
x
After completing this course, students will be able to:
To be Decided
Detect, investigate, respond, and remediate threats to the productivity environment by using Microsoft Defender for Office 365
Detect, investigate, respond, and remediate endpoint threats by using Microsoft Defender for Endpoint
Detect, investigate, respond, and remediate identity threats
Manage cross-domain investigations in Microsoft 365 Defender portal
Design and configure an Azure Defender implementation
Plan and implement the use of data connectors for ingestion of data sources in Azure Defender
Manage Azure Defender alert rules
Configure automation and remediation
Design and configure an Azure Sentinel workspace
Plan and Implement the use of Data Connectors for Ingestion of Data Sources in Azure Sentinel
Manage Azure Sentinel analytics rules
Configure Security Orchestration Automation and Response (SOAR) in Azure Sentinel
Manage Azure Sentinel Incidents
Use Azure Sentinel workbooks to analyze and interpret data
Hunt for threats using the Azure Sentinel portal
Select Course date