Controlling Cybersecurity Risk with Defender Vulnerability Management
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to deploy and configure the features of Defender Vulnerability Management across its supported platforms, and how to respond to threats.
Syllabus
Introduction
- Microsoft Defender Vulnerability Management and cybersecurity risk
- What is Microsoft Defender Vulnerability Management?
- What's included in Microsoft Defender Vulnerability Management?
- What you'll need
- Onboarding devices
- Device inventories
- Software inventories
- Browser extension, certificate, and firmware inventories
- Device discovery modes
- Network device authenticated scan
- Windows authenticated scan
- Managing security recommendations
- Remediation capabilities
- Blocking vulnerable apps
- Secure Score
- MDVM reports and notifications
- Security baselines assessment
- Advanced hunting
- Next steps
Taught by
Ruairidh Campbell
Related Courses
Evaluación de peligros y riesgos por fenómenos naturalesUniversidad Nacional Autónoma de México via Coursera Internet Security
openHPI Planning a Security Incident Response
Microsoft via edX Cyber Security
CEC via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam