YoVDO

Microsoft Office 365: Advanced Threat Protection (Office 365/Microsoft 365)

Offered By: LinkedIn Learning

Tags

Microsoft Office 365 Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Learn how to defend against malware, viruses, spoofing, and phishing attacks. Explore Office 365 Advanced Threat Protection and its key polices, testing, and reporting options.

Syllabus

Introduction
  • Staying safe with Advanced Threat Protection (ATP)
  • What you should know
1. Implementing Office 365 ATP
  • Protect against threats in Office 365
  • Common Office 365 threats
  • Office 365 data protection measures
  • Demo: Office 365 Security & Compliance Center
  • Office 365 Advanced Threat Protection
  • Demo: Threat management console
  • Understanding security admin roles
  • Demo: Configure security roles
2. ATP Anti-Phishing Policies
  • ATP anti-phishing policies and attacks
  • Office 365 ATP anti-phishing policies
  • Demo: Create a new anti-phishing policy
3. ATP Safe Attachments Policies
  • Enabling ATP Safe Attachments
  • Office 365 ATP Safe Attachments policies
  • Demo: Create a new Safe Attachments policy
  • Demo: Submit an infected file to Microsoft
4. ATP Safe Links Policies
  • ATP Safe Links
  • ATP Safe Links functionality
  • ATP Safe Links policy options
  • Demo: Create and manage Safe Links
5. ATP Anti-Spam Policies
  • Overview of spam
  • ATP anti-spam
  • Demo: ATP anti-spam settings
  • Email spoofing and spoof intelligence
  • Demo: Managing spoof intelligence
  • Demo: Managing advanced spoofing filters
6. Office 365 Threat Intelligence
  • Office 365 threat intelligence
  • Threat intelligence features
  • Demo: Office 365 threat intelligence
  • Using Attack Simulator
  • Demo: Password spray attack
  • Demo: Phishing attack
  • Demo: Brute-force attack
7. ATP Reporting
  • Threat protection status reporting
  • ATP real-time reports
  • Demo: Threat protection reporting
  • Threat management dashboard
  • Threat management dashboard reports
  • Demo: Threat management dashboard reports
  • Threat management review
  • Demo: Threat management reporting
Conclusion
  • Next steps

Taught by

Andrew Bettany

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network