Implementing and Managing Microsoft Defender for Identity
Offered By: Pluralsight
Course Description
Overview
This course teaches you how to protect your identities by implementing and managing Defender for Identity. You'll gain the skills and knowledge needed to successfully plan, implement, and manage protections for your identities in Active Directory.
Today an identity is more valuable than a password. Cyberattacks thrive on being able to compromise an identity as the access granted to identities far exceeds those that can be obtained by a single password. In this course, Implementing and Managing Microsoft Defender for Identity, you’ll learn how to successfully implement and manage identity protections using Defender for Identity. First, you’ll explore how to properly plan and deploy Defender for Identity. Next, you’ll focus on managing the various configurations for the solution. Finally, you'll gain insight into the types of identity attacks that the solution is able to highlight, thereby helping you easily identify these attacks and take action. By the end of this course, you’ll have the skills needed to fully implement and manage Microsoft Defender for Identity.
Today an identity is more valuable than a password. Cyberattacks thrive on being able to compromise an identity as the access granted to identities far exceeds those that can be obtained by a single password. In this course, Implementing and Managing Microsoft Defender for Identity, you’ll learn how to successfully implement and manage identity protections using Defender for Identity. First, you’ll explore how to properly plan and deploy Defender for Identity. Next, you’ll focus on managing the various configurations for the solution. Finally, you'll gain insight into the types of identity attacks that the solution is able to highlight, thereby helping you easily identify these attacks and take action. By the end of this course, you’ll have the skills needed to fully implement and manage Microsoft Defender for Identity.
Syllabus
- Course Overview 1min
- Planning and Deploying Defender for Identity 44mins
- Managing Defender for Identity 31mins
Taught by
Rishalin Pillay
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network