Price:
$2,495.00
Days:
1
Virtual
– • Explain how Microsoft Defender for Endpoint can remediate risks in your environment
– • Administer a Microsoft Defender for Endpoint environment
– • Configure Attack Surface Reduction rules on Windows devices
– • Perform actions on a device using Microsoft Defender for Endpoint
– • Investigate domains and IP addresses in Microsoft Defender for Endpoint
– • Investigate user accounts in Microsoft Defender for Endpoint
– • Configure alert settings in Microsoft 365 Defender
– • Conduct hunting in Microsoft 365 Defender
– • Manage incidents in Microsoft 365 Defender
– • Explain how Microsoft Defender for Identity can remediate risks in your environment
– • Investigate DLP alerts in Microsoft Defender for Cloud Apps
– • Explain the types of actions you can take on insider risk management cases
– • Configure auto-provisioning in Microsoft Defender for Cloud Apps
– • Remediate alerts in Microsoft Defender for Cloud Apps
– • Construct KQL statements
– • Filter searches based on event time, severity, domain, and other relevant data using KQL
– • Extract data from unstructured string fields using KQL
– • Manage a Microsoft Sentinel workspace
– • Use KQL to access the watchlist in Microsoft Sentinel
– • Manage threat indicators in Microsoft Sentinel
– • Explain the Common Event Format and Syslog connector differences in Microsoft Sentinel
– • Connect Azure Windows Virtual Machines to Microsoft Sentinel
– • Configure Log Analytics agent to collect Sysmon events
– • Create new analytics rules and queries using the analytics rule wizard
– • Create a playbook to automate an incident response
– • Use queries to hunt for threats
– • Observe threats over time with livestream
• Intermediate understanding of Windows 10
• Familiarity with Azure virtual machines and virtual networking
• Basic understanding of Microsoft 365 and scripting concepts
• Familiarity with Azure services, specifically Azure SQL Database and Azure Storage
• Fundamental understanding of Microsoft security, compliance, and identity products
– • Introduction to Microsoft 365 threat protection
– • Mitigate incidents using Microsoft 365 Defender
– • Protect your identities with Microsoft Entra ID Protection
– • Manage insider risk in Microsoft Purview
– • Secure your cloud apps and services with Microsoft Defender for Cloud Apps
– • Respond to data loss prevention alerts using Microsoft 365
– • Remediate risks with Microsoft Defender for Office 365
– • Safeguard your environment with Microsoft Defender for Identity
– • Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard
– • Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium)
– • Deploy the Microsoft Defender for the Endpoint environment
– • Protect against threats with Microsoft Defender for Endpoint
– • Investigate threats with Content search in Microsoft Purview
– • Utilize Vulnerability Management in Microsoft Defender for Endpoint
– • Configure for alerts and detections in Microsoft Defender for Endpoint
– • Configure and manage automation using Microsoft Defender for Endpoint
– • Perform evidence and entities investigations using Microsoft Defender for Endpoint
– • Perform actions on a device using Microsoft Defender for Endpoint
– • Perform device investigations in Microsoft Defender for Endpoint
– • Implement Windows security enhancements with Microsoft Defender for Endpoint
– • Manage your cloud security posture management?
– • Explain cloud workload protections in Microsoft Defender for Cloud
– • Remediate security alerts using Microsoft Defender for Cloud
– • Construct KQL statements for Microsoft Sentinel
– • Connect Azure assets to Microsoft Defender for Cloud
– • Connect non-Azure resources to Microsoft Defender for Cloud
– • Plan for cloud workload protections using Microsoft Defender for Cloud
– • Use watchlists in Microsoft Sentinel
– • Utilize threat intelligence in Microsoft Sentinel
– • Query logs in Microsoft Sentinel
– • Create and manage Microsoft Sentinel workspaces
– • Introduction to Microsoft Sentinel
– • Work with data in Microsoft Sentinel using Kusto Query Language
– • Analyze query results using KQL
– • Build multi-table statements using KQL
– • Connect data to Microsoft Sentinel using data connectors
– • Connect Microsoft services to Microsoft Sentinel
– • Connect Windows hosts to Microsoft Sentinel
– • Connect Microsoft Defender XDR to Microsoft Sentinel
– • Threat detection with Microsoft Sentinel analytics
– • Automation in Microsoft Sentinel
– • Security incident management in Microsoft Sentinel
– • Connect threat indicators to Microsoft Sentinel
– • Connect syslog data sources to Microsoft Sentinel
– • Connect Common Event Format logs to Microsoft Sentinel
– • Query, visualize, and monitor data in Microsoft Sentinel
– • Identify threats with Behavioral Analytics
– • Data normalization in Microsoft Sentinel
– • Explain threat-hunting concepts in Microsoft Sentinel
– • Threat hunting with Microsoft Sentinel
– • Manage content in Microsoft Sentinel
– • Hunt for threats using notebooks in Microsoft Sentinel
– • Use Search jobs in Microsoft Sentinel
– • Mitigate threats using Microsoft Defender XDR
– • Mitigate threats using Microsoft Copilot for Security
– • Mitigate threats using Microsoft Purview
– • Mitigate threats using Microsoft Defender for Endpoint
– • Mitigate threats using Microsoft Defender for Cloud
– • Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
– • Configure your Microsoft Sentinel environment
– • Connect logs to Microsoft Sentinel
– • Create detections and perform investigations using Microsoft Sentinel
– • Perform threat hunting in Microsoft Sentinel
– • LAB Outline
– • Mitigate threats using Microsoft Security Copilot
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.