Protecting Endpoints with Microsoft Defender Advanced Threat Protection
The cyber threat landscape has evolved whereby attackers are using sophistication to attack endpoints. Protecting these endpoints is crucial to any organization. This course will teach you how to deploy, maintain, and monitor Microsoft Defender ATP.
What you'll learn
When attackers target organizations, they often end up targeting endpoints since these form an easy entry point into an organization. Attackers make use of sophisticated techniques that range from malware, credential theft techniques, and much more. In this course, Protecting Endpoints with Microsoft Defender Advanced Threat Protection, you’ll gain the ability to protect these endpoints by ensuring that you can perform endpoint detection and response, which is crucial to any organization. First, you’ll explore the components of Microsoft Defender ATP, how to properly plan and implement the solution based on different architectures, and how to manage and monitor the solution in response to various real world threats that span the cyber attack landscape. Next, you’ll discover major topics like integration of Microsoft Defender ATP into the Microsoft ATP Ecosystem. Finally, you’ll explore endpoint detection and response, automated investigations, advanced hunting, and threat and vulnerability management. When you are completed with this course, you will have the skills and knowledge needed to protect your organization from advanced attacks using Microsoft Defender ATP. Before you begin with this course, you should have a good understanding of common techniques used within endpoint detection and response, incident investigation, and remediation.
Table of contents
- Introduction 2m
- Planning and Deployment 6m
- Demo: Working with the Deployment Guide 1m
- Planning Linux Deployments 1m
- Demo: Onboarding Linux 4m
- Planning Server Deployments 1m
- Demo: Onboarding Windows Server 3m
- Windows 10 Overview 1m
- Demo: Onboarding Windows 10 Part 1 3m
- Demo: Onboarding Windows 10 Part 2 3m
- Planning MacOS Deployments 1m
- Demo: Onboarding Mac OS 4m
- Attack Surface Reduction Rules 1m
- Demo: Implementing Attack Surface Reduction Rules 6m
- Troubleshooting and Offboarding 4m
- Microsoft Defender ATP Baseline 1m
- Demo: Implementing Microsoft Defender ATP Baseline 2m
- Summary 2m
- Introduction 3m
- Common Threats 4m
- Security Operations Dashboard 1m
- Demo: Navigating the Security Operations Dashboard 5m
- Threat Analytics Overview 2m
- Demo: Applying Threat Analytics 3m
- Demo: Microsoft Defender ATP Integration 3m
- Endpoint Detection and Response Overview 1m
- Demo: Endpoint Detection and Response Part 1 7m
- Demo: Endpoint Detection and Response Part 2 7m
- Automated Investigation Overview 1m
- Demo: Automated Investigation and Response 9m
- Threat and Vulnerability Management (TVM) Overview 3m
- Demo: Working with the Threat and Vulnerability Dashboard 4m
- Demo: Taking Action on Security Recommendations 6m
- Advanced Hunting 1m
- Demo: Performing Advanced Hunting 6m
- Demo: Deploying an Evaluation Lab 2m
- Configuration Management and Reporting 2m
- Summary 1m