- Learn how Microsoft Defender for Endpoint can help your organization stay secure.
In this module, you learn how to:
- Define the capabilities of Microsoft Defender for Endpoint.
- Understand how to hunt threats within your network.
- Explain how Microsoft Defender for Endpoint can remediate risks in your environment.
- Learn how to investigate and remediate threats using Microsoft Defender for Office 365. Explore automated tools, phishing triage, and attack simulation.
After completing this module, you'll be able to:
- Automate threat investigation and response using Microsoft Defender for Office 365.
- Configure Safe Attachments, Safe Links, and anti-phishing policies.
- Use the Phishing Triage Agent to classify and triage phishing emails.
- Simulate attacks to identify vulnerabilities and improve security posture.
- Learn about the Microsoft Defender for Identity component of Microsoft Defender XDR.
Upon completion of this module, you should be able to:
- Define the capabilities of Microsoft Defender for Identity.
- Understand how to configure Microsoft Defender for Identity sensors.
- Explain how Microsoft Defender for Identity can remediate risks in your environment.
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Master Agentic AI, GANs, Fine-Tuning & LLM Apps
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Syllabus
- Protect against threats with Microsoft Defender for Endpoint
- Introduction to Microsoft Defender for Endpoint
- Practice security administration
- Hunt threats within your network
- Summary and knowledge check
- Remediate threats using Microsoft Defender
- Introduction to Microsoft Defender for Office 365
- Automate, investigate, and remediate
- Configure, protect, and detect
- Microsoft Security Copilot Phishing Triage Agent in Microsoft Defender
- Simulate attacks
- Summary and knowledge check
- Safeguard your environment with Microsoft Defender for Identity
- Introduction to Microsoft Defender for Identity
- Configure Microsoft Defender for Identity sensors
- Review compromised accounts or data
- Integrate with other Microsoft tools
- Summary and knowledge check