Microsoft
Microsoft Logo

MS 500 part 2 Implement and manage threat protection 

  • Offered byMicrosoft

MS 500 part 2 Implement and manage threat protection
 at 
Microsoft 
Overview

Duration

5 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

MS 500 part 2 Implement and manage threat protection
 at 
Microsoft 
Course details

What are the course deliverables?
  • Protect against threats with Microsoft Defender for Endpoint
  • Deploy the Microsoft Defender for Endpoint environment
  • Protect against malicious attacks and unauthorized access with Microsoft Edge
  • Understand Microsoft 365 encryption
  • Understand app management using Microsoft Endpoint Manager
  • Manage device compliance
  • Remediate risks with Microsoft Defender for Office 365
  • Query, visualize, and monitor data in Microsoft Sentinel
More about this course
  • Learn how to plan, implement, and manage threat protection technologies in Microsoft 365
  • This learning path prepares you for the second set of skills evaluated on the MS-500 Microsoft 365 Security Administrator certification exam
  • Learn how Microsoft Defender for Endpoint can help your organization stay secure
  • Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security
  • Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations
  • This course examines device compliance policies, how organizations effectively use them, how to create policies and configure conditional users and groups, how to build Conditional Access policies, and how to monitor enrolled devices
Read more

MS 500 part 2 Implement and manage threat protection
 at 
Microsoft 
Curriculum

Protect against threats with Microsoft Defender for Endpoint

Introduction to Microsoft Defender for Endpoint

Practice security administration

Hunt threats within your network

Summary and knowledge check

Deploy the Microsoft Defender for Endpoint environment

Introduction

Create your environment

Understand operating systems compatibility and features

Onboard devices

Manage access

Create and manage roles for role-based access control

Configure device groups

Configure environment advanced features

Knowledge check

Summary and resources

Protect against malicious attacks and unauthorized access with Microsoft Edge

Introduction

Understand the secure foundations of Microsoft Edge

Intercept malicious attacks with Microsoft Defender SmartScreen

Enhance browser security with Microsoft Defender Application Guard

Manage controls and policies for Microsoft Edge in Microsoft Endpoint Manager

Knowledge check

Summary and resources

Understand Microsoft 365 encryption

Introduction to Microsoft 365 encryption

Learn how BitLocker encrypts data-at-rest

Understand service encryption in Microsoft Purview

Explore customer key management using Customer Key

Learn how data is encrypted in-transit

Summary and knowledge check

Understand app management using Microsoft Endpoint Manager

Introduction

Understand the app management lifecycle

Learn about configuring apps

Understand how to protect apps

Learn about protected apps

Understand how to apply the data protection framework

Knowledge Check

Summary

Manage device compliance

Introduction

Plan for device compliance

Implement compliance policies for Intune managed devices

Monitor results of your Intune device compliance policies

Implement user and device groups to monitor device compliance

Explore Conditional Access policies

Build Conditional Access policies

Monitor enrolled devices

Knowledge check

Summary

Remediate risks with Microsoft Defender for Office 365

Introduction to Microsoft Defender for Office 365

Automate, investigate, and remediate

Configure, protect, and detect

Simulate attacks

Summary and knowledge check

Query, visualize, and monitor data in Microsoft Sentinel

Introduction

Exercise - Query and visualize data with Microsoft Sentinel Workbooks

Monitor and visualize data

Query data using Kusto Query Language

Use default Microsoft Sentinel Workbooks

Create a new Microsoft Sentinel Workbook

Exercise - Visualize data using Microsoft Sentinel Workbooks

Summary

MS 500 part 2 Implement and manage threat protection
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

MS 500 part 2 Implement and manage threat protection
 at 
Microsoft 
Admission Process

    Important Dates

    Nov 30, 2024
    Course Commencement Date

    Other courses offered by Microsoft

    Free
    2 hours
    Intermediate
    Free
    4 hours
    Intermediate
    Free
    5 hours
    Beginner
    Free
    1 hours
    Beginner
    View Other 1171 CoursesRight Arrow Icon
    qna

    MS 500 part 2 Implement and manage threat protection
     at 
    Microsoft 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...