back

Use Microsoft 365 Defender to Mitigate Threats

2 H 31 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Overview
    • Course Overview
    • Introducing Microsoft 365 Defender
  • Mitigate Threats Using Microsoft 365 Defender
    • Introducing Microsoft Defender for Office 365
    • Using Defender for Office 365
    • Introducing Microsoft Defender for Cloud Apps
    • Using Defender for Cloud Apps
  • Mitigate Threats Using Microsoft Defender for Endpoint
    • Introducing Microsoft Defender for Endpoint
    • Use Security Baselines for Devices
    • Using Additional Features in Defender for Endpoints
  • Mitigate Threats Using Microsoft Defender for Identity
    • Introducing Microsoft Defender for Identity
    • Use Defender for Identity to Protect Active Directory
  • Manage XDR in Microsoft 365 Defender
    • Introducing Extended Detection and Response in Defender
    • Use the Action Center for Security
    • Understanding the Microsoft Secure Score
    • Perform Threat Hunting/Analytics

Course Overview

2 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

line:-1 <v.Female.spk1 Speaker1>>> When dealing with here are advocates as we go along. line:-1 <v.Female.spk1 Speaker1>But I'm so excited to welcome Anthony to the show. Anthony, line:-1 <v.Female.spk1 Speaker1>tell us a little bit about you. line:-1 <v.Male.spk2 Speaker2>>> Sure, Lawrence, I have been boy working with Microsoft and line:-1 <v.Male.spk2 Speaker2>Microsoft products now for decades. And I have also been line:-1 <v.Male.spk2 Speaker2>quite busy with cloud technologies, AWS Google Cloud line:-1 <v.Male.spk2 Speaker2>platform and, of course, as you are. So it's no surprise that line:-1 <v.Male.spk2 Speaker2>I've been asked to lead this class in defender, Microsoft line:-1 <v.Male.spk2 Speaker2>defender. Lauren, this is a product that I've been working line:-1 <v.Male.spk2 Speaker2>with since its inception. And we're going to talk about line:-1 <v.Male.spk2 Speaker2>it as we go through these episodes. This is a product line:-1 <v.Male.spk2 Speaker2>that has changed dramatically over the last 20 years. So I line:-1 <v.Male.spk2 Speaker2>can't wait to fill everyone in on the details. Well, this is line:-1 <v.Male.spk2 Speaker2>going to be exciting course for you to check out. And maybe if line:-1 <v.Male.spk2 Speaker2>you're watching at home, you're thinking, is this the right line:-1 <v.Male.spk2 Speaker2>course for me? Anthony, tell us about what to expect and who line:-1 <v.Male.spk2 Speaker2>would be the ideal person to watch this? You know, we have line:-1 <v.Male.spk2 Speaker2>primary audiences for this course. We have those line:-1 <v.Male.spk2 Speaker2>individuals and I would say this is the majority of our line:-1 <v.Male.spk2 Speaker2>viewers. They're going to be interested in getting all they line:-1 <v.Male.spk2 Speaker2>can out of Microsoft's defender, product and suite of line:-1 <v.Male.spk2 Speaker2>products, actually. And they're probably here because they're line:-1 <v.Male.spk2 Speaker2>confused about what Microsoft is doing lately when it comes line:-1 <v.Male.spk2 Speaker2>to this defender product. But then we'll also have line:-1 <v.Male.spk2 Speaker2>students here that are interested in Microsoft's line:-1 <v.Male.spk2 Speaker2>certifications. And, yes, everything that Lauren I will line:-1 <v.Male.spk2 Speaker2>talk about with you regarding this topic maps directly to line:-1 <v.Male.spk2 Speaker2>Microsoft's certification exams. In fact, there's a line:-1 <v.Male.spk2 Speaker2>security centric exam, SE 200 that we are using as the basis line:-1 <v.Male.spk2 Speaker2>for much of what will cover. But please know this is not line:-1 <v.Male.spk2 Speaker2>going to be one of those like Kaplan get your degree. We're line:-1 <v.Male.spk2 Speaker2>interested in certification courses. We're not that line:-1 <v.Male.spk2 Speaker2>interested as much as we want to make sure you're armed with line:-1 <v.Male.spk2 Speaker2>Windows defender and ready to use it. Should you subscribe to line:-1 <v.Male.spk2 Speaker2>it? You know, Lauren, I just thought of this. We do have a line:-1 <v.Male.spk2 Speaker2>3rd type of student with us here. I bet you and that's the line:-1 <v.Male.spk2 Speaker2>student that really just wants to check out Windows defender, line:-1 <v.Male.spk2 Speaker2>Microsoft defender, see what is new with it because maybe their line:-1 <v.Male.spk2 Speaker2>decision maker that might be adopting. line:-1 <v.Female.spk1 Speaker1>>> Well, this is an exciting course to be part of. And I'll line:-1 <v.Female.spk1 Speaker1>be asking Anthony all the questions that you may be line:-1 <v.Female.spk1 Speaker1>having at home. And so we're going to get into our first line:-1 <v.Female.spk1 Speaker1>episodes. And so let's not leasing more time with the jump line:-1 <v.Female.spk1 Speaker1>in