Protect on-premises identities with Microsoft Defender for Cloud for Identity
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Get an introduction to Microsoft Defender for Identity and its capabilities that help you to protect your users' identities by monitoring profile user behavior and activities and protecting hybrid environments.
- Understand the capabilities of Microsoft Defender for Identity.
- Understand Microsoft Defender for Identity privacy.
- Module 2: Get an overview of the concepts and tools that will help you implement Microsoft Defender for Identity in your organization including components, such as the sensors, the portal, capacity planning, the setup process, and more.
- Understand the architecture of Microsoft Defender for Identity.
- Understand capacity planning for Microsoft Defender for Identity.
- Understand the setup process for Microsoft Defender for Identity.
- Module 3: Learn how Microsoft Defender for Identity helps you to protect your environment against different types of threats by enabling you to detect and investigate attempts to compromise credentials, lateral movement attacks, reconnaissance activity, and more.
- Understand threat detection in Microsoft Defender for Identity.
- Understand threat investigation in Microsoft Defender for Identity.
By the end of this module, you'll be able to:
By the end of this module, you'll be able to:
By the end of this module, you'll be able to:
Syllabus
- Module 1: Introduction to Microsoft Defender for Identity
- Introduction
- What is Microsoft Defender for Identity?
- Get an overview of the capabilities of Microsoft Defender for Identity
- Understand Microsoft Defender for Identity privacy
- Knowledge check
- Summary
- Module 2: Plan for Microsoft Defender for Identity
- Introduction
- Get an overview of Microsoft Defender for Identity's architecture
- Identify considerations for Microsoft Defender for Identity
- Knowledge check
- Summary
- Module 3: Defend against attacks with Microsoft Defender for Identity
- Introduction
- Use Microsoft Defender for Identity to identify attacks
- Investigate attacks with Microsoft Defender for Identity
- Knowledge check
- Summary
Tags
Related Courses
FinTech for Finance and Business LeadersACCA via edX Access Controls
(ISC)² via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera Advanced System Security Design
University of Colorado System via Coursera