain vigilant about.

Mitigation Recommendations
Microsoft, along with other security service providers, frequently releases recommendations to mitigate known security risks. These recommendations encompass best practices, system configurations, and the utilization of security tools.

Proactive Defense
Microsoft advocates for proactive cybersecurity measures. This entails the implementation of advanced security solutions such as Microsoft Sentinel, Microsoft 365 Defender, and Defender for Cloud, which offer threat detection, response, and prevention capabilities.

Compliance Controls
Compliance with data protection regulations is of utmost importance. Microsoft offers tools and services to assist organizations in meeting compliance requirements, including GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), and others, contingent on their specific industry.

Security Awareness
An essential aspect of Microsoft’s approach is educating users and organizations on cybersecurity best practices. They provide resources and training to empower users to identify and mitigate threats effectively.

Data Encryption and Access Controls
Microsoft underscores the significance of data encryption and stringent access controls to safeguard sensitive information. Azure Key Vault and Microsoft Entra ID (i.e. Azure AD) play pivotal roles in achieving this.

Incident Response
In the event of a security incident or data breach, Microsoft provides guidance on how to respond efficiently. This encompasses containment strategies, investigative procedures, and notification protocols.

microsoft-365-fundamentals/microsoft-365-fundamentals-course-training


It is imperative for organizations not only to rely on the guidance and tools furnished by companies such as Microsoft but also to actively evaluate and bolster their own cybersecurity posture.

This often involves formulating a robust cybersecurity policy, staying abreast of emerging threats, conducting periodic security audits, and continually educating employees on security risks.

In essence, cybersecurity is an ongoing endeavor, and organizations must adapt to the ever-evolving threat landscape to effectively shield their data and preserve their reputation!

As an Information Protection and Compliance administrator, you plan and implement risk and compliance controls in the Microsoft Purview compliance portal.

In this role, you translate an organization’s risk and compliance requirements into technical implementation.

You are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance.

You work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization’s risk reduction and compliance goals.

You assist workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls.



Microsoft Certified Information Protection and Compliance Administrator Associate

The certification “Microsoft Certified Information Protection and Compliance Administrator Associate” validates your capability to implement security controls and threat protection, protecting data and applications in M365 cloud and hybrid environments as part of end-to-end infrastructure.

About the course
Our training course will guide you through carefully selected examination topics, along with real-life examples, practical demonstration and business cases of implementing, verifying and maintaining various Microsoft 365’s Information Protection and Compliance features.

Evaluations, Pros and Cons and may be comparisons of different Microsoft 365 products would be verbally provided throughout the training course.

As Microsoft has been partnering with multiple 3rd party vendors and built security-related ecosystems, it is inevitable that a small portion of the course time would be spent on briefly discussing popular partner security solutions.

Our senior instructor Mr. Larry Chan would give you advise, tricks and tips on various cloud security-related products.


課程名稱: Microsoft Certified Information Protection and Compliance Administrator Associate (1 科 Microsoft 365 商務雲端保安) 國際認可證書課程
- 簡稱:Information Protection and Compliance Training Course
課程時數: 24 小時 (共 8 堂,共 1 科)
適合人士: 有志考取Microsoft Certified Information Protection and Compliance Administrator Associate證書人士; 或
有 Microsoft 365 商務雲端基本認識人士; 或
有少量 Microsoft 365使用經驗人士; 或
對雲端保安技術有興趣人士; 或
已修畢 Microsoft Certified 365 Fundamentals國際認可證書課程 人士
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英文為主筆記,而部份英文字附有中文對照。

1. 模擬考試題目: 本中心為學員提供模擬考試題目,每條考試題目均附有標準答案。
2. 時數適中: 本中心的 Microsoft Certified Information Protection and Compliance Administrator Associate (1科Microsoft 365商務雲端保安) 國際認可證書課程 時數適中,有 24 小時。

令學員能真正了解及掌握課程內容,而又能於 3 個月內考獲以下 1 張國際認可證書:

  • Microsoft Certified Information Protection and Compliance Administrator Associate
3. 導師親自編寫筆記: 由本中心已擁有五項 MCITP,十多項 MCTS、MCSA 及 MCSE 資格,並有教授 Microsoft 相關課程 23 年以上經驗的資深導師 Larry Chan 親自編寫筆記,絕對適合考試及實際管理之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
4. 一人一機上課: 本課程以一人一機模式上課。
5. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

Microsoft 已公佈考生只要通過以下 1 個 Information Protection and Compliance 相關科目的考試,便可獲發 Microsoft Certified Information Protection and Compliance Administrator Associate 國際認可證書:

考試編號 科目名稱
SC-400 Administering Information Protection and Compliance in Microsoft 365



本中心為Microsoft指定的考試試場。報考時請致電本中心,登記欲報考之科目考試編號、考試日期及時間 (最快可即日報考)。臨考試前要出示身份證及繳付每科 HK$1,025 之考試費。

考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為單項及多項選擇題。

考試合格後會收到來自Microsoft的作實電郵,並進入該電郵內的連結,登入 Certification Dashboard 下載您的證書。

考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁 "各科考試分數資料"。





課程名稱:Microsoft Certified Information Protection and Compliance Administrator Associate (1 科 Microsoft 365 商務雲端保安) 國際認可證書課程
- 簡稱:Information Protection and Compliance Training Course

SC-400 Administering Information Protection and Compliance in Microsoft 365 (24 hrs)

Implement information protection

  • Create and manage sensitive info types
  • Identify sensitive information requirements for an organization's data
  • Translate sensitive information requirements into built-in or custom sensitive info types
  • Create and manage custom sensitive info types
  • Create and manage exact data match (EDM) classifiers
  • Implement document fingerprinting
  • Create and manage trainable classifiers
  • Identify when to use trainable classifiers
  • Design and create a trainable classifier
  • Test a trainable classifier
  • Retrain a trainable classifier
  • Implement and manage sensitivity labels
  • Implement roles and permissions for administering sensitivity labels
  • Define and create sensitivity labels
  • Configure and manage sensitivity label policies
  • Configure auto-labeling policies for sensitivity labels
  • Monitor data classification and label usage by using Content explorer, Activity explorer, and audit search
  • Apply bulk classification to on-premises data by using the Microsoft Purview Information Protection scanner
  • Manage protection settings and marking for applied sensitivity labels
  • Design and implement encryption for email messages
  • Design an email encryption solution based on methods available in Microsoft 365
  • Implement Microsoft Purview Message Encryption
  • Implement Microsoft Purview Advanced Message Encryption

Implement DLP

  • Create and configure DLP policies
  • Design DLP policies based on an organization’s requirements
  • Configure permissions for DLP
  • Create and manage DLP policies
  • Interpret policy and rule precedence in DLP
  • Configure a Microsoft Defender for Cloud Apps file policy to use DLP policies
  • Implement and monitor Endpoint DLP
  • Configure advanced DLP rules for devices in DLP policies
  • Configure Endpoint DLP settings
  • Recommend a deployment method for device onboarding
  • Identify endpoint requirements for device onboarding
  • Monitor endpoint activities
  • Implement the Microsoft Purview Extension
  • Monitor and manage DLP activities
  • Analyze DLP reports
  • Analyze DLP activities by using Activity explorer
  • Remediate DLP alerts in the Microsoft Purview compliance portal
  • Remediate DLP alerts generated by Defender for Cloud Apps

Implement data lifecycle and records management

  • Retain and delete data by using retention labels
  • Plan for information retention and disposition by using retention labels
  • Create retention labels for data lifecycle management
  • Configure and manage adaptive scopes
  • Configure a retention label policy to publish labels
  • Configure a retention label policy to auto-apply labels
  • Interpret the results of policy precedence, including using Policy lookup
  • Manage data retention in Microsoft 365 workloads
  • Create and apply retention policies for SharePoint and OneDrive
  • Create and apply retention policies for Microsoft 365 groups
  • Create and apply retention policies for Yammer
  • Create and apply retention policies for Exchange Online
  • Apply mailbox holds in Exchange Online
  • Implement Exchange Online archiving policies
  • Configure preservation locks for retention policies and retention label policies
  • Recover retained content in Microsoft 365
  • Implement Microsoft Purview records management
  • Create and configure retention labels for records management
  • Manage retention labels by using a file plan, including file plan descriptors
  • Classify records by using retention labels and retention label policies
  • Manage event-based retention
  • Manage the disposition of content in records management
  • Configure records management settings, including retention label settings and disposition settings

Monitor and investigate data and activities by using Microsoft Purview

  • Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager
  • Plan for regulatory compliance in Microsoft 365
  • Create and manage assessments
  • Create and modify custom templates
  • Interpret and manage improvement actions
  • Create and manage alert policies for assessments
  • Plan and manage eDiscovery and Content search
  • Choose between eDiscovery (Standard) and eDiscovery (Premium) based on an organization’s requirements
  • Plan and implement eDiscovery
  • Delegate permissions to use eDiscovery and Content search
  • Perform searches and respond to results from eDiscovery
  • Manage eDiscovery cases
  • Perform searches by using Content search
  • Manage and analyze audit logs and reports in Microsoft Purview
  • Choose between Audit (Standard) and Audit (Premium) based on an organization’s requirements
  • Plan for and configure auditing
  • Investigate activities by using the unified audit log
  • Review and interpret compliance reports and dashboards
  • Configure alert policies
  • Configure audit retention policies

Manage insider and privacy risk in Microsoft 365

  • Implement and manage Microsoft Purview Communication Compliance
  • Plan for communication compliance
  • Create and manage communication compliance policies
  • Investigate and remediate communication compliance alerts and reports
  • Implement and manage Microsoft Purview Insider Risk Management
  • Plan for insider risk management
  • Create and manage insider risk management policies
  • Investigate and remediate insider risk activities, alerts, and reports
  • Manage insider risk cases
  • Manage forensic evidence settings
  • Manage notice templates
  • Implement and manage Microsoft Purview Information Barriers (IBs)
  • Plan for IBs
  • Create and manage IB segments and policies
  • Configure Teams, SharePoint, and OneDrive to enforce IBs, including setting barrier modes
  • Investigate issues with IB policies
  • Implement and manage privacy requirements by using Microsoft Priva
  • Configure and maintain privacy risk management
  • Create and manage Privacy Risk Management policies
  • Identify and monitor potential risks involving personal data
  • Evaluate and remediate alerts and issues
  • Implement and manage subject rights requests

The course content above may change at any time without notice in order to better reflect the content of the examination.



透過本中心的課程,您便可考取下表的各項 Microsoft 認證及考試:

按此下載 Microsoft 認證及考試編號對照表 (Excel 格式)

按此下載 Microsoft 認證及考試編號對照表

更多綜合課程
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音 (免費)
  • 進階普通話拼音
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3