Academy A Hero Image

Live: Mastering Microsoft Defender for Endpoint

  • Author: Dean Ellerby
  • Level: Intermediate
  • Study time: 10 hours
This comprehensive course equips IT professionals and cybersecurity experts with the knowledge and skills to effectively deploy, configure, and manage Microsoft Defender for Endpoint. Participants will learn essential techniques in policy management, threat and vulnerability assessment, advanced threat hunting, incident response, and integration with other security tools.
  • Live Session time: 10 hours
  • Exams: 5

Assignments

Hours

Course Lessons

Course Outline

Module 1

Introduction to Microsoft Defender for Endpoint

This introductory session will provide an overview of Microsoft Defender for Endpoint, its purpose, and key features, setting the foundation for understanding how it enhances cybersecurity measures.
  • Overview of Microsoft Defender for Endpoint
  • Key features and benefits
  • Deployment options and requirements
  • Integration with other Microsoft security solutions
  • Setting up and configuring Microsoft Defender for Endpoint
  • Overview of the Microsoft 365 Defender portal

Module 2

Configuring and Managing Defender Policies

This session will focus on configuring and managing security policies within Microsoft Defender for Endpoint to protect your organization's devices and data.
  • Understanding security policies and baselines
  • Creating and managing device compliance policies
  • Configuring endpoint detection and response (EDR) policies
  • Managing firewall and network protection settings
  • Implementing attack surface reduction (ASR) rules
  • Policy monitoring and troubleshooting

Module 3

Threat and Vulnerability Management, Hunting and Incident Response

 This session will cover the tools and techniques for identifying, assessing, and mitigating threats and vulnerabilities using Microsoft Defender for Endpoint.
  • Introduction to threat and vulnerability management (TVM)
  • Conducting vulnerability assessments
  • Prioritizing and remediating vulnerabilities
  • Overview of threat hunting capabilities
  • Using automated investigations and response capabilities
  • Investigating and responding to incidents

Module 4

Integration, Automation, and Reporting

The final session will focus on integrating Microsoft Defender for Endpoint with other tools, automating security tasks, and generating comprehensive reports to enhance security operations.
  • Integrating Defender for Endpoint with SIEM and other security tools
  • Using APIs and automation tools (e.g., PowerShell, Logic Apps)
  • Configuring automated response playbooks
  • Generating and customizing security reports
  • Analyzing security data for insights and trends
  • Best practices for continuous improvement and security posture management
You have access to

4 weeks of learning

Registration
Week 1
Week 2
Week 3
Week 4
3:00 PM CET - september 4th 2024

Introduction to Microsoft Defender for Endpoint

This introductory session will provide an overview of Microsoft Defender for Endpoint, its purpose, and key features, setting the foundation for understanding how it enhances cybersecurity measures.
3:00 PM CET - september 30th 2024

Configuring and Managing Defender Policies

This session will focus on configuring and managing security policies within Microsoft Defender for Endpoint to protect your organization's devices and data.
3:00 PM CET - OCTOBER 15th 2024

Threat and Vulnerability Management, Hunting and Incident Response

This session will cover the tools and techniques for identifying, assessing, and mitigating threats and vulnerabilities using Microsoft Defender for Endpoint.
3:00 PM CET - october 16th 2024

Integration, Automation, and Reporting

The final session will focus on integrating Microsoft Defender for Endpoint with other tools, automating security tasks, and generating comprehensive reports to enhance security operations

Complete your seat registration for this course

get access to

4 weeks of learning

Week 1
Week 2
Week 3
Week 4
1:00 PM CET - september 4th 2024

Introduction to Microsoft Defender for Endpoint

This introductory session will provide an overview of Microsoft Defender for Endpoint, its purpose, and key features, setting the foundation for understanding how it enhances cybersecurity measures.
3:00 PM CET - september 30th 2024

Configuring and Managing Defender Policies

This session will focus on configuring and managing security policies within Microsoft Defender for Endpoint to protect your organization's devices and data.
3:00 PM CET - OCTOBER 15th 2024

Threat and Vulnerability Management, Hunting and Incident Response

This session will cover the tools and techniques for identifying, assessing, and mitigating threats and vulnerabilities using Microsoft Defender for Endpoint.
3:00 PM CET - october 16th 2024

Integration, Automation, and Reporting

The final session will focus on integrating Microsoft Defender for Endpoint with other tools, automating security tasks, and generating comprehensive reports to enhance security operations

Created by

Dean Ellerby

Microsoft Security MVP
Dean Ellerby is a seasoned expert in cybersecurity with extensive experience with Microsoft 365.  Dean's approach combines theoretical insights with practical applications, ensuring learners can effectively safeguard their organizations against cyber threats. 
Aicon
Don't hesitate

Take your career and expertise to the next level with the AlpenShield Empower Pass

Created with