Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Mitigate Threats Using Microsoft 365 Defender

In this course you’re going to cover the skills measured in the Mitigate Threats using 365 Defender objective in the exam guide.

Intermediate
2h 26m
(20)

Created by Rishalin Pillay

Last Updated Dec 16, 2022

Course Thumbnail
  • Course

Mitigate Threats Using Microsoft 365 Defender

In this course you’re going to cover the skills measured in the Mitigate Threats using 365 Defender objective in the exam guide.

Intermediate
2h 26m
(20)

Created by Rishalin Pillay

Last Updated Dec 16, 2022

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Microsoft Defener 365 is a frontline tool for protecting your organization from threats. In this course, Mitigate Threats Using Microsoft 365 Defender, you’ll learn to protect, detect, and respond to threats that span across identities, endpoints, productivity, and risky activities. First, you’ll explore how to protect your productivity environment. Next, you’ll discover how to protect endpoints from modern attacks. You will then focus on protecting identities and finally, you’ll learn how to perform cross domain investigation and hunting. When you’re finished with this course, you’ll have the skills and knowledge that is required to pass the Microsoft Security Operations Analyst exam.

Mitigate Threats Using Microsoft 365 Defender
Intermediate
2h 26m
(20)
Table of contents

About the author
Rishalin Pillay - Pluralsight course - Mitigate Threats Using Microsoft 365 Defender
Rishalin Pillay
23 courses 4.5 author rating 149 ratings

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

Get started with Pluralsight