Companies Home Search Profile

Microsoft Defender Course with hands on training and sims

Focused View

John Christopher

8:51:24

16 View
  • 1 - Welcome to the course.mp4
    05:21
  • 2 - Understanding the Microsoft Environment.mp4
    01:51
  • 3 - Foundations of Active Directory Domains.mp4
    12:11
  • 4 - Foundations of RAS DMZ and Virtualization.mp4
    13:09
  • 5 - Foundations of the Microsoft Cloud Services.mp4
    17:14
  • 6 - DONT SKIP The first thing to know about Microsoft cloud services.mp4
    02:10
  • 7 - DONT SKIP Azure AD is now renamed to Entra ID.mp4
    03:29
  • 8 - Questions for John Christopher.mp4
    05:42
  • 9 - DONT SKIP Using Assignments SIMULATIONS in the course.mp4
    03:54
  • 10 - Creating a free Microsoft 365 Account.mp4
    05:38
  • 11 - Activating licenses for Defender for Endpoint and Vulnerabilities.mp4
    03:44
  • 12 - Getting your free Azure credit.mp4
    03:32
  • 13 - Microsoft-365-Defender.pdf
  • 13 - The Microsoft 365 Defender Suite.mp4
    17:28
  • 14 - Using the Defender and Purview admin centers.mp4
    02:56
  • 15 - Microsoft-Defender-for-Office-365.pdf
  • 15 - What is Microsoft Defender for Office 365.mp4
    07:53
  • 16 - Implementing policies for uses in Email SharePoint OneDrive and Teams.mp4
    25:19
  • 17 - Dealing with threats using Defender for Office 365.mp4
    10:19
  • 18 - Performing a campaign email attack simulation in Microsoft Defender.mp4
    12:17
  • 19 - Defender-for-Cloud-Apps.pdf
  • 19 - Understanding the concepts of Microsoft Defender for Cloud Apps.mp4
    11:34
  • 20 - Investigating security risks in Defender for Cloud Apps.mp4
    10:46
  • 21 - Concepts of data loss prevention in Microsoft Defender.mp4
    06:28
  • 22 - Alerts with data loss prevention policies DLP.mp4
    17:39
  • 23 - Data loss prevention DLP policy alert investigation.mp4
    04:38
  • 23 - Understanding-DLP.pdf
  • 24 - Microsoft-Defender-for-Endpoint.pdf
  • 24 - Understanding Microsoft Defender for Endpoint concepts.mp4
    10:04
  • 25 - Deploy a Windows 11 VM endpoint.mp4
    07:15
  • 26 - Attack surface reduction ASR support with Intune.mp4
    03:08
  • 27 - Working with device onboarding regarding Defender for Endpoint.mp4
    07:42
  • 28 - Something to be aware of about extra features.mp4
    01:31
  • 29 - Endpoint advanced features alerts and incidents.mp4
    07:29
  • 30 - Endpoint vulnerabilities.mp4
    04:34
  • 31 - Device attack surface reduction ASR.mp4
    10:08
  • 32 - Device groups with Defender for Endpoint.mp4
    04:33
  • 33 - Microsoft Defender Vulnerability Management risk identification.mp4
    04:48
  • 34 - Endpoint threat indicators.mp4
    03:42
  • 35 - Device discovery of unmanaged devices.mp4
    06:12
  • 36 - Microsoft Entra ID security risk mitigation.mp4
    05:28
  • 37 - Concepts of using Microsoft Entra Identity Protection.mp4
    11:36
  • 37 - Entra-Identity-Protection.pdf
  • 38 - Microsoft Entra Identity Protection security risk mitigation.mp4
    09:51
  • 39 - Microsoft Entra Identity Protection risks in regards to Microsoft Defender.mp4
    02:59
  • 40 - Microsoft Defender for Identity concepts.mp4
    10:21
  • 40 - Microsoft-Defender-for-Identity.pdf
  • 41 - Using Defender for Identity to mitigate threats with AD DS.mp4
    03:32
  • 42 - Visualizing the concepts of extended detection and responses XDR.mp4
    09:57
  • 42 - extended-detection-and-response-xdr.zip
  • 43 - Configuring the Microsoft 365 Defender simulation lab.mp4
    04:49
  • 44 - Performing an attack using the simulation lab.mp4
    02:26
  • 45 - Microsoft 365 Defender incidents and automated investigations.mp4
    04:47
  • 46 - Microsoft 365 Defender action and submissions.mp4
    08:08
  • 47 - Using Kusto Query Language KQL for threat identification.mp4
    15:42
  • 48 - Microsoft Secure Score.mp4
    05:34
  • 49 - Microsoft 365 Defender threat analytics.mp4
    04:05
  • 50 - Custom detections and alerts.mp4
    03:33
  • 51 - Introduction to Microsoft Defender for Cloud.mp4
    06:22
  • 52 - Regulatory compliance policies along with MCSB.mp4
    05:21
  • 53 - Remediations with secure score in Microsoft Defender for Cloud.mp4
    06:49
  • 54 - Microsoft Defender for Servers.mp4
    06:25
  • 55 - Microsoft Defender for DevOps.mp4
    06:30
  • 56 - Microsoft Defender External Attack Surface Management EASM.mp4
    08:11
  • 57 - Settings config in Microsoft Defender for Cloud.mp4
    03:54
  • 58 - Roles in Microsoft Defender for Cloud.mp4
    06:06
  • 59 - Cloud workload protection.mp4
    03:53
  • 59 - assess-and-recommend-cloud-workload-protection.zip
  • 60 - Automation of onboarding Azure resource.mp4
    01:28
  • 61 - Azure Arc connections.mp4
    07:36
  • 62 - Multicloud connections.mp4
    01:59
  • 63 - Email notifications in Microsoft Defender for Cloud.mp4
    02:29
  • 64 - Using alert suppression rules.mp4
    05:08
  • 65 - Workflow automation configuration in Defender for Cloud.mp4
    10:37
  • 66 - Using sample alerts and incidents.mp4
    01:03
  • 67 - Using Microsoft Defender for Cloud recommendations.mp4
    02:44
  • 68 - Security alerts and incidents in Microsoft Defender for Cloud.mp4
    04:04
  • 69 - Using threat intelligence reports with Microsoft Defender for Cloud.mp4
    01:40
  • 70 - Concepts of insider risk policies.mp4
    12:38
  • 70 - Insider-Risk-Management.pdf
  • 71 - Insider risk policy generation.mp4
    11:40
  • 72 - Insider risk policy alert investigation.mp4
    05:27
  • 73 - Licensing of unified audit logging.mp4
    05:09
  • 74 - Permissions for unified auditing.mp4
    03:35
  • 75 - Threat hunting with unified audit logging.mp4
    06:03
  • 76 - Threat hunting with Content Searches.mp4
    07:50
  • 77 - Cleaning up your lab environment.mp4
    02:04
  • 78 - Getting a Udemy certificate.mp4
    01:31
  • 79 - BONUS Where do I go from here.mp4
    04:02
  • Description


    Learn how to expertly administer Microsoft Defender XDR (formerly Microsoft 365 Defender) with hands on experience!

    What You'll Learn?


    • Learn the concepts and perform hands on activities needed to master Microsoft Defender XDR (formerly Microsoft 365 Defender)
    • Gain a tremendous amount of knowledge involving Microsoft Defender XDR (formerly Microsoft 365 Defender)
    • Learn using hands on simulations on how Microsoft Defender XDR (formerly Microsoft 365 Defender) is administered!
    • Learn how to set up your own test lab for practicing the concepts!

    Who is this for?


  • IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender)
  • What You Need to Know?


  • Willingness to put in the time and practice the steps shown in the course
  • More details


    Description

    We really hope you'll agree, this training is way more than the average course on Udemy!

    Have access to the following:

    • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

    • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

    • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

    TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

    Introduction

    • Welcome to the course

    • Understanding the Microsoft Environment

    • Foundations of Active Directory Domains

    • Foundations of RAS, DMZ, and Virtualization

    • Foundations of the Microsoft Cloud Services

    • DONT SKIP: The first thing to know about Microsoft cloud services

    • DONT SKIP: Azure AD is now renamed to Entra ID

    • Questions for John Christopher

    Performing hands on activities

    • DONT SKIP: Using Assignments in the course

    • Creating a free Microsoft 365 Account

    • Activating licenses for Defender for Endpoint and Vulnerabilities

    • Getting your free Azure credit

    Basic concepts of the Microsoft Defender Suite and Services

    • The Microsoft 365 Defender Suite

    • Using the Defender and Purview admin centers

    Microsoft Defender for Office 365

    • What is Microsoft Defender for Office 365?

    • Implementing policies for uses in Email, SharePoint, OneDrive, and Teams

    • Dealing with threats using Defender for Office 365

    • Performing a campaign email attack simulation in Microsoft Defender

    Microsoft Defender for Cloud Apps and Data Loss Prevention (DLP)

    • Understanding the concepts of Microsoft Defender for Cloud Apps

    • Investigating security risks in Defender for Cloud Apps

    • Concepts of data loss prevention in Microsoft Defender

    • Alerts with data loss prevention policies (DLP)

    • Data loss prevention (DLP) policy alert investigation

    Microsoft Defender for Endpoint and Defender Vulnerability Management

    • Understanding Microsoft Defender for Endpoint concepts

    • Deploy a Windows 11 VM endpoint

    • Attack surface reduction (ASR) support with Intune

    • Working with device onboarding regarding Defender for Endpoint

    • Something to be aware of about extra features

    • Endpoint advanced features, alerts and incidents

    • Endpoint vulnerabilities

    • Device attack surface reduction (ASR)

    • Device groups with Defender for Endpoint

    • Microsoft Defender Vulnerability Management risk identification

    • Endpoint threat indicators

    • Device discovery of unmanaged devices

    Microsoft Defender for Identity

    • Microsoft Entra ID security risk mitigation

    • Concepts of using Microsoft Entra Identity Protection

    • Microsoft Entra Identity Protection security risk mitigation

    • Microsoft Entra Identity Protection risks in regards to Microsoft Defender

    • Microsoft Defender for Identity concepts

    • Using Defender for Identity to mitigate threats with AD DS

    Microsoft 365 Defender as an Extended Detection and Response (XDR)

    • Visualizing the concepts of extended detection and responses (XDR)

    • Configuring the Microsoft 365 Defender simulation lab

    • Performing an attack using the simulation lab

    • Microsoft 365 Defender incidents and automated investigations

    • Microsoft 365 Defender action and submissions

    • Using Kusto Query Language (KQL) for threat identification

    • Microsoft Secure Score

    • Microsoft 365 Defender threat analytics

    • Custom detections and alerts

    Getting started w/ Defender for Cloud, Defender for Servers & Defender for DevOps

    • Introduction to Microsoft Defender for Cloud

    • Regulatory compliance policies along with MCSB

    • Remediation's with secure score in Microsoft Defender for Cloud

    • Microsoft Defender for Servers

    • Microsoft Defender for DevOps

    • Microsoft Defender External Attack Surface Management (EASM)

    Microsoft Defender for Cloud full management and configurations

    • Settings config in Microsoft Defender for Cloud

    • Roles in Microsoft Defender for Cloud

    • Cloud workload protection

    • Automation of onboarding Azure resource

    • Azure Arc connections

    • Multi-cloud connections

    • Email notifications in Microsoft Defender for Cloud

    • Using alert suppression rules

    • Workflow automation configuration in Defender for Cloud

    • Using sample alerts and incidents

    • Using Microsoft Defender for Cloud recommendations

    • Security alerts and incidents in Microsoft Defender for Cloud

    • Using threat intelligence reports with Microsoft Defender for Cloud

    Dealing with insider risks in Microsoft 365

    • Concepts of insider risk policies

    • Insider risk policy generation

    • Insider risk policy alert investigation

    Audit and search capabilities in Microsoft Defender and Microsoft Purview

    • Licensing of unified audit logging

    • Permissions for unified auditing

    • Threat hunting with unified audit logging

    • Threat hunting with Content Searches

    Conclusion

    • Cleaning up your lab environment

    • Getting a Udemy certificate

    • BONUS Where do I go from here?

    Who this course is for:

    • IT people interested in learning a tremendous amount about Microsoft Defender XDR (formerly Microsoft 365 Defender)

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    John Christopher
    John Christopher
    Instructor's Courses
    John Christopher is a Technical Instructor that has been in the business for over 20 years. His first experience with information technology occurred in the early 90s when he ran an MS-DOS based BBS(Bulletin Board System) as a System Operator. In the late 90s, after working with Windows NT 3.50 performing backups for Regal Group, he decided to get Windows NT Microsoft Certified.In 1998 he got his first Microsoft Certified Systems Engineer and Microsoft Certified Trainer certification. Shortly after getting certified, he began working as a Junior Administrator and Instructor for Knowledge Alliance in Atlanta GA. From there John was able to become one of the first people in the world to gain an MCSE for the Windows 2000 operating system and he began teaching full time for a company called Productivity Point International. At Productivity Point, John got Citrix Metaframe certified and began teaching Citrix along with Microsoft classes. Productivity Point began experiencing financial troubles and John moved on to work with another training company, located in Atlanta GA. in 2001.For many years at the training company in Atlanta John was the network administrator and held the title of Senior Technical Instructor for the company. John designed and administered their network from the ground up, going from a single floor in a single building, to multiple floors in multiple buildings and locations. He furthered his certifications, gaining the MCSE for 2003, 2008(MCITP), 2012, A+, Network+, Security+, Exchange, and CCNA. Along with his Network admin duties, John taught hundreds of students during his 11 years for the company. During all his years of training, John has had the honor of doing lots of classes with the military, along with quite a few classes within on-site military bases. In 2012, he decided to break away from company he had been working for and do consulting and contract teaching. Currently, John gets hired by many different training companies to teach technical training classes all over the United States. He is also hired as a consultant to go into companies and work on their networks and implement, along with troubleshoot real world scenarios.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 79
    • duration 8:51:24
    • Release Date 2024/01/12

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness