Bootcamp Details

M365 WORKLOAD BOOTCAMP
Microsoft 365 Workloads Mastery

Commence your 12-week M365 adventure by joining our M365 Solutions Training with mentorship . Delve into fundamental concepts, essential tools, and basic functionalities across Microsoft 365. Develop a robust grasp of productivity and collaboration features, laying the foundation for efficient work in todayā€™s digital workspace. Begin your M365 journey with assurance andĀ proficiency.

EVENT DETAIL
4:00PM WAT
8-12 Weeks Training & Certification
Teams
Microsoft 365 Workloads Mastery
ABOUT EVENT

Commence your 12-week M365 adventure by joining our M365 Solutions Training with mentorship . Delve into fundamental concepts, essential tools, and basic functionalities across Microsoft 365. Develop a robust grasp of productivity and collaboration features, laying the foundation for efficient work in todayā€™s digital workspace. Begin your M365 journey with assurance andĀ proficiency.

BEGINNERS / CHANGE OF CARRIER MODULE

Bootcamp Fee (Training + Mentorship): N300,000 N270,000

Commence your 12-week M365 adventure by joining our Beginner Solutions Training with mentorship . Delve into fundamental concepts, essential tools, and basic functionalities across Microsoft 365. Develop a robust grasp of productivity and collaboration features, laying the foundation for efficient work in today’s digital workspace. Begin your M365 journey with assurance andĀ proficiency.

Module Outline:

  • Module 1: Describe cloud computing
  • Module 2: Describe the benefits of using cloud services
  • Module 3: Describe cloud service types
  • Module 1: What is Microsoft 365?
  • Module 2: Describe productivity solutions of Microsoft 365
  • Module 3: Describe collaboration solutions of Microsoft 365
  • Module 4: Describe endpoint modernization, management concepts, and deployment options in Microsoft 365
  • Module 5: Describe analytics capabilities of Microsoft 365
  • Module 1: Describe the function and identity types of Microsoft Entra ID
  • Module 2: Describe access management capabilities of Microsoft Entra ID
  • Module 3: Describe threat protection with Microsoft 365 Defender
  • Module 4: Describe the compliance management capabilities in Microsoft Purview
  • Module 5: Describe Microsoftā€™s Service Trust portal and privacy capabilities
  • Module 1: Describe Microsoft 365 pricing, licensing, and billing options
  • Module 2: Describe support offerings for Microsoft 365 services

INTERMEDIATE MODULE

Bootcamp Fee (Training + Mentorship): N250,000 N225,000

In 8 weeks Take your M365 expertise to the next level with our Intermediate Solutions Training with free mentorship. Dive into advanced features, collaboration tools, security measures, and automation techniques. Develop a comprehensive understanding of Microsoft 365 solutions, empowering you to optimize productivity, enhance teamwork, and secure data in a modern workplaceĀ environment.

Module Outline:

Module 1: Configure your Microsoft 365 experience

Module 2: Manage users, licenses, and mail contacts in Microsoft 365.

Module 3: Manage groups in Microsoft 365

Module 4: Add a custom domain in Microsoft 365

Module 5: Configure client connectivity to Microsoft 365

Module 1: Configure administrative roles in Microsoft 365

Module 2: Manage tenant health and services in Microsoft 365

Module 3: Deploy Microsoft 365 Apps for enterprise

Module 4: Analyze your Microsoft 365 workplace data using Microsoft Viva Insights

Module 1: Explore identity synchronization.

Module 2: Prepare for identity synchronization to Microsoft 365

Module 3: Implement directory synchronization tools

Module 4: Manage synchronized identities

Module 5: Manage secure user access in Microsoft 365

Module 1: Examine threat vectors and data breaches

Module 2: Explore the Zero Trust security model

Module 3: Explore security solutions in Microsoft Defender XDR

Ā Module 4: Examine Microsoft Secure Score

Module 5: Examine Privileged Identity Management

Module 1: Examine Exchange Online Protection

Ā Module 2: Examine Microsoft Defender for Office 365

Module 3: Manage Safe Attachments

Module 4: Manage Safe Links

Module 1: Explore threat intelligence in Microsoft Defender XDR

Module 2: Implement app protection by using Microsoft Defender for Cloud Apps

Module 3: Implement endpoint protection by using Microsoft Defender for Endpoint

Module 4: Implement threat protection by using Microsoft Defender for Office 365

Module 1: Examine data governance solutions in Microsoft Purview

Module 2: Explore archiving and records management in Microsoft 365

Module 3: Explore retention in Microsoft 365

Module 4: Explore Microsoft Purview Message Encryption

Module 1: Explore compliance in Microsoft 365

Module 2: Implement Microsoft Purview Insider Risk Management

Module 3: Implement Microsoft Purview Implementation Barriers

Module 4: Explore Microsoft Purview Data Loss Prevention

Module 5: Implement Microsoft Purview Data Loss Prevention

Module 1: Implement data classification of sensitive information.

Module 2: Explore sensitivity labels Module 3: Implement sensitivity labels

EXPERT MODULE

Bootcamp Fee (Training + Mentorship): N350,000 N325,000

In 8 weeks , Elevate your expertise in Microsoft 365 with our Expert Solutions Training with free mentorship. Delve deep into advanced configurations, customization, and strategic implementation. Master complex features, governance, and compliance measures. Gain the skills to optimize M365 for diverse organizational needs, becoming a proficient architect of cutting-edge, integratedĀ solutions.

Module Outline:

  • Explore identity and Microsoft Entra ID
  • Implement initial configuration of Microsoft Entra ID
  • Create, configure, and manage identities
  • Implement and manage external identities
  • Implement and manage hybrid identities
  • Secure Microsoft Entra users with Multifactor Authentication
  • Manage user authentication
  • Plan, implement, and administer Conditional Access
  • Manage Microsoft Entra Identity Protection
  • Implement access management for Azure resources
  • Plan and design the integration of enterprise apps for SSO
  • Implement and monitor the integration of enterprise apps for SSO
  • Implement app registration
  • Plan and implement entitlement management
  • Plan, implement, and manage access reviews
  • Plan and implement privileged access
  • Monitor and maintain Microsoft Entra ID

Module Outline:

  • Module 1: Introduction to Microsoft 365 threat protection
  • Module 2: Mitigate incidents using Microsoft Defender XDR
  • Module 3: Protect your identities with Entra ID Protection
  • Module 4: Remediate risks with Microsoft Defender for Office 365
  • Module 5: Safeguard your environment with Microsoft Defender for Identity
  • Module 6: Secure your cloud apps and services with Microsoft Defender for Cloud Apps
  • Module 1: Microsoft Purview Compliance Solutions
  • Module 2: Respond to data loss prevention alerts using Microsoft Purview
  • Module 3: Manage insider risk in Microsoft Purview
  • Module 4: Investigate threats using Content search in Microsoft Purview
  • Module 5: Investigate threats using Microsoft Purview Audit
  • Module 1: Protect against threats with Microsoft Defender for Endpoint
  • Module 2: Deploy the Microsoft Defender for Endpoint environment
  • Module 3: Implement Windows security enhancements with Microsoft Defender for Endpoint
  • Module 4: Perform device investigations in Microsoft Defender for Endpoint
  • Module 5: Perform actions on a device using Microsoft Defender for Endpoint
  • Module 6: Perform evidence and entities investigations using Microsoft Defender for Endpoint
  • Module 7: Configure and manage automation using Microsoft Defender for Endpoint
  • Module 8: Configure for alerts and detections in Microsoft Defender for Endpoint
  • Module 9: Utilize Vulnerability Management in Microsoft Defender for Endpoint
  • Module 1: Plan for cloud workload protections using
    Microsoft Defender for Cloud
  • Module 2: Connect Azure assets to Microsoft Defender for Cloud
  • Module 3: Connect non-Azure resources to Microsoft Defender for Cloud
  • Module 4: Manage your cloud security posture management
  • Module 5: Explain cloud workload protections in Microsoft Defender for Cloud
  • Module 6: Remediate security alerts using Microsoft Defender for Cloud
  • Module 1: Construct KQL statements for Microsoft Sentinel
  • Module 2: Analyze query results using KQL
  • Module 3: Build multi-table statements using KQL
  • Module 4: Work with data in Microsoft Sentinel using Kusto Query Language
  • Module 1: Introduction to Configure your Microsoft Sentinel
  • Module 2: Create and manage Microsoft Sentinel workspaces
  • Module 3: Query logs in Microsoft Sentinel
  • Module 4: Use watchlists in Microsoft Sentinel
  • Module 5: Utilize threat intelligence in Microsoft Sentinel
  • Module 1: Connect data to Microsoft Sentinel using data connectors
  • Module 2: Connect Microsoft services to Microsoft Sentinel
  • Module 3: Connect Microsoft Defender XDR to Microsoft Sentinel
  • Module 4: Connect Windows hosts to Microsoft Sentinel
  • Module 5: Connect Common Event Format logs to Microsoft Sentinel
  • Module 6: Connect syslog data sources to Microsoft Sentinel
  • Module 7: Connect threat indicators to Microsoft Sentinel
  • Module 1: Threat detection with Microsoft Sentinel analytics
  • Module 2: Automation in Microsoft Sentinel
  • Module 3: Threat response with Microsoft Sentinel playbooks
  • Module 4: Security incident management in Microsoft Sentinel
  • Module 5: Identify threats with Entity behavioral analytics in Microsoft Sentinel
  • Module 6: Data normalization in Microsoft Sentinel
  • Module 7: Query, visualize, and monitor data in Microsoft Sentinel
  • Module 8: Manage content in Microsoft Sentinel
  • Module 1: Explain threat-hunting concepts in Microsoft Sentinel
  • Module 2: Threat hunting with Microsoft Sentinel
  • Module 3: Use Search jobs in Microsoft Sentinel
  • Module 4: Threat hunting with Microsoft Sentinel
  • Module 5: Optional ā€“ Play Who Hacked? Cloud Game

Module Outline:

  • Module 1: Manage mail flow
  • Module 2: Troubleshoot mail flow
  • Module 3: Manage mail flow rules
  • Module 1: Plan for message security
  • Module 2: Manage anti-malware and anti-spam policies
  • Module 3: Explore threat protection in Microsoft 365 Defender
  • Module 1: Explore messaging compliance in Microsoft 365
  • Module 2: Explore messaging compliance in Exchange
  • Module 3: Manage Exchange Online archiving and auditing
  • Module 4: Manage content Search
  • Module 1: Manage authentication for messaging
  • Module 2: Configure organization settings
  • Module 3: Configure organization sharing
  • Module 1: Manage administrator roles
  • Module 2: Manage user roles
  • Module 3: Analyze role-based permissions
  • Module 1: Explore the different types of Exchange recipients
  • Module 2: Create and manage Exchange recipients
  • Module 3: Manage email addresses, lists, and resources
  • Module 1: Explore Exchange hybrid deployment requirements
  • Module 2: Plan and configure a hybrid deployment using the hybrid configurations wizard
  • Module 3: Plan mailbox migrations
  • Module 4: Run mailbox migrations
  • Module 5: Troubleshoot hybrid deployments

EVENT SPEAKER
Zakariyah Oyeniyi
Exchange Online Specialist
Saheed Tiamiyu
Exchange Online Specialist
Faith Amaka
SPO/OneDrive for Business Specialist
Chidi
Teams Specialist
Adejayi
MS Exchange Trainer
Oluwadamilola
MS Sharepoint Trainer
Shopping Basket

Volunteer forĀ 
Tech-In-The-Slum Initiative

Individual
Organisation
[forminator_form id="1321"]
[forminator_form id="1322"]