MS-101 Explore security metrics in Microsoft 365 Defender
- Offered byMicrosoft
MS-101 Explore security metrics in Microsoft 365 Defender at Microsoft Overview
Duration | 3 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
MS-101 Explore security metrics in Microsoft 365 Defender at Microsoft Course details
- This learning path examines the threat vectors and data breaches organizations face today in their cybersecurity landscape, and the wide range of security solutions that Microsoft 365 provides to combat those threats
- This course examines the types of threat vectors and their potential outcomes that organizations must deal with on a daily basis and how users can enable hackers to access targets by unwittingly executing malicious content
- This course examines the concepts and principles of the Zero Trust security model, as well as how Microsoft 365 supports it, and how your organization can implement it
- This course introduces you to several features in Microsoft 365 that can help protect your organization against cyberthreats, detect when a user or computer has been compromised, and monitor your organization for suspicious activities
MS-101 Explore security metrics in Microsoft 365 Defender at Microsoft Curriculum
Examine threat vectors and data breaches
Introduction
Explore today's work and threat landscape
Examine how phishing retrieves sensitive information
Examine how spoofing deceives users and compromises data security
Compare spam and malware
Examine how an account breach compromises a user account
Examine elevation of privilege attacks
Examine how data exfiltration moves data out of your tenant
Examine how attackers delete data from your tenant
Examine how data spillage exposes data outside your tenant
Examine other types of attacks
Knowledge check
Summary
Explore the Zero Trust security model
Introduction
Examine the principles and components of the Zero Trust model
Plan for a Zero Trust security model in your organization
Examine Microsoft's strategy for Zero Trust networking
Adopt a Zero Trust approach
Knowledge check
Summary
Explore security solutions in Microsoft 365 Defender
Introduction
Enhance your email security using Microsoft Defender for Office 365
Protect your organization's identities using Microsoft Defender for Identity
Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint
Protect against cyber attacks using Microsoft 365 Threat Intelligence
Provide insight into suspicious activity using Microsoft Cloud App Security
Review the security reports in Microsoft 365 Defender
Knowledge check
Summary
Examine Microsoft Secure Score
Introduction
Explore Microsoft Secure Score
Examine the Secure Score Dashboard
Collect Secure Score data using the Secure Score API
Improve your security posture
Knowledge check
Summary
Examine Privileged Identity Management
Introduction
Explore Privileged Identity Management in Azure AD
Configure Privileged Identity Management
Audit Privileged Identity Management
Explore Microsoft Identity Manager
Control privileged admin tasks using Privileged Access Management
Knowledge check
Summary
Examine Azure Identity Protection
Introduction
Explore Azure Identity Protection
Enable the default protection policies in AIP
Explore the vulnerabilities and risk events detected by AIP
Plan your identity investigation
Knowledge check
Summary