Microsoft Defender Course with hands on training and sims
Microsoft Defender Course with hands on training and sims, available at $19.99, has an average rating of 4.64, with 83 lectures, based on 579 reviews, and has 4233 subscribers.
You will learn about Learn the concepts and perform hands on activities needed to master Microsoft Defender XDR (formerly Microsoft 365 Defender) Gain a tremendous amount of knowledge involving Microsoft Defender XDR (formerly Microsoft 365 Defender) Learn using hands on simulations on how Microsoft Defender XDR (formerly Microsoft 365 Defender) is administered! Learn how to set up your own test lab for practicing the concepts! This course is ideal for individuals who are IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender) It is particularly useful for IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender).
Enroll now: Microsoft Defender Course with hands on training and sims
Summary
Title: Microsoft Defender Course with hands on training and sims
Price: $19.99
Average Rating: 4.64
Number of Lectures: 83
Number of Published Lectures: 82
Number of Curriculum Items: 92
Number of Published Curriculum Objects: 91
Original Price: $49.99
Quality Status: approved
Status: Live
What You Will Learn
- Learn the concepts and perform hands on activities needed to master Microsoft Defender XDR (formerly Microsoft 365 Defender)
- Gain a tremendous amount of knowledge involving Microsoft Defender XDR (formerly Microsoft 365 Defender)
- Learn using hands on simulations on how Microsoft Defender XDR (formerly Microsoft 365 Defender) is administered!
- Learn how to set up your own test lab for practicing the concepts!
Who Should Attend
- IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender)
Target Audiences
- IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender)
We really hope you’ll agree, this training is way more than the average course on Udemy!
Have access to the following:
-
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
-
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
-
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
-
Welcome to the course
-
Understanding the Microsoft Environment
-
Foundations of Active Directory Domains
-
Foundations of RAS, DMZ, and Virtualization
-
Foundations of the Microsoft Cloud Services
-
DONT SKIP: The first thing to know about Microsoft cloud services
-
DONT SKIP: Azure AD is now renamed to Entra ID
-
Questions for John Christopher
Performing hands on activities
-
DONT SKIP: Using Assignments in the course
-
Creating a free Microsoft 365 Account
-
Activating licenses for Defender for Endpoint and Vulnerabilities
-
Getting your free Azure credit
Basic concepts of the Microsoft Defender Suite and Services
-
The Microsoft 365 Defender Suite
-
Using the Defender and Purview admin centers
Microsoft Defender for Office 365
-
What is Microsoft Defender for Office 365?
-
Implementing policies for uses in Email, SharePoint, OneDrive, and Teams
-
Dealing with threats using Defender for Office 365
-
Performing a campaign email attack simulation in Microsoft Defender
Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)
-
Understanding the concepts of Microsoft Defender for Cloud Apps
-
Investigating security risks in Defender for Cloud Apps
-
Concepts of data loss prevention in Microsoft Defender
-
Alerts with data loss prevention policies (DLP)
-
Data loss prevention (DLP) policy alert investigation
Microsoft Defender for Endpoint and Defender Vulnerability Management
-
Understanding Microsoft Defender for Endpoint concepts
-
Deploy a Windows 11 VM endpoint
-
Attack surface reduction (ASR) support with Intune
-
Working with device onboarding regarding Defender for Endpoint
-
Something to be aware of about extra features
-
Endpoint advanced features, alerts and incidents
-
Endpoint vulnerabilities
-
Device attack surface reduction (ASR)
-
Device groups with Defender for Endpoint
-
Microsoft Defender Vulnerability Management risk identification
-
Endpoint threat indicators
-
Device discovery of unmanaged devices
Microsoft Defender for Identity
-
Microsoft Entra ID security risk mitigation
-
Concepts of using Microsoft Entra Identity Protection
-
Microsoft Entra Identity Protection security risk mitigation
-
Microsoft Entra Identity Protection risks in regards to Microsoft Defender
-
Microsoft Defender for Identity concepts
-
Using Defender for Identity to mitigate threats with AD DS
Microsoft 365 Defender as an Extended Detection and Response (XDR)
-
Visualizing the concepts of extended detection and responses (XDR)
-
Configuring the Microsoft 365 Defender simulation lab
-
Performing an attack using the simulation lab
-
Microsoft 365 Defender incidents and automated investigations
-
Microsoft 365 Defender action and submissions
-
Using Kusto Query Language (KQL) for threat identification
-
Microsoft Secure Score
-
Microsoft 365 Defender threat analytics
-
Custom detections and alerts
Getting started w/ Defender for Cloud, Defender for Servers & Defender for DevOps
-
Introduction to Microsoft Defender for Cloud
-
Regulatory compliance policies along with MCSB
-
Remediation’s with secure score in Microsoft Defender for Cloud
-
Microsoft Defender for Servers
-
Microsoft Defender for DevOps
-
Microsoft Defender External Attack Surface Management (EASM)
Microsoft Defender for Cloud full management and configurations
-
Settings config in Microsoft Defender for Cloud
-
Roles in Microsoft Defender for Cloud
-
Cloud workload protection
-
Automation of onboarding Azure resource
-
Azure Arc connections
-
Multi-cloud connections
-
Email notifications in Microsoft Defender for Cloud
-
Using alert suppression rules
-
Workflow automation configuration in Defender for Cloud
-
Using sample alerts and incidents
-
Using Microsoft Defender for Cloud recommendations
-
Security alerts and incidents in Microsoft Defender for Cloud
-
Using threat intelligence reports with Microsoft Defender for Cloud
Dealing with insider risks in Microsoft 365
-
Concepts of insider risk policies
-
Insider risk policy generation
-
Insider risk policy alert investigation
Audit and search capabilities in Microsoft Defender and Microsoft Purview
-
Licensing of unified audit logging
-
Permissions for unified auditing
-
Threat hunting with unified audit logging
-
Threat hunting with Content Searches
Conclusion
-
Cleaning up your lab environment
-
Getting a Udemy certificate
-
BONUS Where do I go from here?
Course Curriculum
Chapter 1: Introduction
Lecture 1: Welcome to the course!
Lecture 2: Understanding the Microsoft Environment
Lecture 3: Foundations of Active Directory Domains
Lecture 4: Foundations of RAS, DMZ, and Virtualization
Lecture 5: Foundations of the Microsoft Cloud Services
Lecture 6: DONT SKIP: The first thing to know about Microsoft cloud services
Lecture 7: DONT SKIP: Azure AD is now renamed to Entra ID
Lecture 8: Questions for John Christopher
Lecture 9: Certificate of Completion
Chapter 2: Performing hands on activities
Lecture 1: DONT SKIP: Using Assignments (SIMULATIONS) in the course
Lecture 2: DONT SKIP: Before beginning your account setup
Lecture 3: Creating a free Microsoft 365 Account
Lecture 4: Activating licenses for Defender for Endpoint and Vulnerabilities
Lecture 5: Getting your free Azure credit
Chapter 3: Basic concepts of the Microsoft Defender Suite and Services
Lecture 1: The Microsoft 365 Defender Suite
Lecture 2: Using the Defender and Purview admin centers
Chapter 4: Microsoft Defender for Office 365
Lecture 1: What is Microsoft Defender for Office 365?
Lecture 2: Implementing policies for uses in Email, SharePoint, OneDrive, and Teams
Lecture 3: Dealing with threats using Defender for Office 365
Lecture 4: Performing a campaign email attack simulation in Microsoft Defender
Chapter 5: Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)
Lecture 1: Understanding the concepts of Microsoft Defender for Cloud Apps
Lecture 2: Investigating security risks in Defender for Cloud Apps
Lecture 3: Concepts of data loss prevention in Microsoft Defender
Lecture 4: Alerts with data loss prevention policies (DLP)
Lecture 5: Data loss prevention (DLP) policy alert investigation
Chapter 6: Microsoft Defender for Endpoint and Defender Vulnerability Management
Lecture 1: Understanding Microsoft Defender for Endpoint concepts
Lecture 2: Deploy a Windows 11 VM endpoint
Lecture 3: Attack surface reduction (ASR) support with Intune
Lecture 4: Working with device onboarding regarding Defender for Endpoint
Lecture 5: Something to be aware of about extra features
Lecture 6: Endpoint advanced features, alerts and incidents
Lecture 7: Endpoint vulnerabilities
Lecture 8: Device attack surface reduction (ASR)
Lecture 9: Device groups with Defender for Endpoint
Lecture 10: Microsoft Defender Vulnerability Management risk identification
Lecture 11: Endpoint threat indicators
Lecture 12: Device discovery of unmanaged devices
Chapter 7: Microsoft Defender for Identity
Lecture 1: Microsoft Entra ID security risk mitigation
Lecture 2: Concepts of using Microsoft Entra Identity Protection
Lecture 3: Microsoft Entra Identity Protection security risk mitigation
Lecture 4: Microsoft Entra Identity Protection risks in regards to Microsoft Defender
Lecture 5: Microsoft Defender for Identity concepts
Lecture 6: Using Defender for Identity to mitigate threats with AD DS
Chapter 8: Microsoft 365 Defender as an Extended Detection and Response (XDR)
Lecture 1: Visualizing the concepts of extended detection and responses (XDR)
Lecture 2: PLEASE NOTE: The Defender for Endpoint lab is now deprecated
Lecture 3: Configuring the Microsoft 365 Defender simulation lab
Lecture 4: Performing an attack using the simulation lab
Lecture 5: Microsoft 365 Defender incidents and automated investigations
Lecture 6: Microsoft 365 Defender action and submissions
Lecture 7: Using Kusto Query Language (KQL) for threat identification
Lecture 8: Microsoft Secure Score
Lecture 9: Microsoft 365 Defender threat analytics
Lecture 10: Custom detections and alerts
Chapter 9: Getting started w/ Defender for Cloud,Defender for Servers & Defender for DevOps
Lecture 1: Introduction to Microsoft Defender for Cloud
Lecture 2: Regulatory compliance policies along with MCSB
Lecture 3: Remediation's with secure score in Microsoft Defender for Cloud
Lecture 4: Microsoft Defender for Servers
Lecture 5: Microsoft Defender for DevOps
Lecture 6: Microsoft Defender External Attack Surface Management (EASM)
Chapter 10: Microsoft Defender for Cloud full management and configurations
Lecture 1: Settings config in Microsoft Defender for Cloud
Lecture 2: Roles in Microsoft Defender for Cloud
Lecture 3: Cloud workload protection
Lecture 4: Automation of onboarding Azure resource
Lecture 5: Azure Arc connections
Lecture 6: Multi-cloud connections
Lecture 7: Email notifications in Microsoft Defender for Cloud
Lecture 8: Using alert suppression rules
Lecture 9: Workflow automation configuration in Defender for Cloud
Lecture 10: Using sample alerts and incidents
Lecture 11: Using Microsoft Defender for Cloud recommendations
Lecture 12: Security alerts and incidents in Microsoft Defender for Cloud
Lecture 13: Using threat intelligence reports with Microsoft Defender for Cloud
Chapter 11: Dealing with insider risks in Microsoft 365
Lecture 1: Concepts of insider risk policies
Lecture 2: Insider risk policy generation
Lecture 3: Insider risk policy alert investigation
Chapter 12: Audit and search capabilities in Microsoft Defender and Microsoft Purview
Lecture 1: Licensing of unified audit logging
Lecture 2: Permissions for unified auditing
Lecture 3: Threat hunting with unified audit logging
Lecture 4: Threat hunting with Content Searches
Instructors
-
John Christopher
IT Engineer and Trainer for 25 Years in the industry
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 6 votes
- 3 stars: 29 votes
- 4 stars: 195 votes
- 5 stars: 349 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024