❗The content presented here is sourced directly from Udemy platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.
Updated in [August 18th, 2023]
Skills and Knowledge:
By taking this course, participants will acquire a comprehensive understanding of Microsoft Defender for Endpoint, including its capabilities, features, and functions. They will learn how to detect, investigate, and respond to sophisticated threats targeting their endpoints, as well as how to operationalize the solution within their organization's security framework. Additionally, participants will gain hands-on experience with the solution, enabling them to confidently utilize it as a key component of their endpoint security strategy.
Professional Growth:
This course provides IT professionals, security analysts, and decision-makers with the expertise needed to effectively utilize Microsoft Defender for Endpoint as a key component of their organization's endpoint security strategy. Through a combination of hands-on exercises and real-world examples, participants will gain a deep understanding of the solution's capabilities, enabling them to detect, investigate, and respond to sophisticated threats targeting their endpoints. By the end of this course, participants will have the knowledge and confidence to effectively safeguard their endpoints from advanced cyber threats, contributing to their professional growth.
Further Education:
Yes, this course is suitable for preparing further education. It provides a comprehensive overview of Microsoft Defender for Endpoint, enabling participants to gain a solid understanding of the solution's capabilities and how to effectively utilize it as a key component of their organization's endpoint security strategy. Through hands-on exercises and real-world examples, participants will explore essential topics such as endpoint threat protection, endpoint detection and response (EDR), advanced threat analytics, and operationalizing Microsoft Defender for Endpoint. By the end of the course, participants will possess the knowledge and confidence to effectively utilize Microsoft Defender for Endpoint as a key component of their organization's endpoint security strategy.
Course Syllabus
Introduction
Role Based Access Control for MDE
Onboarding of Devices/Machine on Microsoft Defender for Endpoint
MDE Threat & Vulnerability Management
Attack Surface Reduction (ASR) Rules
Deployment of Attack Surface Reduction Rule (ASR) & its Testing