YoVDO

Microsoft 365 Mobility and Security: Security and Threat Management

Offered By: Pluralsight

Tags

Microsoft Office 365 Courses Cybersecurity Courses Security Policies Courses Microsoft 365 Courses Microsoft Defender for Endpoint Courses

Course Description

Overview

Explore the solutions and the integration of Microsoft Defender for Office 365, Microsoft Defender for Identity, Microsoft Cloud App Security, and Microsoft Defender for Endpoint in this course.

Microsoft 365 comes equipped with a broad array of security and threat management solutions. So many, in fact, that the most difficult part of using them is first understanding them, and knowing where one feature set ends and the others begin. In this course, Microsoft 365 Mobility and Security: Security and Threat Management, the third course of four in this learning path, you'll start with a broad exploration of the threat protection solutions with Microsoft Defender. First, you'll implement Defender for Office 365 policies, integrate Defender for Identity, and then Defender for Endpoint to aggregate security signals across your cloud, server, and device components. Next, you'll plan and implement Microsoft Cloud App Security to discover and control the cloud applications used by our users. Finally, you'll explore, once integrated, the visualizations and dashboards these solutions surface that provide deep-level access to bad behaviors, malware activities, and inappropriate application accesses. By the end of this course, you'll have an understanding of the features and integrations between the threat management solutions spanning from Office 365 security policies, to Azure identity security, to Cloud App Security, and even down to the individual device with Defender for Endpoint.

Syllabus

  • Course Overview 2mins
  • Introduction 3mins
  • Plan and Implement Threat Protection with Microsoft Defender 47mins
  • Plan Microsoft Cloud App Security 31mins
  • Manage Security Reports and Alerts 16mins

Taught by

Greg Shields

Related Courses

FinTech for Finance and Business Leaders
ACCA via edX
Access Controls
(ISC)² via Coursera
Advanced Cyber Security Training
EC-Council via FutureLearn
Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera
Advanced System Security Design
University of Colorado System via Coursera