YoVDO

Protect on-premises identities with Microsoft Defender for Cloud for Identity

Offered By: Microsoft via Microsoft Learn

Tags

Windows Systems Administration Courses Cybersecurity Courses Network Security Courses Threat Detection Courses

Course Description

Overview

  • Module 1: Get an introduction to Microsoft Defender for Identity and its capabilities that help you to protect your users' identities by monitoring profile user behavior and activities and protecting hybrid environments.
  • By the end of this module, you'll be able to:

    • Understand the capabilities of Microsoft Defender for Identity.
    • Understand Microsoft Defender for Identity privacy.
  • Module 2: Get an overview of the concepts and tools that will help you implement Microsoft Defender for Identity in your organization including components, such as the sensors, the portal, capacity planning, the setup process, and more.
  • By the end of this module, you'll be able to:

    • Understand the architecture of Microsoft Defender for Identity.
    • Understand capacity planning for Microsoft Defender for Identity.
    • Understand the setup process for Microsoft Defender for Identity.
  • Module 3: Learn how Microsoft Defender for Identity helps you to protect your environment against different types of threats by enabling you to detect and investigate attempts to compromise credentials, lateral movement attacks, reconnaissance activity, and more.
  • By the end of this module, you'll be able to:

    • Understand threat detection in Microsoft Defender for Identity.
    • Understand threat investigation in Microsoft Defender for Identity.

Syllabus

  • Module 1: Introduction to Microsoft Defender for Identity
    • Introduction
    • What is Microsoft Defender for Identity?
    • Get an overview of the capabilities of Microsoft Defender for Identity
    • Understand Microsoft Defender for Identity privacy
    • Knowledge check
    • Summary
  • Module 2: Plan for Microsoft Defender for Identity
    • Introduction
    • Get an overview of Microsoft Defender for Identity's architecture
    • Identify considerations for Microsoft Defender for Identity
    • Knowledge check
    • Summary
  • Module 3: Defend against attacks with Microsoft Defender for Identity
    • Introduction
    • Use Microsoft Defender for Identity to identify attacks
    • Investigate attacks with Microsoft Defender for Identity
    • Knowledge check
    • Summary

Tags

Related Courses

FinTech for Finance and Business Leaders
ACCA via edX
Access Controls
(ISC)² via Coursera
Advanced Cyber Security Training
EC-Council via FutureLearn
Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera
Advanced System Security Design
University of Colorado System via Coursera