Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

MD-100 Configure threat protection

Microsoft via Microsoft Learn

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
  • Module 1: In this module, you will learn about malware and common network-related security threats and the steps that you can take to mitigate them.

    After completing this module, you will be able to:

    • Describe malware.
    • Understand the sources of malware.
    • Describe ways of mitigating malware.
    • Identify common network-related security threats.
    • Describe the methods by which you can mitigate these common security threats.
    • Describe tools for securing users identity.
    • Describe tools for securing data on Windows.
    • Describe tools for securing Windows devices.
  • Module 2: The module explains how Microsoft Defender can be used to protect against malware and reduce exposure to attacks using a firewall.

    After completing this module, you will be able to:

    • Use Microsoft Defender to detect and quarantine malware.
    • Describe the purpose of a firewall.
    • Describe Windows Defender Firewall functionality.
    • Explain network-location profiles.
    • Explain the increased functionality of Windows Defender Firewall with Advanced Security.
  • Module 3: This module explains the benefits of using encryption to protect drives and files against unauthorized access.

    After completing this module, you will be able to:

    • Describe the benefits of drive encryption with BitLocker
    • Describe the benefits of Encrypted File System
  • Module 4: This module describes how connection security rules can be used to provide additional security to protect data transmitted across networks.

    After completing this module, you will be able to:

    • Describe the purpose and functionality of IPsec.
    • Describe how to configure IPsec.
    • Describe connection security rules.
    • Explain authentication options.
    • Monitor connections.
  • Module 5: This module explores additional tools used to provide additional layers of security within an organization.

    After completing this module, you'll be able to:

    • Describe the features and use of the Security Compliance Toolkit
    • Describe the features of AppLocker
    • Describe methods of securing data in the enterprise
    • Describe the benefits and features of Microsoft Defender for Endpoint

Syllabus

  • Module 1: Module 1: Explore malware and threat protection
    • Introduction
    • Explain malware
    • Determine possible mitigations for malware threats
    • Understand phishing scams
    • Explain common network-related security threats
    • Determine mitigations for network-related security threats
    • Knowledge check
    • Summary
  • Module 2: Module 2: Explore Microsoft Defender
    • Introduction
    • Explain Microsoft Defender Antivirus
    • Understand Firewalls
    • Explain Windows Defender Firewall
    • Examine network location profiles
    • Explain Windows Defender Firewall with Advanced Security
    • Knowledge check
    • Summary
  • Module 3: Module 3: Explore device encryption features
    • Introduction
    • Examine BitLocker
    • Evaluate BitLocker and TPMs
    • Recover a BitLocker-encrypted drive
    • Assess Encrypting Files System
    • Knowledge check
    • Summary
  • Module 4: Module 4: Explore connection security rules
    • Introduction
    • Explain IPSec
    • Explain connection security rules
    • Explore authentication options
    • Monitor security policies and active connections
    • Knowledge check
    • Summary
  • Module 5: Module 5: Explore advanced protection methods
    • Introduction
    • Explore the Security Compliance Toolkit
    • Use AppLocker to control applications
    • Use AppLocker to control Universal Windows Platform apps
    • Secure data in the enterprise
    • Understand Microsoft Defender for Endpoint
    • Knowledge check
    • Summary

Reviews

Start your review of MD-100 Configure threat protection

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.