% Off Udemy Coupon - CoursesWyn

Microsoft Defender Course with hands on training and sims

Learn how to expertly administer Microsoft Defender XDR (formerly Microsoft 365 Defender) with hands on experience!

$9.99 (93% OFF)
Get Course Now

About This Course

<div>We really hope you'll agree, this training is way more than the average course on Udemy!</div><div><br></div><div>Have access to the following:</div><div><ul><li><span style="font-size: 1rem;">Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer</span></li><li><span style="font-size: 1rem;">Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material</span></li><li><span style="font-size: 1rem;">Instructor led hands on and simulations to practice that can be followed even if you have little to no experience</span></li></ul></div><div><br></div><div>TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:</div><div><span style="font-size: 1rem;">Introduction</span></div><div><ul><li><span style="font-size: 1rem;">Welcome to the course</span></li><li><span style="font-size: 1rem;">Understanding the Microsoft Environment</span></li><li><span style="font-size: 1rem;">Foundations of Active Directory Domains</span></li><li><span style="font-size: 1rem;">Foundations of RAS, DMZ, and Virtualization</span></li><li><span style="font-size: 1rem;">Foundations of the Microsoft Cloud Services</span></li><li><span style="font-size: 1rem;">DONT SKIP: The first thing to know about Microsoft cloud services</span></li><li><span style="font-size: 1rem;">DONT SKIP: Azure AD is now renamed to Entra ID</span></li><li><span style="font-size: 1rem;">Questions for John Christopher</span></li></ul></div><div><span style="font-size: 1rem;">Performing hands on activities</span></div><div><ul><li><span style="font-size: 1rem;">DONT SKIP: Using Assignments in the course</span></li><li><span style="font-size: 1rem;">Creating a free Microsoft 365 Account</span></li><li><span style="font-size: 1rem;">Activating licenses for Defender for Endpoint and Vulnerabilities</span></li><li><span style="font-size: 1rem;">Getting your free Azure credit</span></li></ul></div><div><span style="font-size: 1rem;">Basic concepts of the Microsoft Defender Suite and Services</span></div><div><ul><li><span style="font-size: 1rem;">The Microsoft 365 Defender Suite</span></li><li><span style="font-size: 1rem;">Using the Defender and Purview admin centers</span></li></ul></div><div><span style="font-size: 1rem;">Microsoft Defender for Office 365</span></div><div><ul><li><span style="font-size: 1rem;">What is Microsoft Defender for Office 365?</span></li><li><span style="font-size: 1rem;">Implementing policies for uses in Email, SharePoint, OneDrive, and Teams</span></li><li><span style="font-size: 1rem;">Dealing with threats using Defender for Office 365</span></li><li><span style="font-size: 1rem;">Performing a campaign email attack simulation in Microsoft Defender</span></li></ul></div><div><span style="font-size: 1rem;">Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)</span></div><div><ul><li><span style="font-size: 1rem;">Understanding the concepts of Microsoft Defender for Cloud Apps</span></li><li><span style="font-size: 1rem;">Investigating security risks in Defender for Cloud Apps</span></li><li><span style="font-size: 1rem;">Concepts of data loss prevention in Microsoft Defender</span></li><li><span style="font-size: 1rem;">Alerts with data loss prevention policies (DLP)</span></li><li><span style="font-size: 1rem;">Data loss prevention (DLP) policy alert investigation</span></li></ul></div><div><span style="font-size: 1rem;">Microsoft Defender for Endpoint and Defender Vulnerability Management</span></div><div><ul><li><span style="font-size: 1rem;">Understanding Microsoft Defender for Endpoint concepts</span></li><li><span style="font-size: 1rem;">Deploy a Windows 11 VM endpoint</span></li><li><span style="font-size: 1rem;">Attack surface reduction (ASR) support with Intune</span></li><li><span style="font-size: 1rem;">Working with device onboarding regarding Defender for Endpoint</span></li><li><span style="font-size: 1rem;">Something to be aware of about extra features</span></li><li><span style="font-size: 1rem;">Endpoint advanced features, alerts and incidents</span></li><li><span style="font-size: 1rem;">Endpoint vulnerabilities</span></li><li><span style="font-size: 1rem;">Device attack surface reduction (ASR)</span></li><li><span style="font-size: 1rem;">Device groups with Defender for Endpoint</span></li><li>Microsoft Defender Vulnerability Management risk identification</li><li>Endpoint threat indicators</li><li>Device discovery of unmanaged devices</li></ul></div><div><span style="font-size: 1rem;">Microsoft Identity Concepts</span></div><div><ul><li><span style="font-size: 1rem;">Microsoft Entra ID security risk mitigation</span></li><li><span style="font-size: 1rem;">Concepts of using Microsoft Entra Identity Protection</span></li><li><span style="font-size: 1rem;">Microsoft Entra Identity Protection security risk mitigation</span></li><li><span style="font-size: 1rem;">Microsoft Entra Identity Protection risks in regards to Microsoft Defender</span></li><li><span style="font-size: 1rem;">Microsoft Defender for Identity concepts</span></li><li><span style="font-size: 1rem;">Using Defender for Identity to mitigate threats with AD DS</span></li></ul></div><div><span style="font-size: 1rem;">Microsoft 365 Defender as an Extended Detection and Response (XDR)</span></div><div><ul><li><span style="font-size: 1rem;">Visualizing the concepts of extended detection and responses (XDR)</span></li><li><span style="font-size: 1rem;">Configuring the Microsoft 365 Defender simulation lab</span></li><li><span style="font-size: 1rem;">Performing an attack using the simulation lab</span></li><li><span style="font-size: 1rem;">Microsoft 365 Defender incidents and automated investigations</span></li><li><span style="font-size: 1rem;">Microsoft 365 Defender action and submissions</span></li><li><span style="font-size: 1rem;">Using Kusto Query Language (KQL) for threat identification</span></li><li><span style="font-size: 1rem;">Microsoft Secure Score</span></li><li><span style="font-size: 1rem;">Microsoft 365 Defender threat analytics</span></li><li><span style="font-size: 1rem;">Custom detections and alerts</span></li></ul></div><div><span style="font-size: 1rem;">Getting started w/ Defender for Cloud, Defender for Servers &amp; Defender for DevOps</span></div><div><ul><li><span style="font-size: 1rem;">Introduction to Microsoft Defender for Cloud</span></li><li><span style="font-size: 1rem;">Regulatory compliance policies along with MCSB</span></li><li><span style="font-size: 1rem;">Remediation's with secure score in Microsoft Defender for Cloud</span></li><li><span style="font-size: 1rem;">Microsoft Defender for Servers</span></li><li><span style="font-size: 1rem;">Microsoft Defender for DevOps</span></li><li><span style="font-size: 1rem;">Microsoft Defender External Attack Surface Management (EASM)</span></li></ul></div><div><span style="font-size: 1rem;">Microsoft Defender for Cloud full management and configurations</span></div><div><ul><li><span style="font-size: 1rem;">Settings config in Microsoft Defender for Cloud</span></li><li><span style="font-size: 1rem;">Roles in Microsoft Defender for Cloud</span></li><li><span style="font-size: 1rem;">Cloud workload protection</span></li><li><span style="font-size: 1rem;">Automation of onboarding Azure resource</span></li><li><span style="font-size: 1rem;">Azure Arc connections</span></li><li><span style="font-size: 1rem;">Multi-cloud connections</span></li><li><span style="font-size: 1rem;">Email notifications in Microsoft Defender for Cloud</span></li><li><span style="font-size: 1rem;">Using alert suppression rules</span></li><li><span style="font-size: 1rem;">Workflow automation configuration in Defender for Cloud</span></li><li><span style="font-size: 1rem;">Using sample alerts and incidents</span></li><li><span style="font-size: 1rem;">Using Microsoft Defender for Cloud recommendations</span></li><li><span style="font-size: 1rem;">Security alerts and incidents in Microsoft Defender for Cloud</span></li><li><span style="font-size: 1rem;">Using threat intelligence reports with Microsoft Defender for Cloud</span></li></ul></div><div><span style="font-size: 1rem;">Dealing with insider risks in Microsoft 365</span></div><div><ul><li><span style="font-size: 1rem;">Concepts of insider risk policies</span></li><li><span style="font-size: 1rem;">Insider risk policy generation</span></li><li><span style="font-size: 1rem;">Insider risk policy alert investigation</span></li></ul></div><div><span style="font-size: 1rem;">Audit and search capabilities in Microsoft Defender and Microsoft Purview</span></div><div><ul><li><span style="font-size: 1rem;">Licensing of unified audit logging</span></li><li><span style="font-size: 1rem;">Permissions for unified auditing</span></li><li><span style="font-size: 1rem;">Threat hunting with unified audit logging</span></li><li><span style="font-size: 1rem;">Threat hunting with Content Searches</span></li></ul></div><div><span style="font-size: 1rem;">Conclusion</span></div><div><ul><li><span style="font-size: 1rem;">Cleaning up your lab environment</span></li><li><span style="font-size: 1rem;">Getting a Udemy certificate</span></li><li><span style="font-size: 1rem;">BONUS Where do I go from here?</span></li></ul></div>

What you'll learn:

  • Learn the concepts and perform hands on activities needed to master Microsoft Defender XDR (formerly Microsoft 365 Defender)
  • Gain a tremendous amount of knowledge involving Microsoft Defender XDR (formerly Microsoft 365 Defender)
  • Learn using hands on simulations on how Microsoft Defender XDR (formerly Microsoft 365 Defender) is administered!
  • Learn how to set up your own test lab for practicing the concepts!