Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

MS-101 Explore security metrics in Microsoft Defender XDR

Microsoft via Microsoft Learn

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
  • Module 1: Examine threat vectors and data breaches
  • By the end of this module, you will be able to:

    • Describe techniques hackers use to compromise user accounts through email
    • Describe techniques hackers use to gain control over resources
    • Describe techniques hackers use to compromise data
    • Mitigate an account breach
    • Prevent an elevation of privilege attack
    • Prevent data exfiltration, data deletion, and data spillage
  • Module 2: Explore the Zero Trust security model
  • By the end of this module, you will be able to:

    • Describe the Zero Trust approach to security in Microsoft 365
    • Describe the principles and components of the Zero Trust security model
    • Describe the five steps to implementing a Zero Trust security model in your organization
    • Explain Microsoft's story and strategy around Zero Trust networking
  • Module 3: Explore security solutions in Microsoft 365
  • By the end of this module, you will be able to:

    • Identify the features of Microsoft Defender for Office 365 that enhance email security in a Microsoft 365 deployment
    • Explain how Microsoft Defender for Identity identifies, detects, and investigates advanced threats, compromised identities, and malicious insider actions directed at your organization
    • Explain how Microsoft Defender for Endpoint helps enterprise networks prevent, detect, investigate, and respond to advanced threats
    • Describe how Microsoft 365 Threat Intelligence can be beneficial to your organization’s security officers and administrators
    • Describe how Microsoft Cloud App Security enhances visibility and control over your Microsoft 365 tenant through three core areas
  • Module 4: Examine Microsoft Secure Score
  • By the end of this module, you will be able to:

    • Describe the benefits of Secure Score and what kind of services can be analyzed
    • Describe how to collect data using the Secure Score API
    • Describe how to use the tool to identify gaps between your current state and where you would like to be regarding security
    • Identify actions that will increase your security by mitigating risks
    • Explain where to look to determine the threats each action will mitigate and the impact it has on users
  • Module 5: Examine Privileged Identity Management
  • By the end of this module, you will be able to:

    • Describe how Privileged Identity Management enables you to manage, control, and monitor access to important resources in your organization
    • Configure Privileged Identity Management for use in your organization
    • Describe how Privileged Identity Management audit history enables you to see all the user assignments and activations within a given time period for all privileged roles
    • Explain how Microsoft Identity Manager helps organizations manage the users, credentials, policies, and access within their organizations and hybrid environments
    • Explain how Privileged Access Management provides granular access control over privileged admin tasks in Microsoft 365
  • Module 6: Examine Azure Identity Protection
  • By the end of this module, you will be able to:

    • Describe Azure Identity Protection (AIP) and what kind of identities can be protected
    • Enable the three default protection policies in AIP
    • Identify the vulnerabilities and risk events detected by AIP
    • Plan your investigation in protecting cloud-based identities
    • Plan how to protect your Azure Active Directory environment from security breaches

Syllabus

  • Module 1: Examine threat vectors and data breaches
    • Introduction
    • Explore today's work and threat landscape
    • Examine how phishing retrieves sensitive information
    • Examine how spoofing deceives users and compromises data security
    • Compare spam and malware
    • Examine how an account breach compromises a user account
    • Examine elevation of privilege attacks
    • Examine how data exfiltration moves data out of your tenant
    • Examine how attackers delete data from your tenant
    • Examine how data spillage exposes data outside your tenant
    • Examine other types of attacks
    • Knowledge check
    • Summary
  • Module 2: Explore the Zero Trust security model
    • Introduction
    • Examine the principles and components of the Zero Trust model
    • Plan for a Zero Trust security model in your organization
    • Examine Microsoft's strategy for Zero Trust networking
    • Adopt a Zero Trust approach
    • Knowledge check
    • Summary
  • Module 3: Explore security solutions in Microsoft 365
    • Introduction
    • Enhance your email security using Microsoft Defender for Office 365
    • Protect your organization's identities using Microsoft Defender for Identity
    • Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint
    • Protect against cyber attacks using Microsoft 365 Threat Intelligence
    • Provide insight into suspicious activity using Microsoft Cloud App Security
    • Knowledge check
    • Summary
  • Module 4: Examine Microsoft Secure Score
    • Introduction
    • Explore Microsoft Secure Score
    • Examine the Secure Score Dashboard
    • Collect Secure Score data using the Secure Score API
    • Improve your security posture
    • Knowledge check
    • Summary
  • Module 5: Examine Privileged Identity Management
    • Introduction
    • Explore Privileged Identity Management in Azure AD
    • Configure Privileged Identity Management
    • Audit Privileged Identity Management
    • Explore Microsoft Identity Manager
    • Control privileged admin tasks using Privileged Access Management
    • Knowledge check
    • Summary
  • Module 6: Examine Azure Identity Protection
    • Introduction
    • Explore Azure Identity Protection
    • Enable the default protection policies in AIP
    • Explore the vulnerabilities and risk events detected by AIP
    • Plan your identity investigation
    • Knowledge check
    • Summary

Reviews

Start your review of MS-101 Explore security metrics in Microsoft Defender XDR

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.