Course Overview

Overview

In this workshop you will learn how Microsoft 365 Defender helps you elevate your defenses with unified visibility, investigation, and response across the kill chain with an industry-leading extended detection and response (XDR) solution. You will learn how Microsoft 365 Defender for Office 365 helps secure your email and Microsoft Teams with advanced protection against phishing, business email compromise, ransomware, and other threats and how Microsoft Defender for Cloud Apps can help you modernize how you secure your apps, protect your data, and elevate your app posture with software as a service (SaaS) security.

Course Modules

Modules

Secure your cloud ecosystem with Microsoft Defender XDR

Explore Zero Trust security with Microsoft Defender XDR, enabling rapid threat response, attack disruption, and unified security management. Learn about Security Exposure Management, Security Copilot, and third-party integrations for enhanced protection.

Implementing comprehensive Security with Microsoft Defender for Office 365

Explore Microsoft Defender for Office 365, covering threat prevention, detection, response, and security posture enhancement. Learn awareness training and plan options for comprehensive protection.

Securing Access to SaaS apps with Microsoft Defender for Cloud Apps

in this module, you will get an Introduction to the SaaS app landscape and learn about what is Microsoft Defender for Cloud Apps, Shadow IT discovery and posture, Information protection, Continuous threat protection in Microsoft 365 Defender, App to app protection using App Governance, Secure access, automating security workflows, Enterprise integrations, Licensing and How to get started.

Protecting hybrid cloud environment with Microsoft Defender for Identity

in this module, you will learn about Identity security landscape, what is Microsoft Defender for Identity? Architecture, Prevention - Attack surface reduction with Posture Assessments, Detection - Real-time analytics and data intelligence, Investigation - User Investigation Priority and Response - Automated security workflows

Post-training Skills Assessment

Take this assessment to validate your skills gathered from the self-paced online learning course completed in this course to mark your completion.

Course Completion Survey

Share your feedback with us regarding your experience!