Course Description
Managing security for Microsoft environments has never been more important. In this LIVE Online Training, you will learn about the tools and services Microsoft provides that help keep you safe and how to design, implement, and troubleshoot the various security solutions.
The LIVE Online Training is delivered in cooperation with our partner The Collective. The course instructor is Microsoft MVP Michael Van Horenbeeck. As with all our academy courses, the information presented is up-to-date and gathered from real-world implementations.
Note: If you already have an All Access Pass subscription, this course has been added to your account.
This program runs for three weeks (6 sessions) and includes:
- Weekly Live Webinars (with recordings and Q&A)
- Weekly Assignments to Guide Your Progress
- A Community of Individuals with the Same Goals
- A Private Facebook Group with Other Participants for Sharing Reflections, etc.
- The Chance to Ask Michael Van Horenbeeck Questions Directly in a Live Training Environment
This LIVE Online Training is for YOU if you want to:
- Gain Better Understanding of Microsoft 365 Security and Microsoft Defender
- Implement Azure AD Identity Protection
- Secure Endpoint Devices and Establish Security Baselines
- Identify Potential Risks and Effectively use Threat and Vulnerability Management
- Gain Insight into Cloud Access Security Broker (CASB), Microsoft Defender for Cloud Apps (MDCA), and Microsoft Sentinel
Course Schedule
Date and Time for Live Webinars
Dates and start time for the live two-hour webinars:
- Module 1: Tuesday, Aug 16, 9:00-11:00 AM Central Time (US and Canada)
- Module 2: Wednesday, Aug 17, 9:00-11:00 AM Central Time (US and Canada)
- Module 3: Monday, Aug 22, 9:00-11:00 AM Central Time (US and Canada)
- Module 4: Tuesday, Aug 23, 9:00-11:00 AM Central Time (US and Canada)
- Module 5: Monday, Aug 29, 9:00-11:00 AM Central Time (US and Canada)
- Module 6: Tuesday, Aug 30, 9:00-11:00 AM Central Time (US and Canada)
Course Outline
Module 1: Introduction to Microsoft 365 Security and Microsoft Defender for Office 365
- Modern Challenges and Why Security Matters
- Microsoft 365 Security Product Overview
- Licensing Microsoft 365 Security Solutions and Features
- Microsoft Secure Score and How Can It Help
- Introduction to Microsoft Defender for Office 365
- Configuration and Threat Policies
- Investigating Malicious Email
- Removing Email Messages with Threat Explorer
Module 2: Securing Identities: Authentication, Defender for Identity, and Identity Protection
- Introduction to Authentication Methods and Protocols Used in Azure AD
- Protecting Identities with Conditional Access and MFA
- Identifying Risky Users with Azure AD Identity Protection
- Implementing Risky Sign-in Protection in Azure AD
- Managing Applications in Azure AD
- Protecting On-premises Identities with Defender for Identity
- Defender for Identity Deployment and Configuration
Module 3: Endpoint Management and Security
- Securing Endpoint Devices with Microsoft Endpoint Management (MEM)
- Comparing Intune, Group Policies, and Endpoint Configuration Manager
- Why Enrollment Restrictions Matter
- Introduction to Security Baselines within Intune
- Setting Up and Monitoring Security Policies (including Compliance Policies)
- Keeping Windows 10 and Windows 11 Devices Up to Date
- Updating Windows, Applications, and Drivers
Module 4: Defender for Endpoint
- Demystifying Antivirus and EDR Solutions
- Deep Dive into EDR Capabilities and Architecture
- Taking Actions on Devices, Such as Device Isolation and App Restriction
- Using Threat and Vulnerability Management to Identify Potential Risks
- Configuring Microsoft Defender Antivirus, Attack Surface Reduction, and More
- Introduction to Mobile Device Security and Threat Protection
Module 5: Defender for Cloud Apps and Microsoft Information Protection
- What Is a Cloud Access Security Broker (CASB) and Why You Need It
- Gaining Insights into Cloud Usage with Microsoft Defender for Cloud Apps (MDCA)
- Identifying and deploying different Defender for Cloud App Policies
- Protecting (Sensitive) Information
- Real-world Examples of MDCA Use Cases
Module 6: Operationalizing Microsoft 365 Security
- Introduction to the Incident Overview
- Responding to Security Incidents
- Hunting for Threats
- Introduction to Microsoft Sentinel
- Automating Responses via Microsoft Sentinel
Instructor(s)
Michael Van Horenbeeck
CEO