image

In this workshop you will learn how Microsoft 365 Defender helps you elevate your defenses with unified visibility, investigation, and response across the kill chain with an industry-leading extended detection and response (XDR) solution. You will learn how Microsoft 365 Defender for Office 365 helps secure your email and Microsoft Teams with advanced protection against phishing, business email compromise, ransomware, and other threats and how Microsoft Defender for Cloud Apps can help you modernize how you secure your apps, protect your data, and elevate your app posture with software as a service (SaaS) security.

Modules

module-image
Microsoft 365 Defender and Defender for Office 365

In this module, you will learn about Zero Trust with Microsoft 365 Defender, enable rapid response with XDR-prioritized incidents, disrupt advanced attacks at machine speed, unify security and identity access management, Integrate third-party solutions, Microsoft Defender for Office 365, Prevention, Detection, Investigation & Hunting, Response & Remediation, Awareness & Training, Secure Posture, Defender for Office 365 Plans and how to Configure your Microsoft 365 tenant for increased security. 

module-image
Securing Access to SaaS apps with Microsoft Defender for Cloud Apps

in this module, you will get an Introduction to the SaaS app landscape and learn about what is Microsoft Defender for Cloud Apps, Shadow IT discovery and posture, Information protection, Continuous threat protection in Microsoft 365 Defender, App to app protection using App Governance, Secure access, automating security workflows, Enterprise integrations, Licensing and How to get started.

module-image
Protecting hybrid cloud environment with Microsoft Defender for Identity

in this module, you will learn about Identity security landscape, what is Microsoft Defender for Identity? Architecture, Prevention - Attack surface reduction with Posture Assessments, Detection - Real-time analytics and data intelligence, Investigation - User Investigation Priority and Response - Automated security workflows

module-image
Post-training Skills Assessment

Take this assessment to validate your skills gathered from the self-paced online learning course completed in this course to mark your completion.

module-image
Course Completion Survey

Share your feedback with us regarding your experience!