Implement threat intelligence in Microsoft 365

Created By
Microsoft via Microsoft Learn
  • 0
  • 2-3 hours worth of material
  • Microsoft Learn
  • English
Implement threat intelligence in Microsoft 365

Course Overview

  • Module 1: Explore threat intelligence in Microsoft 365
  • By the end of this module, you will be able to:

    • Describe how threat intelligence in Microsoft 365 is powered by the Microsoft Intelligent Security Graph
    • Describe how the threat dashboard can benefit C-level security officers
    • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant
    • Describe the Threat Tracker widgets and views that provide you with intelligence on different cybersecurity issues that might impact your company
    • Run realistic attack scenarios using Attack simulation training to help identify vulnerable users before a real attack impacts your organization
    • Describe how threat hunting in Microsoft Threat Protection enables security operators to identify cybersecurity threats
    • Describe how Advanced hunting in Microsoft 365 Defender proactively inspects events in your network to locate threat indicators and entities
  • Module 2: Explore the Security Dashboard
  • By the end of this module, you will be able to:

    • Describe how the Security Dashboard gives C-level executives insight into top risks, global trends, protection quality, and the organization’s exposure to threats
    • Explain how to use the Security Dashboard to quickly understand details about trends, where threats originate, and who the top targeted users are in your organization
    • Identify how the dashboard can be used as a launching point to enable security analysts to drill down for more details by using Threat Explorer
    • Describe the built-in alert policies in Microsoft 365
    • Describe the global weekly threat detections displayed in the Security Dashboard
  • Module 3: Implement Microsoft Defender for Identity
  • By the end of this module, you will be able to:

    • Describe how Microsoft Defender for Identity monitors users, entity behavior, and activities with learning-based analytics
    • Describe how Defender for Identity protects user identities and credentials stored in Active Directory
    • Describe how Defender for Identity identifies and investigates suspicious user activities and advanced attacks throughout the kill chain
    • Create your Microsoft Defender for Identity instance in the Defender for Identity portal
    • Use the built-in portal to monitor and respond to suspicious activity detected by Defender for Identity
  • Module 4: Implement Microsoft Cloud Application Security
  • By the end of this module, you will be able to:

    • Describe how Cloud App Security provides improved visibility into network cloud activity and increases the protection of critical data across cloud applications
    • Explain how to deploy Cloud App Security
    • Control your cloud apps with policies
    • Troubleshoot Cloud App Security

Course Circullum

  • Module 1: Explore threat intelligence in Microsoft 365
    • Introduction
    • Explore Microsoft Intelligent Security Graph
    • Examine the Security Dashboard in the Security & Compliance Center
    • Investigate security attacks by using Threat Explorer
    • Identify cybersecurity issues by using Threat Trackers
    • Prepare for attacks with Attack simulation training
    • Run automated investigations and responses
    • Explore threat hunting with Microsoft Threat Protection
    • Explore advanced threat hunting in Microsoft 365 Defender
    • Knowledge check
    • Summary
  • Module 2: Explore the Security Dashboard
    • Introduction
    • Examine threat detections in the Security Dashboard
    • Examine security and malware trends in the Security Dashboard
    • Examine alerts in the Security Dashboard
    • Explore the built-in alert policies in Microsoft 365
    • Examine the global threat detections in the Security Dashboard
    • Knowledge check
    • Summary
  • Module 3: Implement Microsoft Defender for Identity
    • Introduction
    • Explore Microsoft Defender for Identity
    • Create your Microsoft Defender for Identity instance
    • Work with the Microsoft Defender for Identity portal
    • Knowledge check
    • Summary
  • Module 4: Implement Microsoft Cloud Application Security
    • Introduction
    • Explore Cloud App Security
    • Deploy Cloud App Security
    • Control your cloud apps with policies
    • Troubleshoot Microsoft Cloud App Security
    • Knowledge check
    • Summary

out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Online Course

This Course Include:
  • Module 1: Explore threat intelligence in Microsoft 365
    • Introduction
    • Explore Microsoft Intelligent Security Graph
    • Examine the Security Dashboard in the Security & Compliance Center
    • Investigate security attacks by using Threat Explorer
    • Identify cybersecurity issues by using Threat Trackers
    • Prepare for attacks with Attack simulation training
    • Run automated investigations and responses
    • Explore threat hunting with Microsoft Threat Protection
    • Explore advanced threat hunting in Microsoft 365 Defender
    • Knowledge check
    • Summary
  • Module 2: Explore the Security Dashboard
    • Introduction
    • Examine threat detections in the Security Dashboard
    • Examine security and malware trends in the Security Dashboard
    • Examine alerts in the Security Dashboard
    • Explore the built-in alert policies in Microsoft 365
    • Examine the global threat detections in the Security Dashboard
    • Knowledge check
    • Summary
  • Module 3: Implement Microsoft Defender for Identity
    • Introduction
    • Explore Microsoft Defender for Identity
    • Create your Microsoft Defender for Identity instance
    • Work with the Microsoft Defender for Identity portal
    • Knowledge check
    • Summary
  • Module 4: Implement Microsoft Cloud Application Security
    • Introduction
    • Explore Cloud App Security
    • Deploy Cloud App Security
    • Control your cloud apps with policies
    • Troubleshoot Microsoft Cloud App Security
    • Knowledge check
    • Summary
  • Provider:Microsoft Learn
  • Certificate:Not Avalible
  • Language:English
  • Duration:2-3 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today