MS-100T00: Microsoft 365 Identity and Services
This course covers the core concepts of Microsoft 365 identity and services management.
- Overview
- Audience
- Prerequisites
- Curriculum
Description:
This course covers the core concepts of Microsoft 365 identity and services management. Participants will learn how to design and manage Microsoft 365 tenants, implement identity synchronization, configure security and compliance, and manage core Microsoft 365 workloads.
Through hands-on labs and real-world scenarios, learners will gain the skills needed to manage user identities, configure authentication methods, implement governance policies, and ensure secure access to Microsoft 365 services.
Duration:Â
4 Days
Course Code: BDT88
Learning Objectives:
After this course, you will be able to:
- Design and configure Microsoft 365 tenants
- Manage user identities and authentication methods
- Implement identity synchronization and federation
- Configure security and compliance solutions
- Manage Microsoft 365 services and workloads
- Prepare for Microsoft 365 certification exams
IT professionals, security analysts, security consultants, auditors, network architects, and professionals preparing for the CISSP certification
Basic understanding of IT infrastructure, networking, and security concepts; at least 2–5 years of experience in IT/security is recommendedÂ
Â
Course Outline:
Module 1: Security and Risk Management
- Security principles and governance
- Risk management processes
- Compliance, laws, and regulations
- Ethics and professional conduct
Module 2: Asset Security
- Data classification and ownership
- Data handling and protection methods
- Privacy and data security controls
Module 3: Security Architecture and Engineering
- Secure design principles
- Cryptography fundamentals
- Security models and frameworks
- Physical security considerations
Module 4: Communication and Network Security
- Network architecture and secure design
- Secure communication channels
- Network attacks and defenses
Module 5: Identity and Access Management (IAM)
- Authentication and authorization mechanisms
- Identity lifecycle management
- Access control models
Module 6: Security Assessment and Testing
- Security testing strategies
- Vulnerability assessments and penetration testing
- Audit and compliance checks
Module 7: Security Operations
- Incident response and handling
- Disaster recovery and business continuity
- Logging, monitoring, and investigations
Module 8: Software Development Security
- Secure software development lifecycle (SDLC)
- Application security principles
- Common vulnerabilities (OWASP Top 10)
Training Material Provided
- Comprehensive CISSP study guide aligned with CBK
- Practice questions and mock exams
- Case studies and real-world security scenarios
- Quick revision notes and exam tips




