Protecting Endpoints with Microsoft Defender Advanced Threat Protection

The cyber threat landscape has evolved whereby attackers are using sophistication to attack endpoints. Protecting these endpoints is crucial to any organization. This course will teach you how to deploy, maintain, and monitor Microsoft Defender ATP.
Course info
Level
Intermediate
Updated
Jun 26, 2020
Duration
2h 13m
Table of contents
Course Overview
Defining the Components of Microsoft Defender ATP
Planning and Implementing a Microsoft Defender ATP Solution
Managing and Monitoring Microsoft Defender ATP
Description
Course info
Level
Intermediate
Updated
Jun 26, 2020
Duration
2h 13m
Description

When attackers target organizations, they often end up targeting endpoints since these form an easy entry point into an organization. Attackers make use of sophisticated techniques that range from malware, credential theft techniques, and much more. In this course, Protecting Endpoints with Microsoft Defender Advanced Threat Protection, you’ll gain the ability to protect these endpoints by ensuring that you can perform endpoint detection and response, which is crucial to any organization. First, you’ll explore the components of Microsoft Defender ATP, how to properly plan and implement the solution based on different architectures, and how to manage and monitor the solution in response to various real world threats that span the cyber attack landscape. Next, you’ll discover major topics like integration of Microsoft Defender ATP into the Microsoft ATP Ecosystem. Finally, you’ll explore endpoint detection and response, automated investigations, advanced hunting, and threat and vulnerability management. When you are completed with this course, you will have the skills and knowledge needed to protect your organization from advanced attacks using Microsoft Defender ATP. Before you begin with this course, you should have a good understanding of common techniques used within endpoint detection and response, incident investigation, and remediation.

About the author
About the author

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

More from the author
Credential Access with John the Ripper
Intermediate
23m
May 22, 2020
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi there. I'm ______ in ballet and welcome to my course, protecting in points with Microsoft Defender. 80 p I am an author, It plural site and my primary focus is offensive security. When Attackers stargate organizations, they often end up targeting in points. Since Theis Forman easy entry point into an organization, Attackers make use off sophisticated techniques that range from AL way credentials, lift and much more. Protecting these endpoints and ensuring that you have the ability to perform endpoint detection and response is crucial to any organization. Defending against these sophisticated techniques requires a mixture of machine learning, automation and more. In this course, we will cover the components of Microsoft, defend 80 p how to properly plan and implement the solution based on different architectures and how to manage and monitor the solution in response, the various real will threats that spend the cyberattack landscape. Some of the major topics that we will cover includes integration off Microsoft Defender 80 p into the Microsoft 80 p ecosystem. We will look at endpoint detection and response, automated investigations, advanced hunting and threatened vulnerability management. When you are completed with this course, you will have the skills and knowledge needed to protect your organization from advanced attacks. Using Microsoft defendant 80 p Before you begin with the scores, you should have a good understanding of common techniques used within endpoint detection and response, incident investigations and remediation. I hope you will join me on this journey to learn how to protect your in points with Microsoft Defender 80 p.