Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Microsoft Cybersecurity Stack: Advanced Identity and Endpoint Protection

via LinkedIn Learning

Overview

Learn how to configure advanced identity and endpoint security with the Microsoft cybersecurity stack: Enterprise Mobility + Security (EMS) and Azure Active Directory Premium.

Syllabus

Introduction
  • Welcome
  • What you should know
  • Lab requirements
1. Configuring Virtualization-Based Security (VBS) in Windows 10
  • What is virtualization-based security?
  • Deploy Device Guard
  • Manage Credential Guard
  • Working with Windows AppLocker
2. Securing Email with Exchange Online Advanced Threat Protection (ATP)
  • Intro to Exchange Online ATP
  • Configuring Exchange ATP policies
  • Investigating malicious activity patterns
3. Implementing Azure Advanced Threat Protection (ATP)
  • Planning your Azure ATP capacity
  • Creating your Azure ATP instance
  • Investigating alerts and user activities
  • Identifying suspicious activities and advanced attacks
4. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)
  • How ATA Works
  • Planning your ATA deployment
  • Deploy ATA in six steps
  • Working with suspicious activities
  • Managing ATA telemetry and settings
5. Protecting Cloud Identities in Azure AD
  • What is Azure AD Identity Protection?
  • Configure risk levels and policies
  • Investigating risk events
  • Set up notification and simulate risk events
6. Defending Against Advanced Threats with Windows
  • Overview of Windows Defender ATP
  • Assigning user access to the ATP portal
  • Investigating alerts in the ATP portal
  • Taking response actions in Defender ATP
  • Automated investigation and response
  • Advanced hunting
7. Managing Privileged Access in Azure
  • What is Azure AD Privileged Identity Management (PIM)?
  • Managing privileged role membership
  • Privileged role activation and management
  • Performing an access review
Conclusion
  • Next steps

Taught by

Pete Zerger

Reviews

Start your review of Microsoft Cybersecurity Stack: Advanced Identity and Endpoint Protection

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.