Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Microsoft 365: Admin Basics

Course Summary

This course is designed to provide learners with a comprehensive introduction to Microsoft 365 administration. The course aims to equip learners with the foundation to effectively administer Microsoft 365 environments by focusing on key areas such as Microsoft 365 tenant management, identity synchronization, and security and compliance. Through a combination of lectures, hands-on labs, and real-world scenarios, learners will gain the confidence to effectively manage Microsoft 365 services, secure organizational data, and optimize user identity management. Through hands-on exercises and real-world scenarios, learners will develop the expertise needed to excel as Microsoft 365 administrators.

Purpose
Equip learners with the foundation to effectively administer Microsoft 365 environments
Audience
In order to succeed in this course, you will need:
- Basic computer skills.
- Basic familiarity with Microsoft Office applications (helpful but not required).
- No prior Microsoft 365 admin experience needed.

Role
System Administrator
Skill level
Intermediate
Style
Lecture + Hands-on Activities
Duration
5 days
Related technologies
Azure | Windows |. Office 365

 

Productivity objectives
  • Set up and manage a Microsoft 365 tenant.
  • Create and manage user accounts, licenses, and roles.
  • Implement identity synchronization with Azure AD Connect.
  • Secure user identities with Single Sign-On (SSO) and Multi-Factor Authentication (MFA).
  • Apply security policies and controls to protect data.
  • Develop data protection and governance strategies.
  • Use compliance solutions to meet regulatory standards.
  • Troubleshoot common identity and security issues.
  • Implement best practices for security and compliance.
  • Create data backup and recovery plans.

 

What you'll learn:

In this course, you'll learn:
  • Microsoft 365 Tenant Management
    • Understanding Microsoft 365 and its Key Components
      • Introduction to Microsoft 365
      • Key Services in Microsoft 365
    • Tenant Setup and Configuration
      • Creating and Configuring a Microsoft 365 Tenant
      • Navigating the Microsoft 365 Admin Center
    • User Management in Microsoft 365
      • Creating User Accounts
      • Licensing and Role Assignment
      • Customizing User Profile Settings
  • Microsoft 365 Identity Synchronization
    • Managing User Identities and Authentication
      • User Identity Management
      • Authentication Methods in Microsoft 365
    • Identity Synchronization
      • Implementing Identity Synchronization with Azure AD Connect
      • Benefits of Identity Synchronization
    • Enhancing Security with SSO and MFA
      • Configuring Single Sign-On (SSO)
      • Implementing Multi-Factor Authentication (MFA)
  • Microsoft 365 Security and Compliance
    • Introduction to Microsoft 365 Security and Compliance
      • Security and Compliance Overview
      • The Role of Policies and Controls
    • Security Policies and Controls
      • Implementing Security Policies
      • Managing Authentication and Identity Protection
    • Data Protection and Governance
      • Data Protection Strategies
      • Governance Best Practices
    • Compliance Solutions in Microsoft 365
      • Compliance Features and Tools
      • Regulatory Compliance
  • Data Backup and Recovery in Microsoft 365
    • Data Backup Strategies for Microsoft 365
      • Backup Considerations
      • Implementing Data Backup Solutions
    • Data Recovery Best Practices
      • Data Recovery Methods
      • Planning for Data Recovery
  • Troubleshooting, Best Practices, and Incident Response
    • Troubleshooting Common Identity and Security Issues
      • Identifying and Resolving User Authentication Problems
      • Investigating Account Access Issues
      • Troubleshooting Email Delivery and Synchronization
    • Implementing Security and Compliance Best Practices
      • Reviewing Security Incident Response Procedures
      • Applying Security Updates and Patches
      • Ensuring Compliance with Regulatory Standards
    • Practical Scenarios and Case Studies
      • Real-world Problem Solving
      • Case Studies of Security Incidents and Resolutions

Dive in and learn more

When transforming your workforce, it’s important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.