Mitigate Threats Using Microsoft 365 Defender
In this course you’re going to cover the skills measured in the Mitigate Threats using 365 Defender objective in the exam guide.
Microsoft Defener 365 is a frontline tool for protecting your organization from threats. In this course, Mitigate Threats Using Microsoft 365 Defender, you’ll learn to protect, detect, and respond to threats that span across identities, endpoints, productivity, and risky activities. First, you’ll explore how to protect your productivity environment. Next, you’ll discover how to protect endpoints from modern attacks. You will then focus on protecting identities and finally, you’ll learn how to perform cross domain investigation and hunting. When you’re finished with this course, you’ll have the skills and knowledge that is required to pass the Microsoft Security Operations Analyst exam.
Author Name: Rishalin Pillay
Author Description:
Rishalin is a prolific author and cybersecurity expert. He has authored several video courses on Pluralsight, as well as three books: “Learn Penetration Testing”, “Offensive Shellcode from Scratch.” and “Ethical Hacking Workshop”. He is also a technical contributor to many other books on topics such as dark web analysis, Kali Linux, offensive security, and SECOPS. He has received the Microsoft Content Publisher Gold and Platinum awards for his contributions to the cybersecurity industry. Rishal… more
Table of Contents
- Course Overview
1min - Mitigate Threats to the Productivity Environment Using Microsoft 365 Defender
37mins - Mitigate Endpoint Threats Using Defender for Endpoint
47mins - Mitigate Identity Threats Using Defender for Identity
44mins - Manage Cross-domain Investigations in Microsoft 365 Defender Portal
14mins - Domain Summary
1min
There are no reviews yet.