Companies Home Search Profile

Protecting Endpoints with Microsoft Defender Advanced Threat Protection

Focused View

Rishalin Pillay

2:13:46

12 View
  • 01 - Course Overview.mp4
    02:06
  • 02 - Introduction.mp4
    02:44
  • 03 - Microsoft Defender ATP Components.mp4
    03:56
  • 04 - Microsoft Ecosystem Integration.mp4
    03:08
  • 05 - Demo - Advanced Settings and Integration.mp4
    01:58
  • 06 - Summary.mp4
    00:46
  • 07 - Introduction.mp4
    01:36
  • 08 - Planning and Deployment.mp4
    05:33
  • 09 - Demo - Working with the Deployment Guide.mp4
    01:17
  • 10 - Planning Linux Deployments.mp4
    00:49
  • 11 - Demo - Onboarding Linux.mp4
    04:12
  • 12 - Planning Server Deployments.mp4
    01:15
  • 13 - Demo - Onboarding Windows Server.mp4
    03:04
  • 14 - Windows 10 Overview.mp4
    01:02
  • 15 - Demo - Onboarding Windows 10 Part 1.mp4
    03:08
  • 16 - Demo - Onboarding Windows 10 Part 2.mp4
    03:12
  • 17 - Planning MacOS Deployments.mp4
    00:51
  • 18 - Demo - Onboarding Mac OS.mp4
    03:32
  • 19 - Attack Surface Reduction Rules.mp4
    01:27
  • 20 - Demo - Implementing Attack Surface Reduction Rules.mp4
    05:37
  • 21 - Troubleshooting and Offboarding.mp4
    04:13
  • 22 - Microsoft Defender ATP Baseline.mp4
    01:19
  • 23 - Demo - Implementing Microsoft Defender ATP Baseline.mp4
    01:30
  • 24 - Summary.mp4
    01:58
  • 25 - Introduction.mp4
    03:29
  • 26 - Common Threats.mp4
    03:35
  • 27 - Security Operations Dashboard.mp4
    01:09
  • 28 - Demo - Navigating the Security Operations Dashboard.mp4
    04:56
  • 29 - Threat Analytics Overview.mp4
    01:52
  • 30 - Demo - Applying Threat Analytics.mp4
    03:11
  • 31 - Demo - Microsoft Defender ATP Integration.mp4
    03:19
  • 32 - Endpoint Detection and Response Overview.mp4
    01:28
  • 33 - Demo - Endpoint Detection and Response Part 1.mp4
    06:41
  • 34 - Demo - Endpoint Detection and Response Part 2.mp4
    07:11
  • 35 - Automated Investigation Overview.mp4
    01:19
  • 36 - Demo - Automated Investigation and Response.mp4
    08:47
  • 37 - Threat and Vulnerability Management (TVM) Overview.mp4
    02:36
  • 38 - Demo - Working with the Threat and Vulnerability Dashboard.mp4
    04:19
  • 39 - Demo - Taking Action on Security Recommendations.mp4
    06:26
  • 40 - Advanced Hunting.mp4
    01:29
  • 41 - Demo - Performing Advanced Hunting.mp4
    06:21
  • 42 - Demo - Deploying an Evaluation Lab.mp4
    02:22
  • 43 - Configuration Management and Reporting.mp4
    01:42
  • 44 - Summary.mp4
    01:21
  • Description


    The cyber threat landscape has evolved whereby attackers are using sophistication to attack endpoints. Protecting these endpoints is crucial to any organization. This course will teach you how to deploy, maintain, and monitor Microsoft Defender ATP.

    What You'll Learn?


      When attackers target organizations, they often end up targeting endpoints since these form an easy entry point into an organization. Attackers make use of sophisticated techniques that range from malware, credential theft techniques, and much more. In this course, Protecting Endpoints with Microsoft Defender Advanced Threat Protection, you’ll gain the ability to protect these endpoints by ensuring that you can perform endpoint detection and response, which is crucial to any organization. First, you’ll explore the components of Microsoft Defender ATP, how to properly plan and implement the solution based on different architectures, and how to manage and monitor the solution in response to various real world threats that span the cyber attack landscape. Next, you’ll discover major topics like integration of Microsoft Defender ATP into the Microsoft ATP Ecosystem. Finally, you’ll explore endpoint detection and response, automated investigations, advanced hunting, and threat and vulnerability management. When you are completed with this course, you will have the skills and knowledge needed to protect your organization from advanced attacks using Microsoft Defender ATP. Before you begin with this course, you should have a good understanding of common techniques used within endpoint detection and response, incident investigation, and remediation.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Rishalin Pillay
    Rishalin Pillay
    Instructor's Courses
    Rishalin is an active author, who has authored a number of courses found on Pluralsight. In addition to video courses, he has authored two books titled "Learn Penetration Testing" and "Offensive Shellcode from Scratch". He serves as a technical contributor to many books ranging from Dark Web Analysis, Kali Linux, Offensive Security, SECOPS, and study guides across Networking and Microsoft technologies. He holds the Microsoft Content Publisher Gold and Platinum awards for his contributions made towards the Cybersecurity Industry. At present he is a security specialist at Google (Chronicle) where he works as part of the Google Threat Intelligence team.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 44
    • duration 2:13:46
    • level average
    • Release Date 2023/12/08