Microsoft 365 Security: Threat Protection Implementation and Management
Offered By: Pluralsight
Course Description
Overview
This Microsoft 365 cyber security course will teach you how to plan, implement, and manage Microsoft’s Threat protection stack within your organization.
All organizations are targets for cyber attacks. As the threat landscape evolves, your security operations need to evolve too. In this course, Microsoft 365 Security: Threat Protection Implementation and Management, you’ll learn to implement and manage Microsoft’s Threat Protection stack. First, you’ll explore how to protect identities. Next, you’ll discover how to protect endpoints and Office 365. Finally, you’ll learn how to perform advanced hunting by pulling all the data together into a single pane of glass for incident management and advanced hunting. When you’re finished with this course, you’ll have the skills and knowledge of Microsoft’s Threat Protection stack needed to help you to protect against threats, ultimately reducing your attack surface.
All organizations are targets for cyber attacks. As the threat landscape evolves, your security operations need to evolve too. In this course, Microsoft 365 Security: Threat Protection Implementation and Management, you’ll learn to implement and manage Microsoft’s Threat Protection stack. First, you’ll explore how to protect identities. Next, you’ll discover how to protect endpoints and Office 365. Finally, you’ll learn how to perform advanced hunting by pulling all the data together into a single pane of glass for incident management and advanced hunting. When you’re finished with this course, you’ll have the skills and knowledge of Microsoft’s Threat Protection stack needed to help you to protect against threats, ultimately reducing your attack surface.
Taught by
Rishalin Pillay
Related Courses
Windows 10 Security FeaturesMicrosoft via edX Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Cybersecurity Compliance Framework & System Administration
IBM via Coursera Cybersecurity Compliance and Framework
IBM via edX Securing Microsoft Azure Data Access Endpoints
Pluralsight