Defend against threats with Microsoft 365
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data.
- Define security threats.
- Understand common threats.
- Explain how the threat landscape is evolving.
- Module 2: Learn how Microsoft Defender for Endpoint can help your organization stay secure.
- Define the capabilities of Microsoft Defender for Endpoint.
- Understand how to hunt threats within your network.
- Explain how Microsoft Defender for Endpoint can remediate risks in your environment.
- Module 3: Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender.
- Define the capabilities of Microsoft Defender for Office 365.
- Understand how to simulate attacks within your network.
- Explain how Microsoft Defender for Office 365 can remediate risks in your environment.
- Module 4: Learn about the Microsoft Defender for Identity component of Microsoft 365 Defender.
- Define the capabilities of Microsoft Defender for Identity.
- Understand how to configure Microsoft Defender for Identity sensors.
- Explain how Microsoft Defender for Identity can remediate risks in your environment.
In this module, you will learn how to:
In this module, you will learn how to:
In this module, you will learn how to:
Upon completion of this module, you should be able to:
Syllabus
- Module 1: Introduction to threat protection with Microsoft 365
- Introduction to threat protection
- Learn about common threats
- Understand the evolving threat landscape
- Summary and knowledge check
- Module 2: Protect against threats with Microsoft Defender for Endpoint
- Introduction to Microsoft Defender for Endpoint
- Practice security administration
- Hunt threats within your network
- Summary and knowledge check
- Module 3: Remediate risks with Microsoft Defender for Office 365
- Introduction to Microsoft Defender for Office 365
- Automate, investigate, and remediate
- Configure, protect, and detect
- Simulate attacks
- Summary and knowledge check
- Module 4: Safeguard your environment with Microsoft Defender for Identity
- Introduction to Microsoft Defender for Identity
- Configure Microsoft Defender for Identity sensors
- Review compromised accounts or data
- Integrate with other Microsoft tools
- Summary and knowledge check
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network