Detect and respond to cyber attacks with Microsoft 365 Defender
- Offered byMicrosoft
Detect and respond to cyber attacks with Microsoft 365 Defender at Microsoft Overview
Duration | 1 hour |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Credential | Certificate |
Detect and respond to cyber attacks with Microsoft 365 Defender at Microsoft Course details
- Introduction to Microsoft 365 Defender
- Enable Microsoft 365 Defender in your organization
- Investigate incidents with Microsoft 365 Defender
- Locate threats using advanced hunting with Microsoft 365 Defender
- Automate self-healing with Microsoft 365 Defender
- Microsoft 365 Defender unifies threat signals across endpoints, identities, email, and applications to provide integrated protection against sophisticated cyber attacks. Microsoft 365 Defender is the central experience to investigate and respond to incidents and proactively search for ongoing malicious cyber security activities.
Detect and respond to cyber attacks with Microsoft 365 Defender at Microsoft Curriculum
Introduction to Microsoft 365 Defender
Introduction
What is Microsoft 365 Defender?
Threat information sources for Microsoft 365 Defender
Knowledge check
Summary
Enable Microsoft 365 Defender in your organization
Introduction
Roll out Microsoft 365 Defender for your organization
Manage access to Microsoft 365 Defender
Knowledge check
Summary
Investigate incidents with Microsoft 365 Defender
Introduction
Working with incidents
Classification of incidents and alerts
Use email notifications in Microsoft 365 Defender
Knowledge check
Summary
Locate threats using advanced hunting with Microsoft 365 Defender
Introduction
Introduction to Kusto Query Language
Understand the hunting data schema
Using custom detections
Knowledge check
Summary
Automate self-healing with Microsoft 365 Defender
Introduction
What is automated self-healing?
Understand automated investigation and response
Knowledge check
Summary