Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Protecting Endpoints with Microsoft Defender Advanced Threat Protection

Course Cover
compare button icon

Course Features

icon

Duration

133 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

133 minutes

Course Description

Endpoints are often targeted by attackers when they target organizations. These endpoints provide easy access to the organization. Advanced techniques are used by attackers to steal credential information, malware, and many other techniques. This course, Protecting Endpoints With Microsoft Defender Advanced Threat Protection, will teach you how to detect and respond to endpoints, which is critical for any organization. You'll first learn about the components of Microsoft Defender ATP. Next, you will explore how to plan and implement the solution based upon different architectures. Finally, you'll learn how to monitor and manage the solution to respond to real-world threats. The integration of Microsoft Defender ATP in the Microsoft ATP Ecosystem will be next. Endpoint detection and management, automated investigations, advanced hunt, threat and vulnerability management, as well as endpoint response will all be covered. This course will equip you with the knowledge and skills to defend your organization against advanced attacks using Microsoft Defender ATP. You should be familiar with the most common techniques in endpoint detection, response, investigation, and remediation before you start this course.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Before you begin with this course, you should have a good understanding of common techniques used within endpoint detection and response, incident investigation, and remediation

Finally, you’ll explore endpoint detection and response, automated investigations, advanced hunting, and threat and vulnerability management

First, you’ll explore the components of microsoft defender atp, how to properly plan and implement the solution based on different architectures, and how to manage and monitor the solution in response to various real world threats that span the cyber atta

In this course, protecting endpoints with microsoft defender advanced threat protection, you’ll gain the ability to protect these endpoints by ensuring that you can perform endpoint detection and response, which is crucial to any organization

Next, you’ll discover major topics like integration of microsoft defender atp into the microsoft atp ecosystem

When you are completed with this course, you will have the skills and knowledge needed to protect your organization from advanced attacks using microsoft defender atp

Course Cover