- Module 1: In this module, you will learn about malware and common network-related security threats and the steps that you can take to mitigate them.
After completing this module, you will be able to:
- Describe malware.
- Understand the sources of malware.
- Describe ways of mitigating malware.
- Identify common network-related security threats.
- Describe the methods by which you can mitigate these common security threats.
- Describe tools for securing users identity.
- Describe tools for securing data on Windows.
- Describe tools for securing Windows devices.
- Module 2: The module explains how Microsoft Defender can be used to protect against malware and reduce exposure to attacks using a firewall.
After completing this module, you will be able to:
- Use Microsoft Defender to detect and quarantine malware.
- Describe the purpose of a firewall.
- Describe Windows Defender Firewall functionality.
- Explain network-location profiles.
- Explain the increased functionality of Windows Defender Firewall with Advanced Security.
- Module 3: This module explains the benefits of using encryption to protect drives and files against unauthorized access.
After completing this module, you will be able to:
- Describe the benefits of drive encryption with BitLocker
- Describe the benefits of Encrypted File System
- Module 4: This module describes how connection security rules can be used to provide additional security to protect data transmitted across networks.
After completing this module, you will be able to:
- Describe the purpose and functionality of IPsec.
- Describe how to configure IPsec.
- Describe connection security rules.
- Explain authentication options.
- Monitor connections.
- Module 5: This module explores additional tools used to provide additional layers of security within an organization.
After completing this module, you'll be able to:
- Describe the features and use of the Security Compliance Toolkit
- Describe the features of AppLocker
- Describe methods of securing data in the enterprise
- Describe the benefits and features of Microsoft Defender for Endpoint
MD-100 Configure threat protection
Overview
Syllabus
- Module 1: Module 1: Explore malware and threat protection
- Introduction
- Explain malware
- Determine possible mitigations for malware threats
- Understand phishing scams
- Explain common network-related security threats
- Determine mitigations for network-related security threats
- Knowledge check
- Summary
- Module 2: Module 2: Explore Microsoft Defender
- Introduction
- Explain Microsoft Defender Antivirus
- Understand Firewalls
- Explain Windows Defender Firewall
- Examine network location profiles
- Explain Windows Defender Firewall with Advanced Security
- Knowledge check
- Summary
- Module 3: Module 3: Explore device encryption features
- Introduction
- Examine BitLocker
- Evaluate BitLocker and TPMs
- Recover a BitLocker-encrypted drive
- Assess Encrypting Files System
- Knowledge check
- Summary
- Module 4: Module 4: Explore connection security rules
- Introduction
- Explain IPSec
- Explain connection security rules
- Explore authentication options
- Monitor security policies and active connections
- Knowledge check
- Summary
- Module 5: Module 5: Explore advanced protection methods
- Introduction
- Explore the Security Compliance Toolkit
- Use AppLocker to control applications
- Use AppLocker to control Universal Windows Platform apps
- Secure data in the enterprise
- Understand Microsoft Defender for Endpoint
- Knowledge check
- Summary