Microsoft 365 Security: Threat Protection Implementation and Management

This course will teach you how to plan, implement, and manage Microsoft’s Threat protection stack within your organization.

What you'll learn

All organizations are targets for cyber attacks. As the threat landscape evolves, your security operations need to evolve too.

In this course, Microsoft 365 Security: Threat Protection Implementation and Management, you’ll learn to implement and manage Microsoft’s Threat Protection stack:

  1. explore how to protect identities
  2. discover how to protect endpoints and Office 365
  3. learn how to perform advanced hunting by pulling all the data together into a single pane of glass for incident management and advanced hunting
When you’re finished with this course, you’ll have the skills and knowledge of Microsoft’s Threat Protection stack needed to help you to protect against threats, ultimately reducing your attack surface.

Table of contents

Course Overview

Course FAQ

What will I learn in this Microsoft 365 cyber security course?

In this course you will learn about the threat landscape, how to implement a hybrid threat solution, device and threat protection implementation, device and application protection, and implementing Defender for Office 365.

Are there any prerequisites for this course?

The only prerequisite for this course is having a grasp on Microsoft 365 fundamentals.

What are common types of cyberattacks?

Common types of cyber attacks include: Dos and DDos attacks, MITM attacks, Spear and Whale Phishing attacks, Ransomware, SQL Injection, and DNS spoofing.

What are the benefits of Microsoft Defender?

Microsoft Defender helps your organization with endpoint protection, detection, response, vulnerability management, and mobile threat defense.

What is Azure Sentinel?

Azure Sentinel is a cloud-native security information and event manager platform that uses built-in AI to help analyze large volumes of data across an enterprise.

About the author

Ready to upskill? Get started