Mitigate Threats Using Microsoft 365 Defender
Offered By: Pluralsight
Course Description
Overview
In this course you’re going to cover the skills measured in the Mitigate Threats using 365 Defender objective in the exam guide.
Microsoft Defener 365 is a frontline tool for protecting your organization from threats. In this course, Mitigate Threats Using Microsoft 365 Defender, you’ll learn to protect, detect, and respond to threats that span across identities, endpoints, productivity, and risky activities. First, you’ll explore how to protect your productivity environment. Next, you’ll discover how to protect endpoints from modern attacks. You will then focus on protecting identities and finally, you’ll learn how to perform cross domain investigation and hunting. When you’re finished with this course, you’ll have the skills and knowledge that is required to pass the Microsoft Security Operations Analyst exam.
Microsoft Defener 365 is a frontline tool for protecting your organization from threats. In this course, Mitigate Threats Using Microsoft 365 Defender, you’ll learn to protect, detect, and respond to threats that span across identities, endpoints, productivity, and risky activities. First, you’ll explore how to protect your productivity environment. Next, you’ll discover how to protect endpoints from modern attacks. You will then focus on protecting identities and finally, you’ll learn how to perform cross domain investigation and hunting. When you’re finished with this course, you’ll have the skills and knowledge that is required to pass the Microsoft Security Operations Analyst exam.
Syllabus
- Course Overview 1min
- Mitigate Threats to the Productivity Environment Using Microsoft 365 Defender 37mins
- Mitigate Endpoint Threats Using Defender for Endpoint 47mins
- Mitigate Identity Threats Using Defender for Identity 44mins
- Manage Cross-domain Investigations in Microsoft 365 Defender Portal 14mins
- Domain Summary 1min
Taught by
Rishalin Pillay
Related Courses
Windows 10 Security FeaturesMicrosoft via edX Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Cybersecurity Compliance Framework & System Administration
IBM via Coursera Cybersecurity Compliance and Framework
IBM via edX Securing Microsoft Azure Data Access Endpoints
Pluralsight