Course Details
Topic 1 Implement Microsoft 365 Copilot
- Get ready for Microsoft 365 Copilot
- Implement SharePoint Advanced Management tools to prepare for Microsoft 365 Copilot
- Prepare your data for searches in Microsoft 365 Copilot
- Protect your Microsoft 365 Copilot data with Microsoft 365 security tools
- Assign your Microsoft 365 Copilot licenses
- Extend Microsoft 365 Copilot
- Drive Microsoft 365 Copilot adoption throughout your organization
Topic 2 Manage secure user access in Microsoft 365
- Examine the identity and access tools used in Microsoft 365
- Manage user passwords
- Implement Conditional Access policies
- Enable pass-through authentication
- Implement multifactor authentication
- Explore passwordless authentication options
- Explore self-service password management
- Implement Microsoft Entra Smart Lockout
- Explore Security Defaults in Microsoft Entra ID
- Investigate authentication issues using sign-in logs
Topic 3 Manage permissions, roles, and role groups in Microsoft 365
- Examine the use of roles in the Microsoft 365 permission model
- Manage roles across the Microsoft 365 ecosystem
- Explore administrator roles in Microsoft 365
- Examine best practices when configuring administrative roles
- Assign admin roles to users in Microsoft 365
- Delegate admin roles to partners
- Implement role groups in Microsoft 365
- Manage permissions using administrative units in Microsoft Entra ID
- Manage SharePoint permissions to prevent oversharing of data
- Elevate privileges using Microsoft Entra Privileged Identity Management
Topic 4 Deploy Microsoft 365 Apps for enterprise
- Explore Microsoft 365 Apps for enterprise functionality
- Complete a self-service installation of Microsoft 365 Apps for enterprise
- Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager
- Deploy Microsoft 365 Apps for enterprise from the cloud
- Deploy Microsoft 365 Apps for enterprise from a local source
- Manage updates to Microsoft 365 Apps for enterprise
- Explore the update channels for Microsoft 365 Apps for enterprise
- Manage your cloud apps using the Microsoft 365 Apps admin center
- Add Microsoft 365 Apps for enterprise to Microsoft Intune
- Deploy Microsoft 365 Apps for enterprise security baseline
Topic 5 Implement Microsoft Purview Data Loss Prevention
- Plan to implement Microsoft Purview Data Loss Protection
- Implement Microsoft Purview's default DLP policies
- Design a custom DLP policy
- Create a custom DLP policy from a template
- Configure email notifications for DLP policies
- Configure policy tips for DLP policies
Topic 6 Implement sensitivity labels
- Plan your deployment strategy for sensitivity labels
- Enable sensitivity labels for files in SharePoint and OneDrive
- Examine the requirements to create a sensitivity label
- Create sensitivity labels
- Publish sensitivity labels
- Remove and delete sensitivity labels
Topic 7 Manage Microsoft 365 Copilot extensibility
- Manage Copilot agents in integrated apps
- Create a connection between a data source and a Microsoft Graph connector
- Monitor your Microsoft Graph connectors
- Manage how Microsoft Graph connector content is displayed in Microsoft 365 Copilot
Course Info
Prerequisite:
Participants need to be acquainted with the following knowledge before attending the class
- Python
- Tensorflow
- Keras
HRDF Funding
Please refer to this video https://youtu.be/Kzpd-V1F9Xs
1- HRD Corp Grant Helper
How to submit grant applications for HRD Corp Claimable Courses
2- Employers are required to apply for the grant at least one week before training commences.
Employers must submit their applications with supporting documents, including invoices/quotations, trainer profiles, training schedule and course content.
3- First, Login to Employer’s e-TRIS account -https://etris.hrdcorp.gov.my
Second, Click Application
4- Click Grant on the left side under Applications
5- Click Apply Grant on the left side under Applications
6- Click Apply
7- Choose a Scheme Code and select HRD Corp Claimable Courses: Skim Bantuan Latihan Khas. Then, click Apply
8- Scheme Code represents all types of training that suit the requirements provided by HRD Corp. Below are the list of schemes offered by HRD Corp:
9- Select your Immediate Officer and click Next
10- Select a Training Provider, then click Next
11- Please select a training programme from the list, then key in all the required details and click Next
Select your desired training programme.
Give an explanation on why the participant is required to attend the training. E.g., related to their tasks/ career development, etc.
Explain the background and objective of this training.
Select a relevant focus area. For Employer-Specific Courses, select ‘Not Applicable’.
12- If the training programme is a micro-credential programme, you are required to complete these 3 fields. Save and click Next
Insert MiCAS Application number
13- Based on the nine (9) pillars listed below, HRD Corp Focus Area Courses are closely tied to support government initiatives towards nation building. As such, courses offered through the HRD Corp Focus Areas are designed to provide the workforce with skills required for current and future demands. Details of the focus areas are as follows:
14- Please select a Course Title and Type of Training
15- Select the correct type of training according to the actual type of training, or as mentioned in the training brochure:
16- Please key in the Training Location and click Next
17- Please select the Level of Certification and click Next
18- Please follow the instructions and key in trainee details
19- Click Add Batch, then click Save
20- Click Add Trainee Details
21- Please key in all the required details, then click Add
22- Click Add if there are more participants. Once done, click Save
23- Click Next
24- Please key in the course fees and allowance details, then click Save
25- Estimated cost includes the course fees/external trainer fees, allowances, and consumable training materials. Please comply with the HRD Corp Allowable Cost Matrix.
26- Select Upfront Payment to Training Provider and key in the percentage from 0% to 30%. Then, click Save and Next
27- Complete the declaration form and select a desired officer
28- Add all the required documents, then click Add Attachment. Then, click Save and Submit Application
29- Once the New Grant Application is successfully submitted, the Grant Officer will evaluate the application accordingly. The application may be queried if additional information is required.
The application status will be updated via the employer’s dashboard, email, and the e-TRiS inbox.
Job Roles
- Microsoft 365 Security Administrator
- IT Security Specialist
- Cloud Security Engineer
- Microsoft 365 Administrator
- Compliance Officer
- Identity and Access Management (IAM) Specialist
- Data Protection Analyst
- Security Operations Center (SOC) Analyst
- Cybersecurity Consultant
- Information Security Manager
- Enterprise IT Administrator
- Cloud Solutions Architect
- Risk and Compliance Analyst
- IT Infrastructure Engineer
- SharePoint Administrator
- Systems Administrator
- Network Security Engineer
- IT Governance Specialist
- Microsoft 365 Solutions Architect
- Digital Workplace Security Consultant
Trainers
Dr. Muhammed Siraj is a seasoned IT and cyber security professional with over 20 years of experience in higher education, ICT leadership, and digital transformation. As the Acting Director of ICT at Wisconsin International University College, Ghana, he oversees the university’s information security program, implementing robust security controls, monitoring incidents, and ensuring compliance with regulatory requirements. His expertise is reinforced by globally recognized certifications, including Certified Ethical Hacker (CEH) and Certified Hacking and Forensic Investigator (CHFI), alongside extensive hands-on experience in cyber security operations, fraud detection, and digital forensics
In addition to his leadership roles, Dr. Siraj is a cyber security and forensics instructor who has trained diverse groups ranging from law enforcement officers and customs officials to bankers and IT professionals. He has developed and delivered specialized courses in cyber security, fraud investigation, and digital forensics, while also mentoring students and IT teams in secure system administration, penetration testing, and blockchain security. With a research background in blockchain security and consensus mechanisms, he combines academic rigor with practical expertise, making him a trusted authority in safeguarding digital infrastructures and preparing the next generation of cyber security professionals






