Microsoft Defender Course with hands on training and sims
- IT & Software
- Jan 02, 2025

Microsoft Defender Course with hands on training and sims, available at $19.99, has an average rating of 4.64, with 83 lectures, based on 579 reviews, and has 4233 subscribers.
You will learn about Learn the concepts and perform hands on activities needed to master Microsoft Defender XDR (formerly Microsoft 365 Defender) Gain a tremendous amount of knowledge involving Microsoft Defender XDR (formerly Microsoft 365 Defender) Learn using hands on simulations on how Microsoft Defender XDR (formerly Microsoft 365 Defender) is administered! Learn how to set up your own test lab for practicing the concepts! This course is ideal for individuals who are IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender) It is particularly useful for IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender).
Enroll now: Microsoft Defender Course with hands on training and sims
Summary
Title: Microsoft Defender Course with hands on training and sims
Price: $19.99
Average Rating: 4.64
Number of Lectures: 83
Number of Published Lectures: 82
Number of Curriculum Items: 92
Number of Published Curriculum Objects: 91
Original Price: $49.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
We really hope you’ll agree, this training is way more than the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
Welcome to the course
Understanding the Microsoft Environment
Foundations of Active Directory Domains
Foundations of RAS, DMZ, and Virtualization
Foundations of the Microsoft Cloud Services
DONT SKIP: The first thing to know about Microsoft cloud services
DONT SKIP: Azure AD is now renamed to Entra ID
Questions for John Christopher
Performing hands on activities
DONT SKIP: Using Assignments in the course
Creating a free Microsoft 365 Account
Activating licenses for Defender for Endpoint and Vulnerabilities
Getting your free Azure credit
Basic concepts of the Microsoft Defender Suite and Services
The Microsoft 365 Defender Suite
Using the Defender and Purview admin centers
Microsoft Defender for Office 365
What is Microsoft Defender for Office 365?
Implementing policies for uses in Email, SharePoint, OneDrive, and Teams
Dealing with threats using Defender for Office 365
Performing a campaign email attack simulation in Microsoft Defender
Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)
Understanding the concepts of Microsoft Defender for Cloud Apps
Investigating security risks in Defender for Cloud Apps
Concepts of data loss prevention in Microsoft Defender
Alerts with data loss prevention policies (DLP)
Data loss prevention (DLP) policy alert investigation
Microsoft Defender for Endpoint and Defender Vulnerability Management
Understanding Microsoft Defender for Endpoint concepts
Deploy a Windows 11 VM endpoint
Attack surface reduction (ASR) support with Intune
Working with device onboarding regarding Defender for Endpoint
Something to be aware of about extra features
Endpoint advanced features, alerts and incidents
Endpoint vulnerabilities
Device attack surface reduction (ASR)
Device groups with Defender for Endpoint
Microsoft Defender Vulnerability Management risk identification
Endpoint threat indicators
Device discovery of unmanaged devices
Microsoft Defender for Identity
Microsoft Entra ID security risk mitigation
Concepts of using Microsoft Entra Identity Protection
Microsoft Entra Identity Protection security risk mitigation
Microsoft Entra Identity Protection risks in regards to Microsoft Defender
Microsoft Defender for Identity concepts
Using Defender for Identity to mitigate threats with AD DS
Microsoft 365 Defender as an Extended Detection and Response (XDR)
Visualizing the concepts of extended detection and responses (XDR)
Configuring the Microsoft 365 Defender simulation lab
Performing an attack using the simulation lab
Microsoft 365 Defender incidents and automated investigations
Microsoft 365 Defender action and submissions
Using Kusto Query Language (KQL) for threat identification
Microsoft Secure Score
Microsoft 365 Defender threat analytics
Custom detections and alerts
Getting started w/ Defender for Cloud, Defender for Servers & Defender for DevOps
Introduction to Microsoft Defender for Cloud
Regulatory compliance policies along with MCSB
Remediation’s with secure score in Microsoft Defender for Cloud
Microsoft Defender for Servers
Microsoft Defender for DevOps
Microsoft Defender External Attack Surface Management (EASM)
Microsoft Defender for Cloud full management and configurations
Settings config in Microsoft Defender for Cloud
Roles in Microsoft Defender for Cloud
Cloud workload protection
Automation of onboarding Azure resource
Azure Arc connections
Multi-cloud connections
Email notifications in Microsoft Defender for Cloud
Using alert suppression rules
Workflow automation configuration in Defender for Cloud
Using sample alerts and incidents
Using Microsoft Defender for Cloud recommendations
Security alerts and incidents in Microsoft Defender for Cloud
Using threat intelligence reports with Microsoft Defender for Cloud
Dealing with insider risks in Microsoft 365
Concepts of insider risk policies
Insider risk policy generation
Insider risk policy alert investigation
Audit and search capabilities in Microsoft Defender and Microsoft Purview
Licensing of unified audit logging
Permissions for unified auditing
Threat hunting with unified audit logging
Threat hunting with Content Searches
Conclusion
Cleaning up your lab environment
Getting a Udemy certificate
BONUS Where do I go from here?
Course Curriculum
Chapter 1: Introduction
Lecture 1: Welcome to the course!
Lecture 2: Understanding the Microsoft Environment
Lecture 3: Foundations of Active Directory Domains
Lecture 4: Foundations of RAS, DMZ, and Virtualization
Lecture 5: Foundations of the Microsoft Cloud Services
Lecture 6: DONT SKIP: The first thing to know about Microsoft cloud services
Lecture 7: DONT SKIP: Azure AD is now renamed to Entra ID
Lecture 8: Questions for John Christopher
Lecture 9: Certificate of Completion
Chapter 2: Performing hands on activities
Lecture 1: DONT SKIP: Using Assignments (SIMULATIONS) in the course
Lecture 2: DONT SKIP: Before beginning your account setup
Lecture 3: Creating a free Microsoft 365 Account
Lecture 4: Activating licenses for Defender for Endpoint and Vulnerabilities
Lecture 5: Getting your free Azure credit
Chapter 3: Basic concepts of the Microsoft Defender Suite and Services
Lecture 1: The Microsoft 365 Defender Suite
Lecture 2: Using the Defender and Purview admin centers
Chapter 4: Microsoft Defender for Office 365
Lecture 1: What is Microsoft Defender for Office 365?
Lecture 2: Implementing policies for uses in Email, SharePoint, OneDrive, and Teams
Lecture 3: Dealing with threats using Defender for Office 365
Lecture 4: Performing a campaign email attack simulation in Microsoft Defender
Chapter 5: Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)
Lecture 1: Understanding the concepts of Microsoft Defender for Cloud Apps
Lecture 2: Investigating security risks in Defender for Cloud Apps
Lecture 3: Concepts of data loss prevention in Microsoft Defender
Lecture 4: Alerts with data loss prevention policies (DLP)
Lecture 5: Data loss prevention (DLP) policy alert investigation
Chapter 6: Microsoft Defender for Endpoint and Defender Vulnerability Management
Lecture 1: Understanding Microsoft Defender for Endpoint concepts
Lecture 2: Deploy a Windows 11 VM endpoint
Lecture 3: Attack surface reduction (ASR) support with Intune
Lecture 4: Working with device onboarding regarding Defender for Endpoint
Lecture 5: Something to be aware of about extra features
Lecture 6: Endpoint advanced features, alerts and incidents
Lecture 7: Endpoint vulnerabilities
Lecture 8: Device attack surface reduction (ASR)
Lecture 9: Device groups with Defender for Endpoint
Lecture 10: Microsoft Defender Vulnerability Management risk identification
Lecture 11: Endpoint threat indicators
Lecture 12: Device discovery of unmanaged devices
Chapter 7: Microsoft Defender for Identity
Lecture 1: Microsoft Entra ID security risk mitigation
Lecture 2: Concepts of using Microsoft Entra Identity Protection
Lecture 3: Microsoft Entra Identity Protection security risk mitigation
Lecture 4: Microsoft Entra Identity Protection risks in regards to Microsoft Defender
Lecture 5: Microsoft Defender for Identity concepts
Lecture 6: Using Defender for Identity to mitigate threats with AD DS
Chapter 8: Microsoft 365 Defender as an Extended Detection and Response (XDR)
Lecture 1: Visualizing the concepts of extended detection and responses (XDR)
Lecture 2: PLEASE NOTE: The Defender for Endpoint lab is now deprecated
Lecture 3: Configuring the Microsoft 365 Defender simulation lab
Lecture 4: Performing an attack using the simulation lab
Lecture 5: Microsoft 365 Defender incidents and automated investigations
Lecture 6: Microsoft 365 Defender action and submissions
Lecture 7: Using Kusto Query Language (KQL) for threat identification
Lecture 8: Microsoft Secure Score
Lecture 9: Microsoft 365 Defender threat analytics
Lecture 10: Custom detections and alerts
Chapter 9: Getting started w/ Defender for Cloud,Defender for Servers & Defender for DevOps
Lecture 1: Introduction to Microsoft Defender for Cloud
Lecture 2: Regulatory compliance policies along with MCSB
Lecture 3: Remediations with secure score in Microsoft Defender for Cloud
Lecture 4: Microsoft Defender for Servers
Lecture 5: Microsoft Defender for DevOps
Lecture 6: Microsoft Defender External Attack Surface Management (EASM)
Chapter 10: Microsoft Defender for Cloud full management and configurations
Lecture 1: Settings config in Microsoft Defender for Cloud
Lecture 2: Roles in Microsoft Defender for Cloud
Lecture 3: Cloud workload protection
Lecture 4: Automation of onboarding Azure resource
Lecture 5: Azure Arc connections
Lecture 6: Multi-cloud connections
Lecture 7: Email notifications in Microsoft Defender for Cloud
Lecture 8: Using alert suppression rules
Lecture 9: Workflow automation configuration in Defender for Cloud
Lecture 10: Using sample alerts and incidents
Lecture 11: Using Microsoft Defender for Cloud recommendations
Lecture 12: Security alerts and incidents in Microsoft Defender for Cloud
Lecture 13: Using threat intelligence reports with Microsoft Defender for Cloud
Chapter 11: Dealing with insider risks in Microsoft 365
Lecture 1: Concepts of insider risk policies
Lecture 2: Insider risk policy generation
Lecture 3: Insider risk policy alert investigation
Chapter 12: Audit and search capabilities in Microsoft Defender and Microsoft Purview
Lecture 1: Licensing of unified audit logging
Lecture 2: Permissions for unified auditing
Lecture 3: Threat hunting with unified audit logging
Lecture 4: Threat hunting with Content Searches
Instructors

John Christopher
IT Engineer and Trainer for 25 Years in the industry
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- How to Generative AI Course- Creativity with GenAI Tools
- GetResponse Marketing Automation
- Advanced Photoshop Manipulations Tutorials Bundle
- 3DS Max Tutorial. Learn The Art of Modelling and Animation
- Crypto Trading Mastery (Scalping, Day trading, price action)
- Personal Finance
- Company Valuation Financial Modeling
- Step-By-Step Stock Market Analysis and Real-Time Trades
- 1YouTube Masterclass The Best Guide to YouTube Success
- 2Photoshop CC- Adjustement Layers, Blending Modes Masks
- 3Personal Finance
- 4The Architecture of Oscar Niemeyer
- 5Advanced Photoshop Manipulations Tutorials Bundle
- 6SolidWorks Essential Training ( 2023 2024 )
- 7Python for Absolute Beginners
- 8Marketing Mix Modeling in one day for your Brand Analytics_1
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling