YoVDO

MS-101 Implement threat protection by using Microsoft Defender XDR

Offered By: Microsoft via Microsoft Learn

Tags

Windows Systems Administration Courses Microsoft Office 365 Courses Threat Intelligence Courses

Course Description

Overview

  • Module 1: Explore threat intelligence in Microsoft 365
  • By the end of this module, you will be able to:

    • Describe how threat intelligence in Microsoft 365 is powered by the Microsoft Intelligent Security Graph
    • Describe how the threat dashboard can benefit C-level security officers
    • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant
    • Describe the Threat Tracker widgets and views that provide you with intelligence on different cybersecurity issues that might impact your company
    • Run realistic attack scenarios using Attack simulation training to help identify vulnerable users before a real attack impacts your organization
    • Describe how threat hunting in Microsoft Threat Protection enables security operators to identify cybersecurity threats
    • Describe how Advanced hunting in Microsoft 365 Defender proactively inspects events in your network to locate threat indicators and entities
  • Module 2: Explore the Security Dashboard
  • By the end of this module, you will be able to:

    • Describe how the Security Dashboard gives C-level executives insight into top risks, global trends, protection quality, and the organization’s exposure to threats
    • Explain how to use the Security Dashboard to quickly understand details about trends, where threats originate, and who the top targeted users are in your organization
    • Identify how the dashboard can be used as a launching point to enable security analysts to drill down for more details by using Threat Explorer
    • Describe the built-in alert policies in Microsoft 365
    • Describe the global weekly threat detections displayed in the Security Dashboard
  • Module 3: Implement Microsoft Defender for Identity
  • By the end of this module, you will be able to:

    • Describe how Microsoft Defender for Identity monitors users, entity behavior, and activities with learning-based analytics
    • Describe how Defender for Identity protects user identities and credentials stored in Active Directory
    • Describe how Defender for Identity identifies and investigates suspicious user activities and advanced attacks throughout the kill chain
    • Create your Microsoft Defender for Identity instance in the Defender for Identity portal
    • Use the built-in portal to monitor and respond to suspicious activity detected by Defender for Identity
  • Module 4: Implement Microsoft Cloud Application Security
  • By the end of this module, you will be able to:

    • Describe how Cloud App Security provides improved visibility into network cloud activity and increases the protection of critical data across cloud applications
    • Explain how to deploy Cloud App Security
    • Control your cloud apps with policies
    • Troubleshoot Cloud App Security

Syllabus

  • Module 1: Explore threat intelligence in Microsoft 365
    • Introduction
    • Explore Microsoft Intelligent Security Graph
    • Examine the Security Dashboard in the Security & Compliance Center
    • Investigate security attacks by using Threat Explorer
    • Identify cybersecurity issues by using Threat Trackers
    • Prepare for attacks with Attack simulation training
    • Run automated investigations and responses
    • Explore threat hunting with Microsoft Threat Protection
    • Explore advanced threat hunting in Microsoft 365 Defender
    • Knowledge check
    • Summary
  • Module 2: Explore the Security Dashboard
    • Introduction
    • Examine threat detections in the Security Dashboard
    • Examine security and malware trends in the Security Dashboard
    • Examine alerts in the Security Dashboard
    • Explore the built-in alert policies in Microsoft 365
    • Examine the global threat detections in the Security Dashboard
    • Knowledge check
    • Summary
  • Module 3: Implement Microsoft Defender for Identity
    • Introduction
    • Explore Microsoft Defender for Identity
    • Create your Microsoft Defender for Identity instance
    • Work with the Microsoft Defender for Identity portal
    • Knowledge check
    • Summary
  • Module 4: Implement Microsoft Cloud Application Security
    • Introduction
    • Explore Cloud App Security
    • Deploy Cloud App Security
    • Control your cloud apps with policies
    • Troubleshoot Microsoft Cloud App Security
    • Knowledge check
    • Summary

Tags

Related Courses

Cyber Security Incident Response for Managers
PA Consulting via FutureLearn
Manage the cyber threat for finance professionals
ACCA via edX
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Get Started with Threat Intelligence
Salesforce via Trailhead