Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Controlling Cybersecurity Risk with Defender Vulnerability Management

via LinkedIn Learning

Overview

Coursera Plus Annual Sale: All Certificates & Courses 25% Off!
Learn how to deploy and configure the features of Defender Vulnerability Management across its supported platforms, and how to respond to threats.

Syllabus

Introduction
  • Microsoft Defender Vulnerability Management and cybersecurity risk
  • What is Microsoft Defender Vulnerability Management?
  • What's included in Microsoft Defender Vulnerability Management?
  • What you'll need
1. Understanding Inventory
  • Onboarding devices
  • Device inventories
  • Software inventories
  • Browser extension, certificate, and firmware inventories
2. Device Discovery
  • Device discovery modes
  • Network device authenticated scan
  • Windows authenticated scan
3. Managing Vulnerabilities
  • Managing security recommendations
  • Remediation capabilities
  • Blocking vulnerable apps
4. Reporting and Insights
  • Secure Score
  • MDVM reports and notifications
  • Security baselines assessment
  • Advanced hunting
Conclusion
  • Next steps

Taught by

Ruairidh Campbell

Reviews

Start your review of Controlling Cybersecurity Risk with Defender Vulnerability Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.