• Course overview
  • Course details
  • Prerequisites

Course overview

About this course

In this course participants will learn to implement and manage Microsoft Defender XDR, enhancing their ability to detect, respond to, and mitigate security risks effectively. Practical applications of these concepts enable learners to establish robust security protocols, ensuring their systems remain resilient against evolving threats. By the end of the course, you'll be well-prepared to enhance your organization's cybersecurity posture.

Audience profile

The audience for this course includes IT administrators, cybersecurity specialists, and incident response teams who are responsible for detecting, responding to, and mitigating cyberthreats.

Show More Show Less

Course details

Module 1: Mitigate incidents using Microsoft Defender
• Use the Microsoft Defender portal
• Manage incidents
• Investigate incidents
• Manage and investigate alerts
• Manage automated investigations
• Use the action center
• Explore advanced hunting
• Investigate Microsoft Entra sign-in logs
• Understand Microsoft Secure Score
• Analyze threat analytics
• Analyze reports
• Configure the Microsoft Defender portal

Module 2: Deploy the Microsoft Defender for Endpoint environment
• Create your environment
• Understand operating systems compatibility and features
• Onboard devices
• Manage access
• Create and manage roles for role-based access control
• Configure device groups
• Configure environment advanced features

Module 3: Configure for alerts and detections in Microsoft Defender for Endpoint
• Configure advanced features
• Configure alert notifications
• Manage alert suppression
• Manage indicators

Module 4: Configure and manage automation using Microsoft Defender for Endpoint
• Configure advanced features
• Manage automation upload and folder settings
• Configure automated investigation and remediation capabilities
• Block at risk devices

Module 5: Perform device investigations in Microsoft Defender for Endpoint
• Use the device inventory list
• Investigate the device
• Use behavioral blocking
• Detect devices with device discovery

Module 6: Defend against Cyberthreats with Microsoft Defender XDR lab exercises
• Configure the Microsoft Defender XDR environment
• Deploy Microsoft Defender for Endpoint
• Mitigate Attacks with Microsoft Defender for Endpoint

Show More Show Less

Prerequisites


  • Experience using the Microsoft Defender portal
  • Basic understanding of Microsoft Defender for Endpoint
  • Basic understanding of Microsoft Sentinel
  • Experience using Kusto Query Language (KQL) in Microsoft Sentinel

Our Technology Partners

Spectrum Networks is the Authorised Learning Partner for some of the leaders in IT technology for Digital Transformation