MD 100 Configure threat protection
- Offered byMicrosoft
MD 100 Configure threat protection at Microsoft Overview
Duration | 1 hour |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
MD 100 Configure threat protection at Microsoft Course details
- Explore malware and threat protection
- Explore Microsoft Defender
- Explore device encryption features
- Explore connection security rules
- Explore advanced protection methods
- This learning path introduces students to protecting devices from external threats
- This path will teach students about using encryption, firewalls, and IPSec to help protect against threats
- This learning path helps prepare you for Exam MD-100: Windows Client
- In this course, you will learn about malware and common network-related security threats and the steps that you can take to mitigate them
- This course explains the benefits of using encryption to protect drives and files against unauthorized access
MD 100 Configure threat protection at Microsoft Curriculum
Explore malware and threat protection
Introduction
Explain malware
Determine possible mitigations for malware threats
Understand phishing scams
Explain common network-related security threats
Determine mitigations for network-related security threats
Knowledge check
Summary
Explore Microsoft Defender
Introduction
Explain Microsoft Defender Antivirus
Understand Firewalls
Explain Windows Defender Firewall
Examine network location profiles
Explain Windows Defender Firewall with Advanced Security
Knowledge check
Summary
Explore device encryption features
Introduction
Examine BitLocker
Evaluate BitLocker and TPMs
Recover a BitLocker-encrypted drive
Assess Encrypting Files System
Knowledge check
Summary
Explore connection security rules
Introduction
Explain IPSec
Explain connection security rules
Explore authentication options
Monitor security policies and active connections
Knowledge check
Summary
Explore advanced protection methods
Introduction
Explore the Security Compliance Toolkit
Use AppLocker to control applications
Use AppLocker to control Universal Windows Platform apps
Secure data in the enterprise
Understand Microsoft Defender for Endpoint
Knowledge check
Summary