Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

SC-200: Mitigate threats using Microsoft Defender XDR

Description

Module 1: Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data.In this module, you will learn how to:Define security threats.Understand common threats.Explain how the threat landscape is evolving.Module 2: Mitigate incidents using Microsoft 365 DefenderUpon completion of this module, the learner will be able to:Manage incidents in Microsoft 365 DefenderInvestigate incidents in Microsoft 365 DefenderConduct advanced hunting in Microsoft 365 DefenderModule 3: Use the advanced detection and remediation of identity-based threats to protect your Azure Active Directory identities and applications from compromise.In this module, you will:Describe the features of Azure Active Directory Identity Protection.Describe the investigation and remediation features of Azure Active Directory Identity Protection.Module 4: Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender.In this module, you will learn how to:Define the capabilities of Microsoft Defender for Office 365.Understand how to simulate attacks within your network.Explain how Microsoft Defender for Office 365 can remediate risks in your environment.Module 5: Learn about the Microsoft Defender for Identity component of Microsoft 365 Defender.Upon completion of this module, you should be able to:Define the capabilities of Microsoft Defender for Identity.Understand how to configure Microsoft Defender for Identity sensors.Explain how Microsoft Defender for Identity can remediate risks in your environment.Module 6: Microsoft Defender for Cloud Apps is a cloud access security broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services. Learn how to use Defender for Cloud Apps in your organization.At the end of this module, you should be able to:Define the Defender for Cloud Apps frameworkExplain how Cloud Discovery helps you see what's going on in your organizationUnderstand how to use Conditional Access App Control policies to control access to the apps in your organizationModule 7: Respond to data loss prevention alerts using Microsoft 365Upon completion of this module, the learner will be able to:Describe data loss prevention (DLP) components in Microsoft 365Investigate DLP alerts in the Microsoft 365 compliance centerInvestigate DLP alerts in Microsoft Defender for Cloud AppsModule 8: Insider risk management in Microsoft 365 helps organizations address internal risks, such as IP theft, fraud, and sabotage. Learn about insider risk management and how Microsoft technologies can help you detect, investigate, and take action on risky activities in your organization.Upon completion of this module, you should be able to:Explain how insider risk management in Microsoft 365 can help prevent, detect, and contain internal risks in an organization.Describe the types of built-in, pre-defined policy templates.List the prerequisites that need to be met before creating insider risk policies.Explain the types of actions you can take on an insider risk management case.

Tags

Syllabus

Syllabus Module 1: Introduction to threat protection with Microsoft 365Introduction to threat protectionLearn about common threatsUnderstand the evolving threat landscapeSummary and knowledge checkModule 2: Mitigate incidents using Microsoft 365 DefenderIntroductionUse the Microsoft 365 Defender portalManage incidentsInvestigate incidentsUse the action centerConduct advanced huntingKnowledge checkSummary and resourcesModule 3: Protect your identities with Azure AD Identity ProtectionIntroductionAzure AD Identity Protection overviewDetect risks with Azure AD Identity Protection policiesInvestigate and remediate risks detected by Azure AD Identity ProtectionSummaryModule 4: Remediate risks with Microsoft Defender for Office 365Introduction to Microsoft Defender for Office 365Automate, investigate, and remediateConfigure, protect, and detectSimulate attacksSummary and knowledge checkModule 5: Safeguard your environment with Microsoft Defender for IdentityIntroduction to Microsoft Defender for IdentityConfigure Microsoft Defender for Identity sensorsReview compromised accounts or dataIntegrate with other Microsoft toolsSummary and knowledge checkModule 6: Secure your cloud apps and services with Microsoft Defender for Cloud AppsIntroductionUnderstand the Defender for Cloud Apps FrameworkExplore your cloud apps with Cloud DiscoveryProtect your data and apps with Conditional Access App ControlWalk through discovery and access control with Microsoft Defender for Cloud AppsClassify and protect sensitive informationDetect ThreatsKnowledge checkSummaryModule 7: Respond to data loss prevention alerts using Microsoft 365IntroductionDescribe data loss prevention alertsInvestigate data loss prevention alerts in Microsoft 365 complianceInvestigate data loss prevention alerts in Microsoft Defender for Cloud AppsKnowledge checkSummary and resourcesModule 8: Manage insider risk in Microsoft 365Insider risk management overviewIntroduction to managing insider risk policiesCreate and manage insider risk policiesKnowledge checkInvestigate insider risk alertsTake action on insider risk alerts through casesSummary and knowledge check Read more


SC-200: Mitigate threats using Microsoft Defender XDR

Affiliate notice

Module 1: Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data.In this module, you will learn how to:Define security threats.Understand common threats.Explain how the threat landscape is evolving.Module 2: Mitigate incidents using Microsoft 365 DefenderUpon completion of this module, the learner will be able to:Manage incidents in Microsoft 365 DefenderInvestigate incidents in Microsoft 365 DefenderConduct advanced hunting in Microsoft 365 DefenderModule 3: Use the advanced detection and remediation of identity-based threats to protect your Azure Active Directory identities and applications from compromise.In this module, you will:Describe the features of Azure Active Directory Identity Protection.Describe the investigation and remediation features of Azure Active Directory Identity Protection.Module 4: Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender.In this module, you will learn how to:Define the capabilities of Microsoft Defender for Office 365.Understand how to simulate attacks within your network.Explain how Microsoft Defender for Office 365 can remediate risks in your environment.Module 5: Learn about the Microsoft Defender for Identity component of Microsoft 365 Defender.Upon completion of this module, you should be able to:Define the capabilities of Microsoft Defender for Identity.Understand how to configure Microsoft Defender for Identity sensors.Explain how Microsoft Defender for Identity can remediate risks in your environment.Module 6: Microsoft Defender for Cloud Apps is a cloud access security broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services. Learn how to use Defender for Cloud Apps in your organization.At the end of this module, you should be able to:Define the Defender for Cloud Apps frameworkExplain how Cloud Discovery helps you see what's going on in your organizationUnderstand how to use Conditional Access App Control policies to control access to the apps in your organizationModule 7: Respond to data loss prevention alerts using Microsoft 365Upon completion of this module, the learner will be able to:Describe data loss prevention (DLP) components in Microsoft 365Investigate DLP alerts in the Microsoft 365 compliance centerInvestigate DLP alerts in Microsoft Defender for Cloud AppsModule 8: Insider risk management in Microsoft 365 helps organizations address internal risks, such as IP theft, fraud, and sabotage. Learn about insider risk management and how Microsoft technologies can help you detect, investigate, and take action on risky activities in your organization.Upon completion of this module, you should be able to:Explain how insider risk management in Microsoft 365 can help prevent, detect, and contain internal risks in an organization.Describe the types of built-in, pre-defined policy templates.List the prerequisites that need to be met before creating insider risk policies.Explain the types of actions you can take on an insider risk management case.

Syllabus Module 1: Introduction to threat protection with Microsoft 365Introduction to threat protectionLearn about common threatsUnderstand the evolving threat landscapeSummary and knowledge checkModule 2: Mitigate incidents using Microsoft 365 DefenderIntroductionUse the Microsoft 365 Defender portalManage incidentsInvestigate incidentsUse the action centerConduct advanced huntingKnowledge checkSummary and resourcesModule 3: Protect your identities with Azure AD Identity ProtectionIntroductionAzure AD Identity Protection overviewDetect risks with Azure AD Identity Protection policiesInvestigate and remediate risks detected by Azure AD Identity ProtectionSummaryModule 4: Remediate risks with Microsoft Defender for Office 365Introduction to Microsoft Defender for Office 365Automate, investigate, and remediateConfigure, protect, and detectSimulate attacksSummary and knowledge checkModule 5: Safeguard your environment with Microsoft Defender for IdentityIntroduction to Microsoft Defender for IdentityConfigure Microsoft Defender for Identity sensorsReview compromised accounts or dataIntegrate with other Microsoft toolsSummary and knowledge checkModule 6: Secure your cloud apps and services with Microsoft Defender for Cloud AppsIntroductionUnderstand the Defender for Cloud Apps FrameworkExplore your cloud apps with Cloud DiscoveryProtect your data and apps with Conditional Access App ControlWalk through discovery and access control with Microsoft Defender for Cloud AppsClassify and protect sensitive informationDetect ThreatsKnowledge checkSummaryModule 7: Respond to data loss prevention alerts using Microsoft 365IntroductionDescribe data loss prevention alertsInvestigate data loss prevention alerts in Microsoft 365 complianceInvestigate data loss prevention alerts in Microsoft Defender for Cloud AppsKnowledge checkSummary and resourcesModule 8: Manage insider risk in Microsoft 365Insider risk management overviewIntroduction to managing insider risk policiesCreate and manage insider risk policiesKnowledge checkInvestigate insider risk alertsTake action on insider risk alerts through casesSummary and knowledge check Read more