- In this module, you will learn about malware and common network-related security threats and the steps that you can take to mitigate them.
After completing this module, you will be able to:
- Describe malware.
- Understand the sources of malware.
- Describe ways of mitigating malware.
- Identify common network-related security threats.
- Describe the methods by which you can mitigate these common security threats.
- Describe tools for securing users identity.
- Describe tools for securing data on Windows.
- Describe tools for securing Windows devices.
- The module explains how Microsoft Defender can be used to protect against malware and reduce exposure to attacks using a firewall.
After completing this module, you will be able to:
- Use Microsoft Defender to detect and quarantine malware.
- Describe the purpose of a firewall.
- Describe Windows Defender Firewall functionality.
- Explain network-location profiles.
- Explain the increased functionality of Windows Defender Firewall with Advanced Security.
- This module explains the benefits of using encryption to protect drives and files against unauthorized access.
After completing this module, you will be able to:
- Describe the benefits of drive encryption with BitLocker
- Describe the benefits of Encrypted File System
- This module describes how connection security rules can be used to provide additional security to protect data transmitted across networks.
After completing this module, you will be able to:
- Describe the purpose and functionality of IPsec.
- Describe how to configure IPsec.
- Describe connection security rules.
- Explain authentication options.
- Monitor connections.
- This module explores additional tools used to provide additional layers of security within an organization.
After completing this module, you'll be able to:
- Describe the features and use of the Security Compliance Toolkit
- Describe the features of AppLocker
- Describe methods of securing data in the enterprise
- Describe the benefits and features of Microsoft Defender for Endpoint
MD-100 Configure threat protection
Foundations for Product Management Success
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Explore malware and threat protection
- Introduction
- Explain malware
- Determine possible mitigations for malware threats
- Understand phishing scams
- Explain common network-related security threats
- Determine mitigations for network-related security threats
- Module assessment
- Summary
- Explore Microsoft Defender
- Introduction
- Explain Microsoft Defender Antivirus
- Understand Firewalls
- Explain Windows Defender Firewall
- Examine network location profiles
- Explain Windows Defender Firewall with Advanced Security
- Module assessment
- Summary
- Explore device encryption features
- Introduction
- Examine BitLocker
- Evaluate BitLocker and TPMs
- Recover a BitLocker-encrypted drive
- Assess Encrypting Files System
- Module assessment
- Summary
- Explore connection security rules
- Introduction
- Explain IPSec
- Explain connection security rules
- Explore authentication options
- Monitor security policies and active connections
- Module assessment
- Summary
- Explore advanced protection methods
- Introduction
- Explore the Security Compliance Toolkit
- Use AppLocker to control applications
- Use AppLocker to control Universal Windows Platform apps
- Secure data in the enterprise
- Understand Microsoft Defender for Endpoint
- Module assessment
- Summary