CUSTOMISED
Expert-led training for your team
Dismiss

Microsoft Purview training course

Learn how to set up, integrate, and manage Microsoft Purview for end-to-end data governance, classification, and compliance across your organization

JBI training course London UK

Great course—packed with practical insights and delivered by an instructor who clearly knows hi stuff. I left feeling confident and looking forward to apply what I learned - Microsoft Purview - June 2025

Public Courses

08/12/25 - 2 days
£1750 +VAT
16/02/25 - 2 days
£1750 +VAT
27/04/26 - 2 days
£1750 +VAT

Customised Courses

* Train a team
* Tailor content
* Flex dates
From £1200 / day
EDF logo Capita logo Sky logo NHS logo RBS logo BBC logo CISCO logo
JBI training course London UK

    1. Foundations of Data Governance: Understand the importance of data governance and how Microsoft Purview supports it through centralized visibility and control.
    2. Purview Architecture & Features: Explore key components of Purview, including its architecture, core capabilities, and how they interact across your data estate.
    3. Account Setup & Navigation: Learn how to create a Purview account, navigate the portal, and configure user roles and permissions for secure access.
    4. Data Cataloging Essentials: Register and scan supported data sources, enabling automated metadata extraction and cataloging.
    5. Data Classification & Sensitivity Labeling: Use built-in and custom classifiers to identify sensitive data and apply appropriate labels for protection.
    6. Data Lineage & Governance Insights: Visualize data flow across systems, interpret lineage maps, and generate actionable governance insights.
    7. Integration with Microsoft Ecosystem: Connect Purview with Azure, Power BI, and Microsoft Fabric to extend governance across platforms.
    8. Fabric-Specific Governance: Register Fabric tenants, configure scans, and apply classifications and labels to Fabric data assets.
    9. Scan Configuration & Management: Set up scan schedules, monitor progress, and manage results to ensure accurate metadata and lineage tracking.
    10. Monitoring, Compliance & Best Practices: Use dashboards for oversight, ensure audit readiness, and apply best practices for sustainable data governance.

Overview

1. Introduction to Microsoft Purview

  • Overview of Data Governance: Importance and benefits.
  • Introduction to Microsoft Purview: Key features and capabilities.
  • Purview Architecture: Components and how they interact.

2. Setting Up Microsoft Purview

  • Creating a Purview Account: Step-by-step guide.
  • Navigating the Purview Portal: Key sections and functionalities.
  • Configuring Permissions: Roles and access management.

3. Data Cataloging and Classification

  • Registering Data Sources: Supported data sources and registration process.
  • Scanning Data Sources: Configuring and running scans.
  • Classifying Data: Using built-in and custom classifiers.
  • Labeling Sensitive Data: Applying sensitivity labels.

4. Data Lineage and Insights

  • Understanding Data Lineage: Importance and use cases.
  • Viewing Lineage Information: How to access and interpret lineage data.
  • Generating Insights: Using Purview insights for data governance.

5. Integrating Microsoft Purview with Other Services

  • Integration with Azure Services: How Purview integrates with Azure.
  • Integration with Power BI: Governing Power BI assets with Purview.
  • Integration with Microsoft Fabric: Detailed steps and best practices.

6. Connecting Microsoft Purview with Microsoft Fabric

  • Overview of Integration: Benefits and use cases.
  • Registering Fabric Tenant in Purview:
    • Go to the Purview portal.
    • Register your Fabric tenant.
  • Setting Up Scanning for Fabric:
    • Configure scanning to include Fabric items.
    • Ensure metadata and lineage are captured.
  • Classifying and Labeling Fabric Data:
    • Apply classifications and sensitivity labels.
    • Manage data governance policies.

7. Scanning Data in Microsoft Fabric

  • Configuring Scans:
    • Navigate to the scanning section in Purview.
    • Select your Fabric data sources.
    • Configure scan settings (frequency, scope, etc.).
  • Running Scans:
    • Initiate scans and monitor progress.
    • Review scan results for completeness and accuracy.
  • Managing Scan Results:
    • Analyze metadata and lineage information.
    • Apply necessary classifications and labels.
    • Generate reports and insights for governance.

8. Monitoring and Managing Data Governance

  • Using Purview Insights: Dashboards and reports.
  • Compliance and Auditing: Ensuring data governance policies are followed.
  • Best Practices: Tips for effective data governance.

.

JBI training course London UK

The main recipients for the course are security subject-matter experts,  technical non-security professionals who have no/little experience of threat modelling (e.g. software devs, architects and engineers) and technically-oriented project leaders.


5 star

4.8 out of 5 average

Great course—packed with practical insights and delivered by an instructor who clearly knows hi stuff. I left feeling confident and looking forward to apply what I learned - Microsoft Purview - June 2025



“JBI  did a great job of customizing their syllabus to suit our business  needs and also bringing our team up to speed on the current best practices. Our teams varied widely in terms of experience and  the Instructor handled this particularly well - very impressive”

Brian F, Team Lead, RBS, Data Analysis Course, 20 April 2022

 

 

JBI training course London UK

Newsletter


Sign up for the JBI Training newsletter to receive technology tips directly from our instructors - Analytics, AI, ML, DevOps, Web, Backend and Security.
 



Threat modelling is a process to identify security weaknesses in software design and architecture, and define countermeasures that mitigate the malicious effects of the discovered weaknesses before any code is cut.

Our Threat Modelling  training course is designed for software developers and architects in mind. Threat modelling is language-agnostic. It can be easily used for any software development project and with any modern workflow such as Agile or DevOps. The analysis work is done on the design of the software system in order to improve the quality of the code that will be delivered in-sprint.
 
You will learn how to address security design concerns faced by software development teams with a combination of teaching modules and practical threat model exercises. The participants will be encouraged to work in teams, to foster discussions on how to implement security controls for the modelled threats on their software architecture.
 
All key stakeholders in an application development workflow should know how to assess the weak points in their systems and what questions to ask. The course will provide a framework to assess these questions and will yield immediate beneficial results.
 
You will gain a practical overview of the necessary disciplines for resolving application architecture and design issues according to OWASP good security practices.
 
We aim to instill skills that allow you to perform rapid threat modelling in a consistent, repeatable and measurable manner.

CONTACT
+44 (0)20 8446 7555

[email protected]

SHARE

 

Copyright © 2025 JBI Training. All Rights Reserved.
JB International Training Ltd  -  Company Registration Number: 08458005
Registered Address: Wohl Enterprise Hub, 2B Redbourne Avenue, London, N3 2BS

Modern Slavery Statement & Corporate Policies | Terms & Conditions | Contact Us

POPULAR

AI training courses                                                                        CoPilot training course

Threat modelling training course   Python for data analysts training course

Power BI training course                                   Machine Learning training course

Spring Boot Microservices training course              Terraform training course

Data Storytelling training course                                               C++ training course

Power Automate training course                               Clean Code training course