Prepare for Microsoft 365 Copilot: Part 3 Threat protection
- Offered byMicrosoft
Prepare for Microsoft 365 Copilot: Part 3 Threat protection at Microsoft Overview
Duration | 3 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Prepare for Microsoft 365 Copilot: Part 3 Threat protection at Microsoft Course details
- Explore threat intelligence in Microsoft 365 Defender
- Implement app protection by using Microsoft Defender for Cloud Apps
- Implement endpoint protection by using Microsoft Defender for Endpoint
- Implement threat protection by using Microsoft Defender for Office 365
- This learning path examines how to manage the Microsoft 365 threat intelligence features that provide organizations with insight and protection against cyber-attacks as they prepare to implement Microsoft 365 Copilot.
Prepare for Microsoft 365 Copilot: Part 3 Threat protection at Microsoft Curriculum
Explore threat intelligence in Microsoft 365 Defender
Introduction
Explore Microsoft Intelligent Security Graph
Explore alert policies in Microsoft 365
Run automated investigations and responses
Explore threat hunting with Microsoft Threat Protection
Explore advanced threat hunting in Microsoft 365 Defender
Explore threat analytics in Microsoft 365
Identify threat issues using Microsoft Defender reports
Knowledge check
Summary
Implement app protection by using Microsoft Defender for Cloud Apps
Introduction
Explore Microsoft Defender Cloud Apps
Deploy Microsoft Defender for Cloud Apps
Configure file policies in Microsoft Defender for Cloud Apps
Manage and respond to alerts in Microsoft Defender for Cloud Apps
Configure Cloud Discovery in Microsoft Defender for Cloud Apps
Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps
Knowledge check
Summary
Implement endpoint protection by using Microsoft Defender for Endpoint
Introduction
Explore Microsoft Defender for Endpoint
Configure Microsoft Defender for Endpoint in Microsoft Intune
Onboard devices in Microsoft Defender for Endpoint
Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management
Manage device discovery and vulnerability assessment
Reduce your threat and vulnerability exposure
Knowledge check
Summary
Implement threat protection by using Microsoft Defender for Office 365
Introduction
Explore the Microsoft Defender for Office 365 protection stack
Investigate security attacks by using Threat Explorer
Identify cybersecurity issues by using Threat Trackers
Prepare for attacks with Attack simulation training
Knowledge check
Summary