YoVDO

Microsoft Office 365: Advanced Threat Protection (Office 365/Microsoft 365)

Offered By: LinkedIn Learning

Tags

Microsoft Office 365 Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Learn how to defend against malware, viruses, spoofing, and phishing attacks. Explore Office 365 Advanced Threat Protection and its key polices, testing, and reporting options.

Syllabus

Introduction
  • Staying safe with Advanced Threat Protection (ATP)
  • What you should know
1. Implementing Office 365 ATP
  • Protect against threats in Office 365
  • Common Office 365 threats
  • Office 365 data protection measures
  • Demo: Office 365 Security & Compliance Center
  • Office 365 Advanced Threat Protection
  • Demo: Threat management console
  • Understanding security admin roles
  • Demo: Configure security roles
2. ATP Anti-Phishing Policies
  • ATP anti-phishing policies and attacks
  • Office 365 ATP anti-phishing policies
  • Demo: Create a new anti-phishing policy
3. ATP Safe Attachments Policies
  • Enabling ATP Safe Attachments
  • Office 365 ATP Safe Attachments policies
  • Demo: Create a new Safe Attachments policy
  • Demo: Submit an infected file to Microsoft
4. ATP Safe Links Policies
  • ATP Safe Links
  • ATP Safe Links functionality
  • ATP Safe Links policy options
  • Demo: Create and manage Safe Links
5. ATP Anti-Spam Policies
  • Overview of spam
  • ATP anti-spam
  • Demo: ATP anti-spam settings
  • Email spoofing and spoof intelligence
  • Demo: Managing spoof intelligence
  • Demo: Managing advanced spoofing filters
6. Office 365 Threat Intelligence
  • Office 365 threat intelligence
  • Threat intelligence features
  • Demo: Office 365 threat intelligence
  • Using Attack Simulator
  • Demo: Password spray attack
  • Demo: Phishing attack
  • Demo: Brute-force attack
7. ATP Reporting
  • Threat protection status reporting
  • ATP real-time reports
  • Demo: Threat protection reporting
  • Threat management dashboard
  • Threat management dashboard reports
  • Demo: Threat management dashboard reports
  • Threat management review
  • Demo: Threat management reporting
Conclusion
  • Next steps

Taught by

Andrew Bettany

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera