Learn how to implement and manage threat protection for devices and applications throughout an enterprise as you study for the MS-500 exam.
Overview
Syllabus
Introduction
- Threat protection
- What you should know
- Lab setup
- Plan a Microsoft Defender for Identity solution
- Install and configure Microsoft Defender for Identity
- Monitor and manage Microsoft Defender for Identity
- Plan a Microsoft Defender for Endpoint solution
- Implement Microsoft Defender for Endpoint
- Manage and monitor Microsoft Defender for Endpoint
- Plan for device and application protection
- Configure and manage Microsoft Defender Application Guard
- Configure and manage Microsoft Defender Application Control
- Configure and manage exploit protection
- Configure Secure Boot
- Configure and manage Windows device encryption
- Configure and manage non-Windows device encryption
- Plan for securing application data on devices
- Implement application protection policies
- Configure Microsoft Defender for Office 365
- Monitor Microsoft Defender for Office 365
- Conduct simulated attacks using Attack Simulator
- Plan and implement Azure Sentinel
- Configure playbooks in Azure Sentinel
- Manage and monitor Azure Sentinel
- Respond to threats in Azure Sentinel
- Next steps
Taught by
Pete Zerger