We may earn an affiliate commission when you visit our partners.
Brian Alderman

This course teaches you how to manage security reports and alerts by using the Microsoft 365 Defender portal. You'll learn to implement and manage email and collaboration protection, and implement and manage endpoint protection.

Read more

This course teaches you how to manage security reports and alerts by using the Microsoft 365 Defender portal. You'll learn to implement and manage email and collaboration protection, and implement and manage endpoint protection.

In order to protect M365 accounts and resources, you’ll need to implement robust security measures, respond to threats, and manage endpoint protection efficiently. In this course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, you’ll learn how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection, all configured and managed using Defender for Microsoft 365. First, you’ll explore how to manage the Microsoft Secure Score, and respond to security incidents, issues, threats, and alerts in the Microsoft 365 Defender portal. Next, you’ll discover how to implement policies and rules, review and respond to threats, and perform attack simulations. Finally, you’ll learn how to configure Defender for Endpoint settings, review and respond to endpoint vulnerabilities, as well as risks identified in the Microsoft Defender Vulnerability Management dashboard. When you’re finished with this course, you’ll have the skills and knowledge to successfully implement security and threats, respond to those threats, implement policies and rules, unblock users, and manage endpoint protection using Microsoft Defender, which is all needed to protect your M365 accounts and resources.

Enroll now

What's inside

Syllabus

Course Overview
Managing Security Reports and Threats Using the Microsoft 365 Defender Portal
Implementing and Managing Email and Collaboration Protection
Read more
Implementing and Managing Endpoint Protection
Course Review

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches how to effectively use M365 security features, including security score, threat investigation, threat simulation, and vulnerability management
Provides skills for managing endpoint protection settings, reviewing endpoint vulnerabilities, and managing risks using Microsoft Defender Vulnerability Management
Suitable for professionals responsible for protecting M365 accounts and resources, such as IT administrators and security analysts
Offers no prior prerequisites, making it accessible to learners without extensive background knowledge

Save this course

Save Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR with these activities:
Gather and organize course materials
Staying organized throughout the course will help you retain knowledge and save time during the course and after.
Show steps
  • Gather lecture materials including videos, slides, assignments, and practice questions
  • Organize and review lecture materials regularly
Review Microsoft Defender for Endpoint settings
Reviewing Microsoft Defender for Endpoint settings will make it easier to configure endpoint protection after the course.
Show steps
  • Review Microsoft Defender for Endpoint settings documentation
Learn or review email threat protection concepts
Having strong familiarity with email threat protection will help you better understand the concepts taught throughout the course.
Show steps
  • Review email protection concepts from Microsoft's documentation
Two other activities
Expand to see all activities and additional details
Show all five activities
Practice responding to simulated security incidents
This course teaches you to respond to security incidents. Practicing on simulated incidents will prepare you for real incidents on the job.
Show steps
  • Find resources for practicing responding to simulated security incidents
  • Practice responding to simulated security incidents
Connect with cybersecurity professionals as mentors
Mentors can provide guidance, support, and opportunities to expand your knowledge of this topic beyond this course.
Show steps
  • Seek out cybersecurity professionals on networking platforms
  • Build professional connections with potential mentors

Career center

Learners who complete Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
Security Engineer
A Security Engineer is responsible for designing, implementing, and maintaining an organization's security systems. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
Network Security Engineer
A Network Security Engineer is responsible for designing, implementing, and maintaining an organization's network security systems. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
Security Consultant
A Security Consultant is responsible for providing security advice and guidance to organizations. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for providing organizations with the knowledge and tools they need to protect their data and systems from cyber threats.
Security Architect
A Security Architect is responsible for designing and implementing an organization's security strategy. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
IT Security Specialist
An IT Security Specialist is responsible for managing an organization's IT security systems and infrastructure. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
Security Manager
A Security Manager is responsible for managing an organization's security program. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
Cloud Security Architect
A Cloud Security Architect is responsible for designing, implementing, and maintaining an organization's cloud security systems. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for protecting an organization's computer networks and systems from cyber attacks. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for overseeing an organization's security program. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can help you prepare for this role by teaching you how to manage security reports and alerts, implement and manage email and collaboration protection, and implement and manage endpoint protection. These skills are essential for protecting an organization's data and systems from cyber threats.
Chief Technology Officer (CTO)
A Chief Technology Officer (CTO) is responsible for overseeing an organization's technology strategy. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can be helpful in preparing for this role by providing a foundation in security management.
Systems Administrator
A Systems Administrator is responsible for managing an organization's computer systems and networks. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can be helpful in preparing for this role by providing a foundation in security management.
Chief Operating Officer (COO)
A Chief Operating Officer (COO) is responsible for overseeing the day-to-day operations of an organization, including its security strategy. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can be helpful in preparing for this role by providing a foundation in security management.
Chief Executive Officer (CEO)
A Chief Executive Officer (CEO) is responsible for overseeing all aspects of an organization, including its security strategy. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can be helpful in preparing for this role by providing a foundation in security management.
Computer Network Architect
A Computer Network Architect is responsible for designing and implementing an organization's computer networks. This course, Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR, can be helpful in preparing for this role by providing a foundation in security management.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR.
Provides a comprehensive guide to malware analysis, including techniques for reverse engineering and analyzing malware samples.
Provides a comprehensive overview of Microsoft's threat protection capabilities, including Microsoft Defender for Endpoint.
Provides a comprehensive overview of cloud security, including its challenges, risks, and best practices.
Provides a comprehensive overview of security engineering, a discipline that focuses on designing and building secure systems. It valuable resource for anyone who wants to learn more about how to protect their systems from security threats.
Provides a comprehensive overview of threat modeling, a process for identifying and mitigating security threats. It valuable resource for anyone who wants to learn more about designing secure systems.
Provides an insider's look at the art of deception, a technique that can be used to exploit human vulnerabilities and gain access to sensitive information. It valuable resource for anyone who wants to learn more about how to protect themselves from social engineering attacks.
Provides a hands-on guide to penetration testing, a process for identifying and exploiting vulnerabilities in computer systems. It valuable resource for anyone who wants to learn more about how to protect their systems from hackers.
Provides a comprehensive overview of cryptography, a discipline that focuses on the design and analysis of secure communication systems. It valuable resource for anyone who wants to learn more about how to protect their data from eavesdropping and other security threats.
Provides a comprehensive overview of cybersecurity, a field that focuses on the protection of computer systems and networks from security threats. It valuable resource for anyone who wants to learn more about how to protect their systems from cyber attacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft 365 Administration: Managing Security Using Microsoft Defender XDR.
Microsoft 365 Security Management Fundamentals
Most relevant
Mitigate Threats Using Microsoft Defender
Most relevant
Implementing and Managing Microsoft Defender for O365
Most relevant
Microsoft 365 Administration: Managing Compliance Using...
Most relevant
Mitigate Threats Using Microsoft 365 Defender
Most relevant
Protecting Devices and Applications in Microsoft 365
Most relevant
Implementing and Managing Microsoft Defender for Endpoint
Most relevant
Protect Windows Devices with Microsoft Intune
Most relevant
Microsoft Information Protection and Compliance:...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser