Planning Security Strategies

Exchange 2016    |    Expert
  • 17 videos | 1h 23m
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 49 users Rating 4.6 of 49 users (49)
Security of corporate data tops the list of executive concerns today. Expand your security knowledge by learning about RBAC management, delegated setup, BitLocker, message encryption, transport protection rules, decryption, and IRM.

WHAT YOU WILL LEARN

  • Define the management role group architecture in rbac
    Identify admin roles in rbac
    Customize the rbac system
    Identify rbac and active directory split permissions
    Configure delegated setup
    Define bitlocker
    Identify smart card functions
    Plan and configure office 365 message encryption
    Plan and configure eop advanced threat protection
  • Plan and configure information rights management
    Plan and create transport protection rules
    Plan and create outlook protection rules (ems only)
    Configure transport decryption
    Configure journal decryption
    Plan and configure irm for ediscovery
    Troubleshoot failed irm protection
    Configure the scope of an rbac group

IN THIS COURSE

  • 8m 4s
    Learn how to define the management role group architecture in Role-Based Access Control. FREE ACCESS
  • 7m 24s
    In this video, find out how to identify administrator roles in RBAC. FREE ACCESS
  • Locked
    3.  Plan and Manage RBAC (Part 3)
    2m 48s
    In this video, you will learn how to customize the role-based access control system. FREE ACCESS
  • Locked
    4.  RBAC and Active Directory Split Permissions
    7m 16s
    Find out how to identify RBAC and active directory split permissions. FREE ACCESS
  • Locked
    5.  Configure Delegated Setup
    2m 9s
    In this video, learn how to configure setup delegation. FREE ACCESS
  • Locked
    6.  BitLocker
    5m 45s
    In this video, you will learn how to define BitLocker. FREE ACCESS
  • Locked
    7.  Smart Card Overview
    53s
    To find out how to identify smart card functions, consult a reliable source. FREE ACCESS
  • Locked
    8.  Plan and Configure Message Encryption for Office 365
    6m 14s
    During this video, you will learn how to plan and configure encryption for Office 365 messages. FREE ACCESS
  • Locked
    9.  Plan and Configure EOP Advanced Threat Protection
    4m 57s
    In this video, you will learn how to plan and configure advanced threat protection in EOP. FREE ACCESS
  • Locked
    10.  Plan and Configure Information Rights Management
    8m 11s
    Find out how to plan and configure information rights management. FREE ACCESS
  • Locked
    11.  Plan and Create Transport Protection Rules
    4m 12s
    Learn how to plan and create transport protection rules. FREE ACCESS
  • Locked
    12.  Plan and Create Outlook Protection Rules (EMS Only)
    2m 12s
    Learn how to plan and create Outlook protection rules (EMS only). FREE ACCESS
  • Locked
    13.  Configure Transport Decryption
    4m 17s
    In this video, you will learn how to configure transport decryption. FREE ACCESS
  • Locked
    14.  Configure Journal Decryption
    3m 1s
    In this video, you will learn how to configure journal decryption. FREE ACCESS
  • Locked
    15.  Plan and Configure IRM for eDiscovery
    7m 44s
    In this video, you will learn how to plan and configure Information Rights Management for eDiscovery. FREE ACCESS
  • Locked
    16.  Troubleshoot Failed IRM Protection
    4m 24s
    Learn how to troubleshoot failed IRM protection. FREE ACCESS
  • Locked
    17.  Exercise: Configure the Scope of an RBAC Group
    3m 29s
    In this video, find out how to configure the scope of an RBAC group. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 18 users Rating 4.8 of 18 users (18)
Rating 4.9 of 31 users Rating 4.9 of 31 users (31)
Rating 4.2 of 308 users Rating 4.2 of 308 users (308)