Microsoft 365 Security: Threat Protection Implementation and Management

by Rishalin Pillay

This course will teach you how to plan, implement, and manage Microsoft’s Threat protection stack within your organization.

What you'll learn

All organizations are targets for cyber attacks. As the threat landscape evolves, your security operations need to evolve too.

In this course, Microsoft 365 Security: Threat Protection Implementation and Management, you’ll learn to implement and manage Microsoft’s Threat Protection stack:

  1. explore how to protect identities
  2. discover how to protect endpoints and Office 365
  3. learn how to perform advanced hunting by pulling all the data together into a single pane of glass for incident management and advanced hunting
When you’re finished with this course, you’ll have the skills and knowledge of Microsoft’s Threat Protection stack needed to help you to protect against threats, ultimately reducing your attack surface.

Table of contents

Course Overview

Course FAQ

What will I learn in this Microsoft 365 cyber security course?

In this course you will learn about the threat landscape, how to implement a hybrid threat solution, device and threat protection implementation, device and application protection, and implementing Defender for Office 365.

Are there any prerequisites for this course?

The only prerequisite for this course is having a grasp on Microsoft 365 fundamentals.

What are common types of cyberattacks?

Common types of cyber attacks include: Dos and DDos attacks, MITM attacks, Spear and Whale Phishing attacks, Ransomware, SQL Injection, and DNS spoofing.

What are the benefits of Microsoft Defender?

Microsoft Defender helps your organization with endpoint protection, detection, response, vulnerability management, and mobile threat defense.

What is Azure Sentinel?

Azure Sentinel is a cloud-native security information and event manager platform that uses built-in AI to help analyze large volumes of data across an enterprise.

About the author

Rishalin is an active author, who has authored a number of courses found on Pluralsight. In addition to video courses, he has authored two books titled "Learn Penetration Testing" and "Offensive Shellcode from Scratch". He serves as a technical contributor to many books ranging from Dark Web Analysis, Kali Linux, Offensive Security, SECOPS, and study guides across Networking and Microsoft technologies. He holds the Microsoft Content Publisher Gold and Platinum awards for his contributions made ... more

Ready to upskill? Get started