Course Description

Managing security for Microsoft environments has never been more important. In this LIVE Online Training, you will learn about the tools and services Microsoft provides that help keep you safe and how to design, implement, and troubleshoot the various security solutions. 

The LIVE Online Training is delivered in cooperation with our partner The Collective. The course instructor is Microsoft MVP Michael Van Horenbeeck. As with all our academy courses, the information presented is up-to-date and gathered from real-world implementations.

Note: If you already have an All Access Pass subscription, this course has been added to your account.

This program runs for three weeks (6 sessions) and includes:  

  • Weekly Live Webinars (with recordings and Q&A)
  • Weekly Assignments to Guide Your Progress
  • A Community of Individuals with the Same Goals
  • A Private Facebook Group with Other Participants for Sharing Reflections, etc. 
  • The Chance to Ask Michael Van Horenbeeck Questions Directly in a Live Training Environment


This LIVE Online Training is for YOU if you want to:

  • Gain Better Understanding of Microsoft 365 Security and Microsoft Defender
  • Implement Azure AD Identity Protection
  • Secure Endpoint Devices and Establish Security Baselines
  • Identify Potential Risks and Effectively use Threat and Vulnerability Management
  • Gain Insight into Cloud Access Security Broker (CASB), Microsoft Defender for Cloud Apps (MDCA), and Microsoft Sentinel

Course Schedule

Date and Time for Live Webinars

Dates and start time for the live two-hour webinars:

  • Module 1: Tuesday, Aug 16, 9:00-11:00 AM Central Time (US and Canada)
  • Module 2: Wednesday, Aug 17, 9:00-11:00 AM Central Time (US and Canada)
  • Module 3: Monday, Aug 22, 9:00-11:00 AM Central Time (US and Canada)
  • Module 4: Tuesday, Aug 23, 9:00-11:00 AM Central Time (US and Canada)
  • Module 5: Monday, Aug 29, 9:00-11:00 AM Central Time (US and Canada)
  • Module 6: Tuesday, Aug 30, 9:00-11:00 AM Central Time (US and Canada)

Course Outline

Module 1: Introduction to Microsoft 365 Security and Microsoft Defender for Office 365

  • Modern Challenges and Why Security Matters
  • Microsoft 365 Security Product Overview
  • Licensing Microsoft 365 Security Solutions and Features
  • Microsoft Secure Score and How Can It Help
  • Introduction to Microsoft Defender for Office 365
  • Configuration and Threat Policies
  • Investigating Malicious Email
  • Removing Email Messages with Threat Explorer


Module 2: Securing Identities: Authentication, Defender for Identity, and Identity Protection

  • Introduction to Authentication Methods and Protocols Used in Azure AD
  • Protecting Identities with Conditional Access and MFA
  • Identifying Risky Users with Azure AD Identity Protection
  • Implementing Risky Sign-in Protection in Azure AD
  • Managing Applications in Azure AD
  • Protecting On-premises Identities with Defender for Identity
  • Defender for Identity Deployment and Configuration


Module 3: Endpoint Management and Security

  • Securing Endpoint Devices with Microsoft Endpoint Management (MEM)
  • Comparing Intune, Group Policies, and Endpoint Configuration Manager
  • Why Enrollment Restrictions Matter
  • Introduction to Security Baselines within Intune
  • Setting Up and Monitoring Security Policies (including Compliance Policies)
  • Keeping Windows 10 and Windows 11 Devices Up to Date 
  • Updating Windows, Applications, and Drivers


Module 4: Defender for Endpoint

  • Demystifying Antivirus and EDR Solutions
  • Deep Dive into EDR Capabilities and Architecture
  • Taking Actions on Devices, Such as Device Isolation and App Restriction
  • Using Threat and Vulnerability Management to Identify Potential Risks
  • Configuring Microsoft Defender Antivirus, Attack Surface Reduction, and More
  • Introduction to Mobile Device Security and Threat Protection


Module 5: Defender for Cloud Apps and Microsoft Information Protection 

  • What Is a Cloud Access Security Broker (CASB) and Why You Need It
  • Gaining Insights into Cloud Usage with Microsoft Defender for Cloud Apps (MDCA)
  • Identifying and deploying different Defender for Cloud App Policies
  • Protecting (Sensitive) Information
  • Real-world Examples of MDCA Use Cases


Module 6: Operationalizing Microsoft 365 Security

  • Introduction to the Incident Overview
  • Responding to Security Incidents
  • Hunting for Threats
  • Introduction to Microsoft Sentinel
  • Automating Responses via Microsoft Sentinel

Instructor(s)

Michael Van Horenbeeck is a Microsoft Certified Solutions Master (MCSM) and Azure Threat Protection MVP from Belgium, and one of the few people worldwide to hold both the coveted certification and award at the same time. He is a dynamic tech enthusiast and focuses on Security, Identity Management, with a history in Messaging and Collaboration. In his daily job, Michael is the CEO at “The Collective” and works with customers of all sizes around the globe to help them become and stay secure with, and through, Microsoft's solutions and services. Besides his job at The Collective, Michael loves to engage with the community and inspire people. He is the driving force behind the Microsoft 365 Security for IT Pros eBook and you can regularly find him writing about technology for a variety of tech websites or catch him speaking at different events across the globe. Michael is on Twitter as @vanhybrid and you can follow his ramblings on m365securitybook.com, insight365.eu, or through his company's website www.thecollective.eu.

Michael Van Horenbeeck

CEO