MS-102 Implement threat protection by using Microsoft Defender XDR

via Microsoft Learn

Microsoft Learn

178 Courses


Overview

Title: MS-102 Implement Threat Protection Using Microsoft Defender XDR

Description: Dive into the crucial aspects of implementing threat protection strategies with the MS-102 course, designed to enhance your capabilities in managing intelligent cyber defense mechanisms enabled by Microsoft Defender XDR. This comprehensive workshop is essential for system administrators and cyber security experts who are focused on leveraging Microsoft 365 Intelligence to safeguard, respond, and prevent cyber threats effectively.

  • Module 1: Understand how Microsoft 365 Threat Intelligence utilizes the Microsoft Intelligent Security Graph to offer evidence-based insights and action-oriented advice, strengthening your response to cyber threats.
  • Key Outcomes:
    • Apply the Microsoft 365 Defender's automated investigation and response process.
    • Engage in threat hunting to pinpoint potential cybersecurity threats.
    • Deploy advanced hunting tactics to proactively inspect events and locate anomalies.
  • Module 2: Learn to implement Microsoft Defender for Cloud Apps to protect data across your Microsoft and third-party cloud services, improving oversight and response mechanisms.
  • Key Outcomes:
    • Enhance cloud visibility and data protection via Microsoft Defender for Cloud Apps.
    • Effectively manage and respond to alerts from your cloud app policies.
    • Configure and troubleshoot Cloud Discovery to monitor unmanaged cloud activities.
  • Module 3: Discover the robust capabilities of Microsoft Defender for Endpoint in preventing, detecting, investigating, and responding to advanced security threats on enterprise networks.
  • Key Outcomes:
      Onboard devices to Microsoft Defender for Endpoint.
    • Use the Threat and Vulnerability Management module to identify and mitigate endpoint vulnerabilities.
    • Enhance your network security by configuring device discovery.
  • Module 4: Explore Microsoft Defender for Office 365’s protection stack including Threat Explorer, Threat Trackers, and Attack Simulation training to defend against sophisticated cyber attacks.
  • Key Outcomes:
    • Navigate through Threat Explorer to probe into and mitigate cyber threats.
    • Utilize Threat Tracker tools to stay ahead of potential security breaches.
    • Conduct Attack Simulator training to pinpoint and empower vulnerable users within your organization.

Provider: Microsoft Learn

Categories: Cybersecurity Courses, Threat Intelligence Courses, Windows Systems Administration Courses

Syllabus


Taught by


Tags

united states

provider Microsoft Learn

Microsoft Learn

178 Courses


Microsoft Learn

pricing Free Online Course
language English
duration 2 hours 59 minutes
sessions On-Demand
level Intermediate