Published 11/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.73 GB | Duration: 8h 51m
Learn how to expertly administer Microsoft Defender XDR (formerly Microsoft 365 Defender) with hands on experience!
What you'll learn
Learn the concepts and perform hands on activities needed to master Microsoft Defender XDR (formerly Microsoft 365 Defender)
Gain a tremendous amount of knowledge involving Microsoft Defender XDR (formerly Microsoft 365 Defender)
Learn using hands on simulations on how Microsoft Defender XDR (formerly Microsoft 365 Defender) is administered!
Learn how to set up your own test lab for practicing the concepts!
Requirements
Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more than the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the courseUnderstanding the Microsoft EnvironmentFoundations of Active Directory DomainsFoundations of RAS, DMZ, and VirtualizationFoundations of the Microsoft Cloud ServicesDONT SKIP: The first thing to know about Microsoft cloud servicesDONT SKIP: Azure AD is now renamed to Entra IDQuestions for John ChristopherPerforming hands on activitiesDONT SKIP: Using Assignments in the courseCreating a free Microsoft 365 AccountActivating licenses for Defender for Endpoint and VulnerabilitiesGetting your free Azure creditBasic concepts of the Microsoft Defender Suite and ServicesThe Microsoft 365 Defender SuiteUsing the Defender and Purview admin centersMicrosoft Defender for Office 365What is Microsoft Defender for Office 365?Implementing policies for uses in Email, SharePoint, OneDrive, and TeamsDealing with threats using Defender for Office 365Performing a campaign email attack simulation in Microsoft DefenderMicrosoft Defender for Cloud Apps and Data Loss Prevention (DLP)Understanding the concepts of Microsoft Defender for Cloud AppsInvestigating security risks in Defender for Cloud AppsConcepts of data loss prevention in Microsoft DefenderAlerts with data loss prevention policies (DLP)Data loss prevention (DLP) policy alert investigationMicrosoft Defender for Endpoint and Defender Vulnerability ManagementUnderstanding Microsoft Defender for Endpoint conceptsDeploy a Windows 11 VM endpointAttack surface reduction (ASR) support with IntuneWorking with device onboarding regarding Defender for EndpointSomething to be aware of about extra featuresEndpoint advanced features, alerts and incidentsEndpoint vulnerabilitiesDevice attack surface reduction (ASR)Device groups with Defender for EndpointMicrosoft Defender Vulnerability Management risk identificationEndpoint threat indicatorsDevice discovery of unmanaged devicesMicrosoft Defender for IdentityMicrosoft Entra ID security risk mitigationConcepts of using Microsoft Entra Identity ProtectionMicrosoft Entra Identity Protection security risk mitigationMicrosoft Entra Identity Protection risks in regards to Microsoft DefenderMicrosoft Defender for Identity conceptsUsing Defender for Identity to mitigate threats with AD DSMicrosoft 365 Defender as an Extended Detection and Response (XDR)Visualizing the concepts of extended detection and responses (XDR)Configuring the Microsoft 365 Defender simulation labPerforming an attack using the simulation labMicrosoft 365 Defender incidents and automated investigationsMicrosoft 365 Defender action and submissionsUsing Kusto Query Language (KQL) for threat identificationMicrosoft Secure ScoreMicrosoft 365 Defender threat analyticsCustom detections and alertsGetting started w/ Defender for Cloud, Defender for Servers & Defender for DevOpsIntroduction to Microsoft Defender for CloudRegulatory compliance policies along with MCSBRemediation's with secure score in Microsoft Defender for CloudMicrosoft Defender for ServersMicrosoft Defender for DevOpsMicrosoft Defender External Attack Surface Management (EASM)Microsoft Defender for Cloud full management and configurationsSettings config in Microsoft Defender for CloudRoles in Microsoft Defender for CloudCloud workload protectionAutomation of onboarding Azure resourceAzure Arc connectionsMulti-cloud connectionsEmail notifications in Microsoft Defender for CloudUsing alert suppression rulesWorkflow automation configuration in Defender for CloudUsing sample alerts and incidentsUsing Microsoft Defender for Cloud recommendationsSecurity alerts and incidents in Microsoft Defender for CloudUsing threat intelligence reports with Microsoft Defender for CloudDealing with insider risks in Microsoft 365Concepts of insider risk policiesInsider risk policy generationInsider risk policy alert investigationAudit and search capabilities in Microsoft Defender and Microsoft PurviewLicensing of unified audit loggingPermissions for unified auditingThreat hunting with unified audit loggingThreat hunting with Content SearchesConclusionCleaning up your lab environmentGetting a Udemy certificateBONUS Where do I go from here?
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.