Mitigate Threats Using Microsoft 365 Defender
In this course you’re going to cover the skills measured in the Mitigate Threats using 365 Defender objective in the exam guide.
What you'll learn
Microsoft Defener 365 is a frontline tool for protecting your organization from threats. In this course, Mitigate Threats Using Microsoft 365 Defender, you’ll learn to protect, detect, and respond to threats that span across identities, endpoints, productivity, and risky activities. First, you’ll explore how to protect your productivity environment. Next, you’ll discover how to protect endpoints from modern attacks. You will then focus on protecting identities and finally, you’ll learn how to perform cross domain investigation and hunting. When you’re finished with this course, you’ll have the skills and knowledge that is required to pass the Microsoft Security Operations Analyst exam.
Table of contents
- Module Introduction 2m
- Configuration Overview 1m
- Demo: Working with the Configuration, Advanced Features, and Custom Indicators 6m
- Overview of Alerts and Incidents 3m
- Demo: Working with Alerts and Incidents 8m
- Demo: Performing Endpoint Investigations 5m
- Threat Analytics 1m
- Demo: Exploring Threat Analytics 5m
- Demo: Threat and Vulnerability Management 9m
- Attack Surface Reduction Rules 2m
- Demo: Implementing ASR Rules 4m
- Module Summary 1m
- Module Introduction 1m
- Conditional Access 3m
- Demo: Implementing Conditional Access 6m
- Azure Identity Protection 5m
- Demo: Implementing Identity Protection Policies 3m
- Demo: Investigating Risky Users 4m
- Identity Secure Score 5m
- Defender for Cloud Apps 3m
- Demo: Working with Defender for Cloud Apps 7m
- Defender for Identity 7m
- Module Summary 2m