- Module 1: Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data.
- Define security threats.
- Understand common threats.
- Explain how the threat landscape is evolving.
- Module 2: Learn how Microsoft Defender for Endpoint can help your organization stay secure.
- Define the capabilities of Microsoft Defender for Endpoint.
- Understand how to hunt threats within your network.
- Explain how Microsoft Defender for Endpoint can remediate risks in your environment.
- Module 3: Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender.
- Define the capabilities of Microsoft Defender for Office 365.
- Understand how to simulate attacks within your network.
- Explain how Microsoft Defender for Office 365 can remediate risks in your environment.
- Module 4: Learn about the Microsoft Defender for Identity component of Microsoft 365 Defender.
- Define the capabilities of Microsoft Defender for Identity.
- Understand how to configure Microsoft Defender for Identity sensors.
- Explain how Microsoft Defender for Identity can remediate risks in your environment.
In this module, you will learn how to:
In this module, you will learn how to:
In this module, you will learn how to:
Upon completion of this module, you should be able to: