MS-101 Explore security metrics in Microsoft Defender XDR
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Examine threat vectors and data breaches
- Describe techniques hackers use to compromise user accounts through email
- Describe techniques hackers use to gain control over resources
- Describe techniques hackers use to compromise data
- Mitigate an account breach
- Prevent an elevation of privilege attack
- Prevent data exfiltration, data deletion, and data spillage
- Module 2: Explore the Zero Trust security model
- Describe the Zero Trust approach to security in Microsoft 365
- Describe the principles and components of the Zero Trust security model
- Describe the five steps to implementing a Zero Trust security model in your organization
- Explain Microsoft's story and strategy around Zero Trust networking
- Module 3: Explore security solutions in Microsoft 365
- Identify the features of Microsoft Defender for Office 365 that enhance email security in a Microsoft 365 deployment
- Explain how Microsoft Defender for Identity identifies, detects, and investigates advanced threats, compromised identities, and malicious insider actions directed at your organization
- Explain how Microsoft Defender for Endpoint helps enterprise networks prevent, detect, investigate, and respond to advanced threats
- Describe how Microsoft 365 Threat Intelligence can be beneficial to your organization’s security officers and administrators
- Describe how Microsoft Cloud App Security enhances visibility and control over your Microsoft 365 tenant through three core areas
- Module 4: Examine Microsoft Secure Score
- Describe the benefits of Secure Score and what kind of services can be analyzed
- Describe how to collect data using the Secure Score API
- Describe how to use the tool to identify gaps between your current state and where you would like to be regarding security
- Identify actions that will increase your security by mitigating risks
- Explain where to look to determine the threats each action will mitigate and the impact it has on users
- Module 5: Examine Privileged Identity Management
- Describe how Privileged Identity Management enables you to manage, control, and monitor access to important resources in your organization
- Configure Privileged Identity Management for use in your organization
- Describe how Privileged Identity Management audit history enables you to see all the user assignments and activations within a given time period for all privileged roles
- Explain how Microsoft Identity Manager helps organizations manage the users, credentials, policies, and access within their organizations and hybrid environments
- Explain how Privileged Access Management provides granular access control over privileged admin tasks in Microsoft 365
- Module 6: Examine Azure Identity Protection
- Describe Azure Identity Protection (AIP) and what kind of identities can be protected
- Enable the three default protection policies in AIP
- Identify the vulnerabilities and risk events detected by AIP
- Plan your investigation in protecting cloud-based identities
- Plan how to protect your Azure Active Directory environment from security breaches
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
Syllabus
- Module 1: Examine threat vectors and data breaches
- Introduction
- Explore today's work and threat landscape
- Examine how phishing retrieves sensitive information
- Examine how spoofing deceives users and compromises data security
- Compare spam and malware
- Examine how an account breach compromises a user account
- Examine elevation of privilege attacks
- Examine how data exfiltration moves data out of your tenant
- Examine how attackers delete data from your tenant
- Examine how data spillage exposes data outside your tenant
- Examine other types of attacks
- Knowledge check
- Summary
- Module 2: Explore the Zero Trust security model
- Introduction
- Examine the principles and components of the Zero Trust model
- Plan for a Zero Trust security model in your organization
- Examine Microsoft's strategy for Zero Trust networking
- Adopt a Zero Trust approach
- Knowledge check
- Summary
- Module 3: Explore security solutions in Microsoft 365
- Introduction
- Enhance your email security using Microsoft Defender for Office 365
- Protect your organization's identities using Microsoft Defender for Identity
- Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint
- Protect against cyber attacks using Microsoft 365 Threat Intelligence
- Provide insight into suspicious activity using Microsoft Cloud App Security
- Knowledge check
- Summary
- Module 4: Examine Microsoft Secure Score
- Introduction
- Explore Microsoft Secure Score
- Examine the Secure Score Dashboard
- Collect Secure Score data using the Secure Score API
- Improve your security posture
- Knowledge check
- Summary
- Module 5: Examine Privileged Identity Management
- Introduction
- Explore Privileged Identity Management in Azure AD
- Configure Privileged Identity Management
- Audit Privileged Identity Management
- Explore Microsoft Identity Manager
- Control privileged admin tasks using Privileged Access Management
- Knowledge check
- Summary
- Module 6: Examine Azure Identity Protection
- Introduction
- Explore Azure Identity Protection
- Enable the default protection policies in AIP
- Explore the vulnerabilities and risk events detected by AIP
- Plan your identity investigation
- Knowledge check
- Summary
Tags
Related Courses
Build a Toolkit with Advanced Windows CommandsCoursera Project Network via Coursera Manage Office 365 Identities
Microsoft via edX Become a Windows System Administrator (Server 2012 R2)
LinkedIn Learning Exchange 2016: Client Access Services
LinkedIn Learning Windows 10: Advanced Troubleshooting for IT Support
LinkedIn Learning