Microsoft Logo

SC-400: Microsoft Information Protection Administrator Training

Microsoft Information Protection Administrator training is a career-defining course intended for all IT personnel. The professional will plan and implement measures to meet a firm's compliance needs on learning this course.

📘 Security 🎓 Certification: YES 👥 1353 Enrolled ⏱️ 2 Days 💼 Intermediate Level ⭐ 4.8 | 113 Reviews

Why Microtek Learning?

500+

Courses

10+ Years

Experience

95K+

Global Learners

Virtual Instructor-Led Training

$1322
📄 Download PDF
| SC-400: Microsoft Information Protection Administr

Course Overview

Note: This course is scheduled to retire on May 30th, 2025.

Microsoft Information Protection Administrator training is a career-defining course intended for all IT personnel. The professional will plan and implement measures to meet a firm's compliance needs on learning this course. This course offers some skills by which professionals will translate the requirements and the compliances for IT implementation. 

During the continuation of this course, professionals will learn how to implement information protection. Professionals will find out ways to data loss prevention. After completing the course, professionals will learn about the best practices to test all the IT processes and check whether they are compliance. 

At the end of the SC-400: Microsoft Information Protection Administrator course, professionals will establish themself as information protection administrators, risk practitioners, and security engineers.

This training is designed based on the objectives of the course variant SC-400T00-A.

Mode of Training

🏫 Classroom 💻 Live Online 🧪 Blended 👨‍👩‍👧‍👦 Private Group

What you will learn

  • Explain and use sensitivity labels.
  • Configure Data Loss Prevention policies.
  • Secure messages in Office 365.
  • Describe the information governance configuration process.
  • Define key terms associated with Microsofts information protection and governance solutions.
  • Explain the Content explorer and Activity explorer.
  • Describe how to use sensitive information types and trainable classifiers.
  • Review and analyze DLP reports.
  • Identify and mitigate DLP policy violations.
  • Describe the integration of DLP with Microsoft Cloud App Security (MCAS).
  • Deploy Endpoint DLP
  • Describe records management
  • Configure event-driven retention
  • Import a file plan
  • Configure retention policies and labels
  • Create custom keyword dictionaries
  • Implement document fingerprinting

Who Should Attend This Course?

Data Protection Professionals who focus on Data loss prevention, Data privacy, and Data retention.

The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant.

They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization.

They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies. This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.

 

Prerequisites

  • Foundational knowledge of Microsoft security and compliance technologies.
  • Basic knowledge of information protection concepts.
  • Understanding of cloud computing concepts.
  • Understanding of Microsoft 365 products and services.

📞 Talk to a Learning Advisor

Please enter Name
Please enter a valid email address.
Please enter a valid phone number in international format (e.g., +14155552671).
Please enter Message
Please agree to I agree to Terms & Privacy Policy*.
Please agree to I authorize Microtek Learning to contact me via Phone/Email*.

📘 SC-400: Microsoft Information Protection Administrator Outline

Lesson

  • Introduction to information protection and governance in Microsoft 365
  • Classify data for protection and governance
  • Create and manage sensitive information types
  • Describe Microsoft 365 encryption
  • Deploy message encryption in Office 365
  • Configure sensitivity labels
  • Apply and manage sensitivity labels

Lab: Implement Information Protection

  • Assign permissions for compliance
  • Manage Office 365 message encryption
  • Manage Sensitive Information Types
  • Manage Trainable Classifiers
  • Manage Sensitivity Labels

After completing this module, students will be able to:

  • List the components of the Data Classification solution.
  • Describe how to use sensitive information types and trainable classifiers.
  • Implement document fingerprinting
  • Create custom keyword dictionaries
  • Deploy message encryption in Office 365

Lesson

  • Prevent Data loss in Microsoft 365
  • Implement Endpoint data loss prevention
  • Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
  • Manage DLP policies and reports in Microsoft 365

Lab: Implement Data Loss Prevention

  • Manage DLP policies
  • Manage Endpoint DLP
  • Test DLP policies
  • Manage DLP reports

After completing this module, students will be able to:

  • Describe the information protection configuration process.
  • Articulate deployment and adoption best practices.
  • Describe the integration of DLP with Microsoft Defender for Cloud Apps.
  • Configure policies in Microsoft Defender for Cloud Apps.
  • Review and analyze DLP reports.
  • Identify and mitigate DLP policy violations.
  • Mitigate DLP violations in Microsoft Defender for Cloud Apps.

Lesson

  • Govern information in Microsoft 365
  • Manage data retention in Microsoft 365 workloads
  • Manage records in Microsoft 365

Lab: Implement Information Governance

  • Configure Retention Labels
  • Implement Retention Labels
  • Configure Service-based Retention
  • Use eDiscovery for Recovery
  • Configure Records Management

After completing this module, students will be able to:

  • Describe the information governance configuration process.
  • Articulate deployment and adoption best practices.
  • Describe the retention features in Microsoft 365 workloads.
  • Configure retention settings in Microsoft Teams and SharePoint Online.
  • Implement retention for Exchange Mailbox items.
  • Recover content protected by retention settings.
  • Regain protected items from Exchange Mailboxes.
  • Describe the records management configuration process.

Still have questions?

Reach out to our learning advisors for personalized guidance on choosing the right course, group training, or enterprise packages.

📞 Talk to an Advisor

What You Get with Microtek Learning

Instructor-Led Excellence

  • Certified Instructor-led Training
  • Top Industry Trainers
  • Official Student Handbooks

Measurable Learning Outcomes

  • Pre- & Post-Training Assessments
  • Practice Tests
  • Exam-Oriented Curriculum

Real-World Skill Building

  • Hands-on Activities & Scenarios
  • Interactive Online Courses
  • Peer Collaboration (Not in self-paced)

Full Support & Perks

  • Exam Scheduling Support *
  • Learn & Earn Program *
  • Support from Certified Experts
  • Gov. & Private Pricing *

Our Clients

For over 10 years, Microtek Learning has helped organizations, leaders, students and professionals to reach their maximum potential. We have led the path by addressing their challenges and advancing their performances.

Actemium
US Dept of Defense
Education Advisory Board
GE Digital
Department of Homeland Security
Pacific Life
MetLife
AIG
Chase
DC Gov
Johnson & Johnson
William Osler Health System
Google

Our Awards

Microsoft Award

Microsoft Learning
Partner of the Year

Inc 5000

5000 List of the Fastest-Growing Private Companies in America

Top IT Training

Top IT Training Companies
(Multiple Years)

Why We Are Best To Choose?

Team Support

Professional Team Support

Our expert counseling team provides round-the-clock assistance with the best value offers.

Experienced Trainers

Experienced Trainers

Certified trainers with 5–15 years of real-world industry experience guide your learning.

Satisfaction Guarantee

100% Satisfaction Guarantee

We guarantee satisfaction with top-quality content and instructor delivery.

Real-World Experience

Real-World Experience

Train with industry projects and curricula aligned to current standards.

Best Price Guarantee

Best Price Guarantee

We promise the lowest pricing and best offers in the market.

Guaranteed to Run

Guaranteed to Run

All courses are assured to run on scheduled dates via all delivery methods.

Security Learning Resources

Explore our collection of free resources to boost your Security learning journey

Blogs

Security Expert Blogs

Explore insights from industry experts to stay ahead in tech—dive into our Expert Blogs now!

Read Blogs
Talk to Advisor