YoVDO

MD-100 Configure threat protection

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Defender Courses Network Security Courses BitLocker Courses IPsec Courses Microsoft Defender for Endpoint Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
  • Module 1: In this module, you will learn about malware and common network-related security threats and the steps that you can take to mitigate them.

    After completing this module, you will be able to:

    • Describe malware.
    • Understand the sources of malware.
    • Describe ways of mitigating malware.
    • Identify common network-related security threats.
    • Describe the methods by which you can mitigate these common security threats.
    • Describe tools for securing users identity.
    • Describe tools for securing data on Windows.
    • Describe tools for securing Windows devices.
  • Module 2: The module explains how Microsoft Defender can be used to protect against malware and reduce exposure to attacks using a firewall.

    After completing this module, you will be able to:

    • Use Microsoft Defender to detect and quarantine malware.
    • Describe the purpose of a firewall.
    • Describe Windows Defender Firewall functionality.
    • Explain network-location profiles.
    • Explain the increased functionality of Windows Defender Firewall with Advanced Security.
  • Module 3: This module explains the benefits of using encryption to protect drives and files against unauthorized access.

    After completing this module, you will be able to:

    • Describe the benefits of drive encryption with BitLocker
    • Describe the benefits of Encrypted File System
  • Module 4: This module describes how connection security rules can be used to provide additional security to protect data transmitted across networks.

    After completing this module, you will be able to:

    • Describe the purpose and functionality of IPsec.
    • Describe how to configure IPsec.
    • Describe connection security rules.
    • Explain authentication options.
    • Monitor connections.
  • Module 5: This module explores additional tools used to provide additional layers of security within an organization.

    After completing this module, you'll be able to:

    • Describe the features and use of the Security Compliance Toolkit
    • Describe the features of AppLocker
    • Describe methods of securing data in the enterprise
    • Describe the benefits and features of Microsoft Defender for Endpoint

Syllabus

  • Module 1: Module 1: Explore malware and threat protection
    • Introduction
    • Explain malware
    • Determine possible mitigations for malware threats
    • Understand phishing scams
    • Explain common network-related security threats
    • Determine mitigations for network-related security threats
    • Knowledge check
    • Summary
  • Module 2: Module 2: Explore Microsoft Defender
    • Introduction
    • Explain Microsoft Defender Antivirus
    • Understand Firewalls
    • Explain Windows Defender Firewall
    • Examine network location profiles
    • Explain Windows Defender Firewall with Advanced Security
    • Knowledge check
    • Summary
  • Module 3: Module 3: Explore device encryption features
    • Introduction
    • Examine BitLocker
    • Evaluate BitLocker and TPMs
    • Recover a BitLocker-encrypted drive
    • Assess Encrypting Files System
    • Knowledge check
    • Summary
  • Module 4: Module 4: Explore connection security rules
    • Introduction
    • Explain IPSec
    • Explain connection security rules
    • Explore authentication options
    • Monitor security policies and active connections
    • Knowledge check
    • Summary
  • Module 5: Module 5: Explore advanced protection methods
    • Introduction
    • Explore the Security Compliance Toolkit
    • Use AppLocker to control applications
    • Use AppLocker to control Universal Windows Platform apps
    • Secure data in the enterprise
    • Understand Microsoft Defender for Endpoint
    • Knowledge check
    • Summary

Tags

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity