-
Introduction to Microsoft 365 threat protection
-
Mitigate incidents using Microsoft 365 Defender
-
Protect your identities with Microsoft Entra ID Protection
-
Remediate risks with Microsoft Defender for Office 365
-
Safeguard your environment with Microsoft Defender for Identity
-
Secure your cloud apps and services with Microsoft Defender for Cloud Apps
-
Respond to data loss prevention alerts using Microsoft 365
-
Manage insider risk in Microsoft Purview
-
Investigate threats by using audit features in Microsoft 365 Defender and Microsof Purview Standard
-
Investigate threats using audit in Microsoft 365 Defender and Microsoft Purview (Premium)
-
Investigate threats with Content search in Microsoft Purview
-
Protect against threats with Microsoft Defender for Endpoint
-
Deploy the Microsoft Defender for Endpoint environment
-
Implement Windows security enhancements with Microsoft Defender for Endpoint
-
Perform device investigations in Microsoft Defender for Endpoint
-
Perform actions on a device using Microsoft Defender for Endpoint
-
Perform evidence and entities investigations using Microsoft Defender for Endpoint
-
Configure and manage automation using Microsoft Defender for Endpoint
-
Configure for alerts and detections in Microsoft Defender for Endpoint
-
Utilise Vulnerability Management in Microsoft Defender for Endpoint
-
Plan for cloud workload protections using Microsoft Defender for Cloud
-
Connect Azure assets to Microsoft Defender for Cloud
-
Connect non-Azure resources to Microsoft Defender for Cloud
-
Manage your cloud security posture management​
-
Explain cloud workload protections in Microsoft Defender for Cloud
-
Remediate security alerts using Microsoft Defender for Cloud
-
Construct KQL statements for Microsoft Sentinel
-
Analyse query results using KQL
-
Build multi-table statements using KQL
-
Work with data in Microsoft Sentinel using Kusto Query Language
-
Introduction to Microsoft Sentinel
-
Create and manage Microsoft Sentinel workspaces
-
Query logs in Microsoft Sentinel
-
Use watchlists in Microsoft Sentinel
-
Utilise threat intelligence in Microsoft Sentinel
-
Connect data to Microsoft Sentinel using data connectors
-
Connect Microsoft services to Microsoft Sentinel
-
Connect Microsoft 365 Defender to Microsoft Sentinel
-
Connect Windows hosts to Microsoft Sentinel
-
Connect Common Event Format logs to Microsoft Sentinel
-
Connect syslog data sources to Microsoft Sentinel
-
Connect threat indicators to Microsoft Sentinel
-
Threat detection with Microsoft Sentinel analytics
-
Automation in Microsoft Sentinel
-
Security incident management in Microsoft Sentinel
-
Identify threats with Behavioral Analytics
-
Data normalisation in Microsoft Sentinel
-
Query, visualise, and monitor data in Microsoft Sentinel
-
Manage content in Microsoft Sentinel
-
Explain threat hunting concepts in Microsoft Sentinel
-
Threat hunting with Microsoft Sentinel
-
Use Search jobs in Microsoft Sentinel
-
Hunt for threats using notebooks in Microsoft Sentinel