HOME > IT & Software > Microsoft Defender Course with hands on training and sims

Microsoft Defender Course with hands on training and sims

SynopsisMicrosoft Defender Course with hands on training and sims, av...
Microsoft Defender Course with hands on training and sims  No.1

Microsoft Defender Course with hands on training and sims, available at $19.99, has an average rating of 4.64, with 83 lectures, based on 579 reviews, and has 4233 subscribers.

You will learn about Learn the concepts and perform hands on activities needed to master Microsoft Defender XDR (formerly Microsoft 365 Defender) Gain a tremendous amount of knowledge involving Microsoft Defender XDR (formerly Microsoft 365 Defender) Learn using hands on simulations on how Microsoft Defender XDR (formerly Microsoft 365 Defender) is administered! Learn how to set up your own test lab for practicing the concepts! This course is ideal for individuals who are IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender) It is particularly useful for IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender).

Enroll now: Microsoft Defender Course with hands on training and sims

Summary

Title: Microsoft Defender Course with hands on training and sims

Price: $19.99

Average Rating: 4.64

Number of Lectures: 83

Number of Published Lectures: 82

Number of Curriculum Items: 92

Number of Published Curriculum Objects: 91

Original Price: $49.99

Quality Status: approved

Status: Live

What You Will Learn

  • Learn the concepts and perform hands on activities needed to master Microsoft Defender XDR (formerly Microsoft 365 Defender)
  • Gain a tremendous amount of knowledge involving Microsoft Defender XDR (formerly Microsoft 365 Defender)
  • Learn using hands on simulations on how Microsoft Defender XDR (formerly Microsoft 365 Defender) is administered!
  • Learn how to set up your own test lab for practicing the concepts!
  • Who Should Attend

  • IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender)
  • Target Audiences

  • IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender)
  • We really hope you’ll agree, this training is way more than the average course on Udemy!

    Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

  • TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

    Introduction

  • Welcome to the course

  • Understanding the Microsoft Environment

  • Foundations of Active Directory Domains

  • Foundations of RAS, DMZ, and Virtualization

  • Foundations of the Microsoft Cloud Services

  • DONT SKIP: The first thing to know about Microsoft cloud services

  • DONT SKIP: Azure AD is now renamed to Entra ID

  • Questions for John Christopher

  • Performing hands on activities

  • DONT SKIP: Using Assignments in the course

  • Creating a free Microsoft 365 Account

  • Activating licenses for Defender for Endpoint and Vulnerabilities

  • Getting your free Azure credit

  • Basic concepts of the Microsoft Defender Suite and Services

  • The Microsoft 365 Defender Suite

  • Using the Defender and Purview admin centers

  • Microsoft Defender for Office 365

  • What is Microsoft Defender for Office 365?

  • Implementing policies for uses in Email, SharePoint, OneDrive, and Teams

  • Dealing with threats using Defender for Office 365

  • Performing a campaign email attack simulation in Microsoft Defender

  • Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)

  • Understanding the concepts of Microsoft Defender for Cloud Apps

  • Investigating security risks in Defender for Cloud Apps

  • Concepts of data loss prevention in Microsoft Defender

  • Alerts with data loss prevention policies (DLP)

  • Data loss prevention (DLP) policy alert investigation

  • Microsoft Defender for Endpoint and Defender Vulnerability Management

  • Understanding Microsoft Defender for Endpoint concepts

  • Deploy a Windows 11 VM endpoint

  • Attack surface reduction (ASR) support with Intune

  • Working with device onboarding regarding Defender for Endpoint

  • Something to be aware of about extra features

  • Endpoint advanced features, alerts and incidents

  • Endpoint vulnerabilities

  • Device attack surface reduction (ASR)

  • Device groups with Defender for Endpoint

  • Microsoft Defender Vulnerability Management risk identification

  • Endpoint threat indicators

  • Device discovery of unmanaged devices

  • Microsoft Defender for Identity

  • Microsoft Entra ID security risk mitigation

  • Concepts of using Microsoft Entra Identity Protection

  • Microsoft Entra Identity Protection security risk mitigation

  • Microsoft Entra Identity Protection risks in regards to Microsoft Defender

  • Microsoft Defender for Identity concepts

  • Using Defender for Identity to mitigate threats with AD DS

  • Microsoft 365 Defender as an Extended Detection and Response (XDR)

  • Visualizing the concepts of extended detection and responses (XDR)

  • Configuring the Microsoft 365 Defender simulation lab

  • Performing an attack using the simulation lab

  • Microsoft 365 Defender incidents and automated investigations

  • Microsoft 365 Defender action and submissions

  • Using Kusto Query Language (KQL) for threat identification

  • Microsoft Secure Score

  • Microsoft 365 Defender threat analytics

  • Custom detections and alerts

  • Getting started w/ Defender for Cloud, Defender for Servers & Defender for DevOps

  • Introduction to Microsoft Defender for Cloud

  • Regulatory compliance policies along with MCSB

  • Remediation’s with secure score in Microsoft Defender for Cloud

  • Microsoft Defender for Servers

  • Microsoft Defender for DevOps

  • Microsoft Defender External Attack Surface Management (EASM)

  • Microsoft Defender for Cloud full management and configurations

  • Settings config in Microsoft Defender for Cloud

  • Roles in Microsoft Defender for Cloud

  • Cloud workload protection

  • Automation of onboarding Azure resource

  • Azure Arc connections

  • Multi-cloud connections

  • Email notifications in Microsoft Defender for Cloud

  • Using alert suppression rules

  • Workflow automation configuration in Defender for Cloud

  • Using sample alerts and incidents

  • Using Microsoft Defender for Cloud recommendations

  • Security alerts and incidents in Microsoft Defender for Cloud

  • Using threat intelligence reports with Microsoft Defender for Cloud

  • Dealing with insider risks in Microsoft 365

  • Concepts of insider risk policies

  • Insider risk policy generation

  • Insider risk policy alert investigation

  • Audit and search capabilities in Microsoft Defender and Microsoft Purview

  • Licensing of unified audit logging

  • Permissions for unified auditing

  • Threat hunting with unified audit logging

  • Threat hunting with Content Searches

  • Conclusion

  • Cleaning up your lab environment

  • Getting a Udemy certificate

  • BONUS Where do I go from here?

  • Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Welcome to the course!

    Lecture 2: Understanding the Microsoft Environment

    Lecture 3: Foundations of Active Directory Domains

    Lecture 4: Foundations of RAS, DMZ, and Virtualization

    Lecture 5: Foundations of the Microsoft Cloud Services

    Lecture 6: DONT SKIP: The first thing to know about Microsoft cloud services

    Lecture 7: DONT SKIP: Azure AD is now renamed to Entra ID

    Lecture 8: Questions for John Christopher

    Lecture 9: Certificate of Completion

    Chapter 2: Performing hands on activities

    Lecture 1: DONT SKIP: Using Assignments (SIMULATIONS) in the course

    Lecture 2: DONT SKIP: Before beginning your account setup

    Lecture 3: Creating a free Microsoft 365 Account

    Lecture 4: Activating licenses for Defender for Endpoint and Vulnerabilities

    Lecture 5: Getting your free Azure credit

    Chapter 3: Basic concepts of the Microsoft Defender Suite and Services

    Lecture 1: The Microsoft 365 Defender Suite

    Lecture 2: Using the Defender and Purview admin centers

    Chapter 4: Microsoft Defender for Office 365

    Lecture 1: What is Microsoft Defender for Office 365?

    Lecture 2: Implementing policies for uses in Email, SharePoint, OneDrive, and Teams

    Lecture 3: Dealing with threats using Defender for Office 365

    Lecture 4: Performing a campaign email attack simulation in Microsoft Defender

    Chapter 5: Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)

    Lecture 1: Understanding the concepts of Microsoft Defender for Cloud Apps

    Lecture 2: Investigating security risks in Defender for Cloud Apps

    Lecture 3: Concepts of data loss prevention in Microsoft Defender

    Lecture 4: Alerts with data loss prevention policies (DLP)

    Lecture 5: Data loss prevention (DLP) policy alert investigation

    Chapter 6: Microsoft Defender for Endpoint and Defender Vulnerability Management

    Lecture 1: Understanding Microsoft Defender for Endpoint concepts

    Lecture 2: Deploy a Windows 11 VM endpoint

    Lecture 3: Attack surface reduction (ASR) support with Intune

    Lecture 4: Working with device onboarding regarding Defender for Endpoint

    Lecture 5: Something to be aware of about extra features

    Lecture 6: Endpoint advanced features, alerts and incidents

    Lecture 7: Endpoint vulnerabilities

    Lecture 8: Device attack surface reduction (ASR)

    Lecture 9: Device groups with Defender for Endpoint

    Lecture 10: Microsoft Defender Vulnerability Management risk identification

    Lecture 11: Endpoint threat indicators

    Lecture 12: Device discovery of unmanaged devices

    Chapter 7: Microsoft Defender for Identity

    Lecture 1: Microsoft Entra ID security risk mitigation

    Lecture 2: Concepts of using Microsoft Entra Identity Protection

    Lecture 3: Microsoft Entra Identity Protection security risk mitigation

    Lecture 4: Microsoft Entra Identity Protection risks in regards to Microsoft Defender

    Lecture 5: Microsoft Defender for Identity concepts

    Lecture 6: Using Defender for Identity to mitigate threats with AD DS

    Chapter 8: Microsoft 365 Defender as an Extended Detection and Response (XDR)

    Lecture 1: Visualizing the concepts of extended detection and responses (XDR)

    Lecture 2: PLEASE NOTE: The Defender for Endpoint lab is now deprecated

    Lecture 3: Configuring the Microsoft 365 Defender simulation lab

    Lecture 4: Performing an attack using the simulation lab

    Lecture 5: Microsoft 365 Defender incidents and automated investigations

    Lecture 6: Microsoft 365 Defender action and submissions

    Lecture 7: Using Kusto Query Language (KQL) for threat identification

    Lecture 8: Microsoft Secure Score

    Lecture 9: Microsoft 365 Defender threat analytics

    Lecture 10: Custom detections and alerts

    Chapter 9: Getting started w/ Defender for Cloud,Defender for Servers & Defender for DevOps

    Lecture 1: Introduction to Microsoft Defender for Cloud

    Lecture 2: Regulatory compliance policies along with MCSB

    Lecture 3: Remediations with secure score in Microsoft Defender for Cloud

    Lecture 4: Microsoft Defender for Servers

    Lecture 5: Microsoft Defender for DevOps

    Lecture 6: Microsoft Defender External Attack Surface Management (EASM)

    Chapter 10: Microsoft Defender for Cloud full management and configurations

    Lecture 1: Settings config in Microsoft Defender for Cloud

    Lecture 2: Roles in Microsoft Defender for Cloud

    Lecture 3: Cloud workload protection

    Lecture 4: Automation of onboarding Azure resource

    Lecture 5: Azure Arc connections

    Lecture 6: Multi-cloud connections

    Lecture 7: Email notifications in Microsoft Defender for Cloud

    Lecture 8: Using alert suppression rules

    Lecture 9: Workflow automation configuration in Defender for Cloud

    Lecture 10: Using sample alerts and incidents

    Lecture 11: Using Microsoft Defender for Cloud recommendations

    Lecture 12: Security alerts and incidents in Microsoft Defender for Cloud

    Lecture 13: Using threat intelligence reports with Microsoft Defender for Cloud

    Chapter 11: Dealing with insider risks in Microsoft 365

    Lecture 1: Concepts of insider risk policies

    Lecture 2: Insider risk policy generation

    Lecture 3: Insider risk policy alert investigation

    Chapter 12: Audit and search capabilities in Microsoft Defender and Microsoft Purview

    Lecture 1: Licensing of unified audit logging

    Lecture 2: Permissions for unified auditing

    Lecture 3: Threat hunting with unified audit logging

    Lecture 4: Threat hunting with Content Searches

    Instructors

  • Microsoft Defender Course with hands on training and sims  No.2
    John Christopher
    IT Engineer and Trainer for 25 Years in the industry
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 6 votes
  • 3 stars: 29 votes
  • 4 stars: 195 votes
  • 5 stars: 349 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!