This course is intended for Beginner-Moderate exposure is recommended for this course. The topics covered are cumulative in nature, and they require minimal understanding of email applications and composition. Overview The objective of the course is to give students the information needed to create emails that are written in a succinct, effective, and user-friendly manner. Students will learn how to set up an email subject, salutation, and will then work on how to write a credible email. In this course, students will learn about e-mail policies and learn how to write professional e-mail memos that convey appropriate messages. 1 - E-mail basics E-mail characteristics Writing online versus on paper Understanding the advantages and disadvantages of e-mail Understanding the cultural significance of e-mail E-mail programs Using an e-mail program to send e-mail When to use e-mail Communicating by e-mail Understanding when to avoid using e-mail Writing an e-mail message Using the MAIL acronym 2 - E-mail policies Company policies Avoiding improper e-mail messages Ensuring employee compliance to e-mail policies Copyright laws, viruses, and liability Avoiding copyright infringement Avoiding viruses Identifying e-mail liability 3 - E-mail features and security Features of an e-mail program Using attachments Using priority labels and signature files Features of an e-mail program Using attachments Using priority labels and signature files Discussing e-mail program options Securing e-mail Using encryption and digital signatures Using passwords 4 - E-mail messages Message headers Using headers E-mail message body Including proper greeting Structuring an e-mail message Closing an e-mail message 5 - E-mail effectiveness E-mail recipients Considering the factors that determine e-mail writing Anticipating recipient reaction Message management Managing your e-mail effectively 6 - Netiquette guidelines Netiquette style Using proper tone Following formatting guidelines Emoticons and abbreviations Using emoticons and electronic abbreviations 7 - Composing online correspondence Online communication Achieving the objective of the message Language and punctuation Improving online writing style Using punctuation correctly Efficient writing habits Constructing sentences Constructing paragraphs Editing e-mail messages
Course Objectives At the end of this course you will be able to: Understand the Outlook interface Send and receive email messages Organise email messages Manage their calendar Manage their contacts Work with tasks and notes Customise Outlook ' 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Getting Started With Outlook Navigate the Outlook Interface Perform Basic Email Functions Use Outlook Help Composing Messages Create an Email Message Check Spelling and Grammar Format Message Content Attach Files and Items Enhance an Email Message Manage Automatic Message Content Reading and Responding to Messages Customise Reading Options Work with Attachments Manage Your Message Responses Managing Your Messages Manage Messages Using Tags, Flags, and Commands Organise Messages Using Folders Managing Your Calendar View the Calendar Manage Appointments Manage Meetings Print Your Calendar Managing Your Contacts Create and Update Contacts View and Organise Contacts Working With Tasks and Notes Create and manage Tasks Create and manage Notes Customising the Outlook Environment Customise the Outlook Interface Create and Manage Quick Steps Who is this course for? Who is this course for? This course is intended for the user who needs to learn how to use Microsoft Outlook to compose and send email, schedule appointments and manage contact information. Requirements Requirements General knowledge of the Windows OS
Signalling training course description An intensive course that defines and explores the signalling methods that are to be found in today's telecommunications services. What will you learn Describe the Functionality and Features of Signalling. Describe the Functionality of Analogue & Digital Subscriber Signalling. Describe the various types of signalling used on different network types. Describe the Functionality of Private Network Signalling. Describe the Functionality of Public Network Signalling. Signalling training course details Who will benefit: Personnel involved with systems design, implementation and support. Prerequisites: Telecommunications Introduction Duration 2 days Signalling training course contents Introduction What is Signalling?, Standards, ITU-T Recommendations, Signalling Categories - Supervisory Addressing, E.164, Call Information, Network Management, Network Components, Inband/Outband Switch Signalling, Analogue Vs Digital Signalling. Analogue Subscriber Signalling Analogue Local Loops/Switches/Trunks, Digital Switches/Local Loops, Telephone Handset, Accessing the Local Exchange, Pulse/Tone Dialling. Digital Subscriber Signalling Integrated Digital Access, DASS2 & DPNSS, DASS2 - Call, IMUX, Euro ISDN, Q.931 Call Control, Message Identification, Message Types, Call Establishment Messages, Call Clearing. Network Types Service Types, Circuit Switched, Packet Switched, Signalling Terminology, In-Channel Signalling, G.704, Performance and Quality, Digital Signalling, CAS, CAS Applications, Foreign Exchange, CCS, Break-In/Out Private Network Signalling Types Networking PABXs, Inter PABX Analogue Signalling Methods, E & M, Tone-On-Idle, Inter PABX Digital Signalling Methods, DPNSS, DPNSS Deployment, PABX Support for DPNSS, DPNSS Call, Q.Sig, Q.Sig support/functionality/protocol, Message Overview, Call Establishment. Public Network Signalling SS7, SS7 Operations, SS7 Topology, SSP, STP, SCP, Database Types - CMSDB NP LIDB HLR VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, SS7 addressing, Point Codes, Sub-System, Global Title Addressing and Translation, ANSI PCs, ITU-T PCs, SS7 Protocol Stack, MTP Level 1, MTP Level 2, Flow Control, FISU, LSSU, MSU, MSU SIF, MTP Level 3, SCCP, TCAP, TUP, Facility Format, Main Facilities, Flow Control Negotiation, Closed User Groups, Reverse Charging, Fast Select Facility, Throughput Class Negotiation, Call Barring, On-Line Facility Registration. BTUP, ISDN ISUP, Supplementary Services, ISUP Call - IAM, Progress/Answer/Suspend/ Resume/Release Messages, Intelligent Network (IN) Introduction, IN Evolution, IN Conceptual Model, IN Target Services & Service Features, Service Independent Building Blocks
Course Objectives At the end of this course you will be able to: Customise message settings Organise and locate Outlook messages Set Calendar options Manage their Contacts Work with activities using the Journal and Tasks Share their workspaces Manage their Outlook data files ' 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Configure Advanced Message Options Delay delivery Insert Advanced Characters and Objects Modify Message Settings, Properties, and Options Use Automatic Replies Advanced Message Management Sort Messages Filter Messages Organise Messages Search Messages Manage Junk Mail Manage Your Mailbox Automate Repetitive Tasks Quick steps Rules Auto Archive Advanced Calendar Management Manage Advanced Calendar Options Create Calendar Groups Manage Meeting Responses Advanced Contact Management Edit an Electronic Business Card Manage Advanced Contacts Options Forward Contacts Export Contacts Managing Activities by Using Tasks and Journal Entries Assign and Manage Tasks Record and Modify Journal Entries Sharing Workspaces with Others Delegate Access to Mail Folders Share Your Calendar Share Your Contacts Managing Outlook Data Files Back Up Outlook Items Change Data File Settings Configuring Email Message Security Settings Who is this course for? Who is this course for? This course is designed for experienced Outlook users who need to increase their efficiency in the usage and manipulation of emails, tasks and the calendar. Requirements Requirements Preferably, delegates would have attended the MS Outlook Introduction course.
Explore ITIL4 Foundation, a comprehensive course delving into modern IT service management practices. Learn key concepts, principles, and processes to enhance organisational efficiency and align IT services with business goals. About this course £519.00 153 lessons Accredited training Certificate of completion included Exam included Course curriculum Module 1 - Introduction1.1 Tutor Introduction1.2 Certifications1.3 Course Features1.4 Why ITIL? Module 2 - Key Concepts2.1 What is a Service?2.2 What is Utility?2.3 What is Warranty?2.4 What are Customers, Users and Sponsors?2.5 What is Service Management?2.6 Creating value with Services2.7 Value & Value Co-creation2.8 What is Value?2.9 Organisations and Stakeholders2.10 Service Providers2.11 Other Stakeholders2.12 Value: Outcome, Cost and Risk2.13 Figure, Balance, Outcomes, Costs, Risks2.14 Outputs and Outcomes2.15 Cost2.16 Risk - Part 12.17 Risk - Part 22.18 Utility & Warranty - Part 12.19 Utility & Warranty - Part 22.20 Services Offerings2.21 Services Relationship2.22 Service Provisions2.23 Services Relationship Model2.24 Goods, Resources & Actions2.25 Products & ServicesTest Your Knowledge Quiz Module 3 - Guiding Principals3.1 Guiding Principles - Introduction Part 13.2 Guiding Principles - Introduction Part 23.3 Guiding Principles - The Key Message is Discussed!3.4 Guiding Principles - Nature, Use & Interaction of the Guiding Principles3.5 Focus on Value - The Key Message Discussed!3.6 Focus on Value - The Service Consumer & What is their Perspective of Value3.7 Focus on Value - The Customer Experience3.8 Focus on Value - How to Apply the Principle!3.9 Start Where You Are - Key Message Discussed!3.10 Start Where Your Are - Assess Where You Are3.11 Start Where You Are - The Role of Measurement3.12 Start Where You Are - How to Apply the Principle!3.13 Progress Iteratively with Feedback - Key Message Discussed!3.14 Progress Iteratively with Feedback - The Role of Feedback3.15 Progress Iteratively with Feedback - Iteration & Feedback Together3.16 Progress Iteratively with Feedback - How to Apply the Principle3.17 Collaborate & Promote Visibility - Key Message Discussed! (Part 1)3.18 Collaborate & Promote Visibility - Key Message Discussed! (Part 2)3.19 Collaborate & Promote Visibility - Key Message Discussed! (Part 3)3.20 Collaborate & Promote Visibility - Whom to Collaborate with (Part 1)3.21 Collaborate & Promote Visibility - Whom to Collaborate with (Part 2)3.22 Collaborate & Promote Visibility - Communication for Improvement3.23 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 1)3.24 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 2)3.25 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 3)3.26 Collaborate & Promote Visibility - How to Apply3.27 Think & Work Holistically - Key Message Discussed! (Part 1)3.28 Think & Work Holistically - Key Message Discussed! (Part 2)3.29 Think & Work Holistically - Key Message Discussed! (Part 3)3.30 Think & Work Holistically - How to Apply the Principle3.31 Optimise & Automate - Key Message Discussed! (Part 1)3.32 Optimise & Automate - The Key Message Discussed! (Part 2)3.33 Optimise & Automate - The Road to Optimisation (Part 1)3.34 Optimise & Automate - The Road to Optimisation (Part 2)3.35 Optimise & Automate - How to Apply the Principle3.36 Keep it Simple and Practical - Key Message Discussed!3.37 Keep it Simple & Practical - How to Apply the Principle3.38 Principle InteractionTest Your Knowledge Quiz Module 4 - 4 Dimensions of Service Management4.1 Introduction4.2 The 4 Dimensions of Service Management4.3 Organisation & People (Part 1)4.4 Organisations & People (Part 2)4.5 Organisation & People (Part 3)4.6 Information & Technology (Part 1)4.7 Information & Technology (Part 2)4.8 Information & Technology (Part 3)4.9 Information & Technology (Part 4)4.10 Partners & Suppliers (Part 1)4.11 Partners & Suppliers (Part 2)4.12 Partners & Suppliers (Part 3)4.13 Partners & Suppliers (Part 4)4.14 Partners & Suppliers (Part 5)4.15 Partners & Suppliers (Part 6)4.16 Value Streams & Processes (Part 1)4.17 Value Streams & Processes (Part 2)4.18 Value Streams & Processes (Part 3)4.19 Value Streams & Processes (Part 4)Test Your Knowledge Quiz Module 5 - The Service Value System5.1 Introduction5.2 Describe the ITIL Service Value System (Part 1)5.3 Describe the ITIL Service Value System (Part 2)5.4 Describe the ITIL Service Value System (Part 3)5.5 Describe the ITIL Service Value System (Part 4)Test Your Knowledge Quiz Module 6 - Service Value Chain and the Service Value Stream 6.1 Learning Objectives 6.2 Service Value Chain Model 6.3 The Interconnected Service Value Chain "elements" 6.4 The Interconnected Service Value Chain "more" 6.5 The Interconnected Service Value Chain "Value Streams" 6.6 The Interconnected Service Value Chain "Steps" 6.7 Plan 6.8 Improve 6.9 Engage 6.10 Design & Transition 6.11 Obtain/Build 6.12 Deliver & Support Test Your Knowledge Quiz ITIL® is a registered trademark of AXELOS Limited, used under permission of AXELOS Limited. The swirl logo ™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
SMTP training course description A hands on course focusing on the workings of email systems and the standard protocols that they use. The course is not specific to any particular implementation, but some vendor specifics are noted. Linux and Microsoft machines are used in hands on sessions to reinforce the theory of major sessions. The course concentrates on troubleshooting and interworking using network sniffing and protocol inspection rather than "which buttons to push". What will you learn Describe and explain SMTP MIME POP3 IMAP PGP, GPG, S/MIME SPF, DKIM, DMARC Configure mail routing Secure email systems SMTP training course details Who will benefit: Technical staff responsible for email systems. Prerequisites: TCP/IP foundation for engineers. Duration 3 days SMTP training course contents SMTP architecture What is SMTP, email before SMTP, SMTP history, the different protocols, clients, servers. Email composition, transmission, delivering emails, storing and reading emails. MUAs, MTAs, POP3, IMAP, SMTP, DNS, webmail. Hands on Setting up MTAs and MUAs and sending a simple email using telnet. The SMTP protocol SMTP protocol stack, SMTP headers, HELO, SMTP mail, MAIL FROM, RCPT TO, DATA, SMTPUTF8, 8BITMIME, TURN, EHLO, ETRN, 3 digit replies. Hands on Analysing SMTP packets on a network. DNS and SMTP SMTP forwarding, SMTP relays, interoperation, how SMTP uses DNS, MX records. Hands on Setting up mail relays. SMTP headers IMF data, From, to, cc, bcc, sender and recipient headers, message Ids, received trails, in-reply-to, received-SPF, mail list headers. Hands on Using clients to analyse details from mail headers, including true originators and path of emails. MIME Email attachments, MIME versions, content type headers, encoding, base 64, binary data, multi part headers, troubleshooting attachments. Hands on Analysing MIME headers and attachments. POP3 What is POP3, where to use POP3, authorisation, transactions, POP3 commands: USER, PASS, STAT, LIST, RETR, DELE. Hands on Setting up a POP3 server, analysing POP3 packets on a network. IMAP and IMAPS What is IMAP, where to use IMAP, authorisation, mailbox structure, IMAP commands: LOGIN, AUTHENTICATE, LIST, CREATE, Examine (message flags), SELECT, STORE. Hands on Setting up an IMAP server and analysing IMAP packets on a network. Interoperation Mail gateways, addressing, Exchange, sendmail. Email security Basics, Transport level: STARTTLS. Content: PGP/GPG, mail signing and encryption, S/MIME, digital certificates, secure email submission. Hands on Setting up and using a PGP key, configure MTAs to use TLS. Email authentication and spam prevention Mail relays, grey listing, block list & RBL, DNSBL (Real-time Black hole List), White list, SPF, Domain Keys Identified Mail (DKIM), Author Domain Signing Practices (ADSP), Abuse Report Format (ARF), Domain-based Message Authentication, Reporting and Conformance (DMARC). Hands on Relay spamming and the blocking spamming.
We all know people are quick to judge – in fact neuroscience research suggests that it takes less than a second for first impressions to be made. Crucial skills need developing to establish credibility and make the impact you want, based on who you are and what is important to you. Despite our best efforts, sometimes a work relationship or situation becomes challenging – what then? You need to be assertive to get things back on track. There is an art to doing this well and feeling proud of yourself for making your voice heard in the right way.
SS7 training course description An Introduction to Signalling System No 7. Covering the terminology, technology and topology of the Core Signalling System. What will you learn Describe the evolution of SS7. Identify the component parts of SS7. Describe the basic method of operation of SS7. Describe a basic call set-up and clear within SS7. SS7 training course details Who will benefit: Network/Systems engineers Operators/Planners. Prerequisites: Telecommunications Introduction Duration 2 days SS7 training course contents Introduction Digital Signalling, CAS, CAS Applications, CCS, Layer 1, Layer 2 (HDLC), Layer 3, Evolution of SS7, Common SS7 functions. Physical Functionality SS7 Topology, Service Switching Point (SSP), Signalling Transfer Point (STP), Service Control Point (SCP), Database Types, CMSDB, NP, LIDB, HLR, VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, Signalling Routes. Addressing Addressing in SS7, E.164, ANSI PCs, ITU-T (CCITT) PCs, Connecting Networks (ISPs/NSPs). Message Transfer Part SS7 Protocol Stack, MTP Level 1, MTP Level 2, Signalling Units, Flow Control, Fill In Signalling Unit (FISU), Link Status Signalling Unit (LSSU), Message Signalling Unit (MSU), MTP Level 3. Application and User Parts Signalling Connection Control Part (SCCP), Transaction Capabilities Application Part (TCAP), Telephone User Part, BTUP, ISDN User Part (ISUP), ISUP - Supplementary Services, ISUP - Call, Call Set-up over SS7. The Intelligent Network Function of IN, Evolution of IN, Conceptual Model, Target Services and Service Features, Independent Building Blocks.
ð Unleash the Power of Your Voice with 'Voice Amplified: Crafting Impactful Messages'! ð¤ Are you ready to captivate, influence, and inspire through the sheer strength of your words? Welcome to a transformative online course designed to amplify your voice and craft compelling messages that resonate deeply with your audience. ð Elevate Your Communication Skills: In today's fast-paced world, effective communication is key. Whether you're a professional seeking to enhance your public speaking prowess, an aspiring influencer, or someone eager to connect more profoundly with others, this course is your gateway to mastering the art of impactful messaging. ð¯ What You'll Learn: ⨠Techniques to articulate your thoughts with clarity and conviction. ⨠Strategies to infuse emotion and authenticity into your messages. ⨠Crafting narratives that engage, persuade, and leave a lasting impact. ⨠Tools for commanding attention and maintaining audience engagement. ⨠Overcoming stage fright and honing your unique voice to inspire action. ð Why Choose 'Voice Amplified'? ï¸ Expert Guidance: Learn from industry-leading communication specialists with a wealth of experience. ï¸ Interactive Modules: Engaging lessons, practical exercises, and real-world examples to reinforce learning. ï¸ Personalized Feedback: Receive constructive feedback tailored to enhance your unique communication style. ï¸ Lifetime Access: Access course materials anytime, anywhere, and revisit the content as often as needed. ð Join Thousands of Satisfied Students: Our alumni have transformed their communication skills, delivering impactful presentations, nailing job interviews, and captivating audiences across various platforms. ð Limited-Time Offer: Enroll now and embark on this transformative journey at a special introductory price! Don't miss the chance to amplify your voice and make a lasting impression. Ready to craft messages that resonate and inspire change? Enroll in 'Voice Amplified: Crafting Impactful Messages' today and start your journey toward becoming a master communicator Course Curriculum INTRODUCTION Introduction - Your Message Matters 00:00 THE 7 KEYS TO YOUR MESSAGE MESSAGE-Your Message Matters 00:00 AUDENCE- Your Message Matters 00:00 GET TRAINED - Your Message Matters 00:00 TRANSFORMATION - Your Message Matters 00:00 ELEVATE - Your Message Matters 00:00 REVENUE - Your Message Matters 00:00 STORIES - Your Message Matters 00:00
Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests