MS 500 part 2 Implement and manage threat protection
- Offered byMicrosoft
MS 500 part 2 Implement and manage threat protection at Microsoft Overview
Duration | 5 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
MS 500 part 2 Implement and manage threat protection at Microsoft Course details
- Protect against threats with Microsoft Defender for Endpoint
- Deploy the Microsoft Defender for Endpoint environment
- Protect against malicious attacks and unauthorized access with Microsoft Edge
- Understand Microsoft 365 encryption
- Understand app management using Microsoft Endpoint Manager
- Manage device compliance
- Remediate risks with Microsoft Defender for Office 365
- Query, visualize, and monitor data in Microsoft Sentinel
- Learn how to plan, implement, and manage threat protection technologies in Microsoft 365
- This learning path prepares you for the second set of skills evaluated on the MS-500 Microsoft 365 Security Administrator certification exam
- Learn how Microsoft Defender for Endpoint can help your organization stay secure
- Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security
- Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations
- This course examines device compliance policies, how organizations effectively use them, how to create policies and configure conditional users and groups, how to build Conditional Access policies, and how to monitor enrolled devices
MS 500 part 2 Implement and manage threat protection at Microsoft Curriculum
Protect against threats with Microsoft Defender for Endpoint
Introduction to Microsoft Defender for Endpoint
Practice security administration
Hunt threats within your network
Summary and knowledge check
Deploy the Microsoft Defender for Endpoint environment
Introduction
Create your environment
Understand operating systems compatibility and features
Onboard devices
Manage access
Create and manage roles for role-based access control
Configure device groups
Configure environment advanced features
Knowledge check
Summary and resources
Protect against malicious attacks and unauthorized access with Microsoft Edge
Introduction
Understand the secure foundations of Microsoft Edge
Intercept malicious attacks with Microsoft Defender SmartScreen
Enhance browser security with Microsoft Defender Application Guard
Manage controls and policies for Microsoft Edge in Microsoft Endpoint Manager
Knowledge check
Summary and resources
Understand Microsoft 365 encryption
Introduction to Microsoft 365 encryption
Learn how BitLocker encrypts data-at-rest
Understand service encryption in Microsoft Purview
Explore customer key management using Customer Key
Learn how data is encrypted in-transit
Summary and knowledge check
Understand app management using Microsoft Endpoint Manager
Introduction
Understand the app management lifecycle
Learn about configuring apps
Understand how to protect apps
Learn about protected apps
Understand how to apply the data protection framework
Knowledge Check
Summary
Manage device compliance
Introduction
Plan for device compliance
Implement compliance policies for Intune managed devices
Monitor results of your Intune device compliance policies
Implement user and device groups to monitor device compliance
Explore Conditional Access policies
Build Conditional Access policies
Monitor enrolled devices
Knowledge check
Summary
Remediate risks with Microsoft Defender for Office 365
Introduction to Microsoft Defender for Office 365
Automate, investigate, and remediate
Configure, protect, and detect
Simulate attacks
Summary and knowledge check
Query, visualize, and monitor data in Microsoft Sentinel
Introduction
Exercise - Query and visualize data with Microsoft Sentinel Workbooks
Monitor and visualize data
Query data using Kusto Query Language
Use default Microsoft Sentinel Workbooks
Create a new Microsoft Sentinel Workbook
Exercise - Visualize data using Microsoft Sentinel Workbooks
Summary