Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Core Tech

Implementing and Managing Microsoft Defender for Identity

This course teaches you how to protect your identities by implementing and managing Defender for Identity. You'll gain the skills and knowledge needed to successfully plan, implement, and manage protections for your identities in Active Directory.

Rishalin Pillay - Pluralsight course - Implementing and Managing Microsoft Defender for Identity
by Rishalin Pillay

What you'll learn

Today an identity is more valuable than a password. Cyberattacks thrive on being able to compromise an identity as the access granted to identities far exceeds those that can be obtained by a single password. In this course, Implementing and Managing Microsoft Defender for Identity, you’ll learn how to successfully implement and manage identity protections using Defender for Identity. First, you’ll explore how to properly plan and deploy Defender for Identity. Next, you’ll focus on managing the various configurations for the solution. Finally, you'll gain insight into the types of identity attacks that the solution is able to highlight, thereby helping you easily identify these attacks and take action. By the end of this course, you’ll have the skills needed to fully implement and manage Microsoft Defender for Identity.

Table of contents

About the author

Rishalin Pillay - Pluralsight course - Implementing and Managing Microsoft Defender for Identity
Rishalin Pillay

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

More Courses by Rishalin