Implement threat protection by using Microsoft Defender for Office 365
This module examines the Microsoft Defender for Office 365 protection stack and its corresponding threat intelligence features, including Threat Explorer, Threat Trackers, and Attack simulation training.
Describe the protection stack provided by Microsoft Defender for Office 365., Understand how Threat Explorer can be used to investigate threats and help to protect your tenant., Describe the Threat Tracker widgets and views that provide you with intelligence on different cybersecurity issues that might affect your company., Run realistic attack scenarios using Attack Simulator to help identify vulnerable users before a real attack impacts your organization.
Prerequisites
There are no reviews yet.