- Managing Microsoft 365 Identity and Access
- Implementing Microsoft 365 Threat Protection
- Implementing Microsoft 365 Information Protection
- Administering Microsoft 365 Built-in Compliance