YoVDO

Controlling Cybersecurity Risk with Defender Vulnerability Management

Offered By: LinkedIn Learning

Tags

Network Security Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to deploy and configure the features of Defender Vulnerability Management across its supported platforms, and how to respond to threats.

Syllabus

Introduction
  • Microsoft Defender Vulnerability Management and cybersecurity risk
  • What is Microsoft Defender Vulnerability Management?
  • What's included in Microsoft Defender Vulnerability Management?
  • What you'll need
1. Understanding Inventory
  • Onboarding devices
  • Device inventories
  • Software inventories
  • Browser extension, certificate, and firmware inventories
2. Device Discovery
  • Device discovery modes
  • Network device authenticated scan
  • Windows authenticated scan
3. Managing Vulnerabilities
  • Managing security recommendations
  • Remediation capabilities
  • Blocking vulnerable apps
4. Reporting and Insights
  • Secure Score
  • MDVM reports and notifications
  • Security baselines assessment
  • Advanced hunting
Conclusion
  • Next steps

Taught by

Ruairidh Campbell

Related Courses

Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
Internet Security
openHPI
Planning a Security Incident Response
Microsoft via edX
Cyber Security
CEC via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam