- Platform
- edX
- Provider
- Microsoft
- Effort
- 2-4 hours/week
- Length
- 4 weeks
- Language
- English
- Credentials
- Paid Certificate Available
- Part of
- Course Link
Overview
This course is part of the Microsoft Professional Program in Cybersecurity.
By 2021, worldwide cybercrime damage is expected to reach $6 trillion—double what it cost businesses in 2015. Unapproved apps, unmanaged devices, poor password protection, and other security issues are leaving far too many organizations vulnerable to attack. And as organizations embrace digital transformation, it becomes increasingly urgent for the organization to increase control over their IT infrastructure and reduce security risks.
This course is an overview of threat detection as part of a defense in-depth strategy. You will learn how to protect, detect, and respond to cybercrime as you explore the capabilities of threat detection and mitigation tools.
What you'll learn
After completing this course, students will be able to:
Taught by
Marcin Policht
This course is part of the Microsoft Professional Program in Cybersecurity.
By 2021, worldwide cybercrime damage is expected to reach $6 trillion—double what it cost businesses in 2015. Unapproved apps, unmanaged devices, poor password protection, and other security issues are leaving far too many organizations vulnerable to attack. And as organizations embrace digital transformation, it becomes increasingly urgent for the organization to increase control over their IT infrastructure and reduce security risks.
This course is an overview of threat detection as part of a defense in-depth strategy. You will learn how to protect, detect, and respond to cybercrime as you explore the capabilities of threat detection and mitigation tools.
What you'll learn
After completing this course, students will be able to:
- Describe signature-based and behavioral / heuristic detection methods
- List the capabilities of on-premise threat detection and mitigation tools
- Name the capabilities of hybrid and cloud threat detection and mitigation tools
- Recognize the importance of Enterprise threat detection monitoring
Syllabus
Module 1 Introduction to threat detection as part of the defense in-depth strategy
Module 1 Introduction to threat detection as part of the defense in-depth strategy
- An overview of the modern cyber threat landscape
- Integrating pre-breach and post-breach approaches to mitigate cyber threats
- Comparing signature-based and behavioral/heuristic detection methods
- Combating threat persistence
- Windows Defender Advanced Threat Protection
- Microsoft Advanced Threat Analytics
- Microsoft Enterprise Threat Detection
- Microsoft Security Risk Detection
- Antimalware Scan Interface
- Logging and Auditing
- Threat detection tools
- Office 365 Advanced Threat Protection
- Office 365 Cloud App Security and Microsoft Cloud App Security
- Azure Advanced Threat Detection
- Azure Active Directory Identity Protection
- Azure Active Directory Identity Threat Detection
- Microsoft Operations Management Suite (OMS)
- Azure Security Center
- Advanced Threat Detection Features - Other Azure Services
- Third-party ATD capabilities through Azure Marketplace
- Azure Logging and Auditing
- Microsoft 365
- Detecting persistent threats by using Windows Defender Advanced Threat Protection and Advanced Threat Analytics
- Enterprise Threat Detection behavioral monitoring
Taught by
Marcin Policht