We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Microsoft Information Protection and Compliance

Implementing Data Loss Prevention (DLP)

Michael Brown

Securing data is a core skill, and data loss prevention (DLP) sits at the heart of that skill. This course teaches you how to work with Microsoft Purview and other tools to implement DLP, and prepare you for the DLP section of the SC-400 exam.

Read more

Securing data is a core skill, and data loss prevention (DLP) sits at the heart of that skill. This course teaches you how to work with Microsoft Purview and other tools to implement DLP, and prepare you for the DLP section of the SC-400 exam.

Protecting your data from exposure and making sure it's used in the appropriate way is vital for any organization. In this course, Microsoft Information Protection and Compliance: Implementing Data Loss Prevention (DLP), you’ll learn to work with Microsoft DLP technologies that will help you protect your data from unintended exposure. First, you’ll explore what is meant by DLP and how a typical organization would use it. Next, you’ll discover how to implement DLP by working with Microsoft Purview, before looking at Microsoft Endpoint data loss prevention. Finally, you’ll learn how to implement DLP reporting and how to monitor endpoint activities. When you’re finished with this course, you’ll have the skills and knowledge of Microsoft data loss prevention needed to become an effective member of a data security team, and you'll know the necessary material for the DLP section of the Administering Information Protection and Compliance in Microsoft 365 certification exam.

Enroll now

What's inside

Syllabus

Course Overview
Introducing Data Loss Prevention (DLP)
Implementing Data Loss Prevention with Microsoft Purview
Diving Deep into Data Loss Prevention Policies
Read more
Implementing Data Loss Prevention for Microsoft Defender for Cloud Apps and Power Platform
Implementing Data Loss Prevention Reports and Alerts
Reviewing What We Have Learned

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches skills and knowledge that are highly relevant in an academic setting
Provides foundation for work in the field of data security
Explores Microsoft Purview and other Microsoft tools for data loss prevention
Requires strong foundational knowledge of DLP concepts and practices
Focuses on Microsoft products and services, which may limit applicability to users of other platforms
Presents a comprehensive approach to data loss prevention implementation

Save this course

Save Microsoft Information Protection and Compliance: Implementing Data Loss Prevention (DLP) to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Microsoft Information Protection and Compliance: Implementing Data Loss Prevention (DLP). These are activities you can do either before, during, or after a course.

Career center

Learners who complete Microsoft Information Protection and Compliance: Implementing Data Loss Prevention (DLP) will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They develop and implement security measures, such as firewalls, intrusion detection systems, and access control lists. Information Security Analysts also monitor security logs and investigate security incidents.
Data Privacy Manager
A Data Privacy Manager is responsible for developing and implementing a data privacy program for an organization. They identify and assess privacy risks, develop and implement privacy policies and procedures, and train employees on privacy compliance. Data Privacy Managers also work with legal counsel to ensure that the organization is in compliance with privacy laws.
Security Consultant
Security Consultants provide advice to organizations on how to improve their security posture. They assess an organization's security risks, develop security plans, and implement security measures. Security Consultants also work with organizations to develop and implement security policies and procedures.
Data Protection Officer
A Data Protection Officer (DPO) is responsible for overseeing an organization's compliance with data protection laws. They develop and implement data protection policies and procedures, train employees on data protection compliance, and respond to data breaches.
Network Administrator
Network Administrators are responsible for managing an organization's computer networks. They install and maintain network hardware and software, monitor network traffic, and troubleshoot network problems.
Systems Administrator
Systems Administrators are responsible for managing an organization's computer systems. They install and maintain operating systems and software, monitor system performance, and troubleshoot system problems.
Forensic Computer Analyst
A Forensic Computer Analyst is a computer expert who specializes in recovering and analyzing electronic data. They are often called upon to investigate computer crimes, such as hacking and identity theft.
Information Security Auditor
An Information Security Auditor is responsible for auditing an organization's information security program. They assess the organization's compliance with security standards and regulations, and make recommendations for improvements.
Compliance Manager
A Compliance Manager is responsible for ensuring that an organization is in compliance with relevant laws and regulations. They develop and implement compliance programs, train employees on compliance requirements, and conduct compliance audits.
Privacy Analyst
A Privacy Analyst is responsible for analyzing an organization's data privacy practices. They identify and assess privacy risks, develop and implement privacy policies and procedures, and train employees on privacy compliance.
Software Developer
Software Developers design, develop, and test computer software. They work in a variety of industries, including information technology, finance, and healthcare.
Database Administrator
A Database Administrator is responsible for managing an organization's database systems. They install and maintain database software, monitor database performance, and troubleshoot database problems.
IT Project Manager
An IT Project Manager is responsible for planning, executing, and closing IT projects. They work with stakeholders to define project scope, develop project plans, and manage project risks.
Risk Manager
A Risk Manager is responsible for identifying, assessing, and mitigating risks to an organization. They develop and implement risk management plans, train employees on risk management, and conduct risk audits.
Business Analyst
A Business Analyst is responsible for analyzing an organization's business processes. They identify and document business requirements, develop process improvements, and train employees on new processes.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Information Protection and Compliance: Implementing Data Loss Prevention (DLP).
Provides comprehensive coverage of information security management, including topics such as risk management, incident response, and business continuity planning.
Provides a comprehensive overview of DLP for government. It covers all aspects of DLP for government, from planning and design to implementation and monitoring. It valuable resource for those who are responsible for implementing DLP in their organization.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Information Protection and Compliance: Implementing Data Loss Prevention (DLP).
Microsoft 365 Administration: Managing Compliance Using...
Most relevant
Microsoft Purview: Manage and Protect On-premises Content
Most relevant
Data Security Champion: Data Loss Prevention
Most relevant
Microsoft Purview: Manage and Protect Microsoft 365...
Most relevant
Google Workspace Mail Management
Most relevant
Microsoft Purview: Introduction and Getting Started
Most relevant
Google Workspace Mail Management
Most relevant
Microsoft Information Protection and Compliance:...
Most relevant
Microsoft 365 Administration: Managing Security Using...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser