We may earn an affiliate commission when you visit our partners.
Robert McMillen

This course will teach you how to prepare for the MS-500 certification exam and to secure your devices through Microsoft applications and utilities.

Read more

This course will teach you how to prepare for the MS-500 certification exam and to secure your devices through Microsoft applications and utilities.

In this course, Protecting Devices and Applications in Microsoft 365, you’ll learn to protect your Windows 10 and mobile devices from advanced threats using Microsoft applications and utilities. First, you’ll explore Microsoft Defender application protection features. Next, you’ll discover encryption and secure booting procedures. Finally, you’ll learn how to create policies to protect Windows 10 and mobile devices in your environment. When you’re finished with this course, you’ll have the skills and knowledge of Windows security needed to protect your endpoints and pass the device and application protection portion of the MS-500 certification exam.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Configuring Microsoft Defender
Securing Windows and Mobile Devices
Using Application Protection
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills and knowledge in protecting Windows 10 and mobile devices from advanced threats, which is core for enterprise security
Teaches foundational Windows security concepts, which helps with protecting endpoints
Teaches specific Microsoft applications and utilities, which is standard in industry practices
Prepares for the Microsoft MS-500 certification exam, which may be valuable for career advancement
Taught by Robert McMillen, who may not be a recognized expert on device and application protection

Save this course

Save Protecting Devices and Applications in Microsoft 365 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Protecting Devices and Applications in Microsoft 365 with these activities:
Document your security findings
To manage updates for multiple devices, you will need to first catalog all the devices, their current updates, and your priorities.
Browse courses on Security Findings
Show steps
  • Gather information about your devices, including make, model, and operating system
  • Determine the current update status of each device
  • Prioritize the devices that need to be updated
  • Create a plan for updating the devices
  • Document your findings
Review Microsoft Defender
To resolve advanced threats using Microsoft Defender, you need to review this skill first.
Browse courses on Microsoft Defender
Show steps
  • Define Microsoft Defender and its purpose
  • Identify the weaknesses of threats that Microsoft Defender can handle
  • Describe some examples of threats that Microsoft Defender can handle
  • Describe some examples of threats that Microsoft Defender cannot handle
Practice Windows Update
Malware exploits outdate software. Practice Windows Update to keep all your software up to date.
Browse courses on Windows Update
Show steps
  • Check for and install Windows updates regularly
  • Configure Windows Update settings
Six other activities
Expand to see all activities and additional details
Show all nine activities
Walk-through Microsoft Anti-Malware
Microsoft offers a free anti-malware tool that can be used to further protect your devices. Walk through this Microsoft Anti-Malware to patch security holes on your devices.
Browse courses on Microsoft Defender
Show steps
  • Download and install Microsoft Anti-Malware
  • Run a full scan of your computer
  • Review the scan results and take appropriate action
Manage BitLocker
BitLocker can be used to protect the data on your computer. Manage BitLocker to further protect your devices.
Browse courses on BitLocker
Show steps
  • Determine if your computer supports BitLocker
  • Enable BitLocker on your computer
  • Create a recovery key
  • Test BitLocker
  • Suspend or resume BitLocker
Join an online security forum
Engage in discussions on security topics. This will broaden your knowledge.
Browse courses on Security
Show steps
  • Join an online security forum
  • Participate in discussions
  • Ask questions and share your knowledge
Attend a security conference
Attend a security conference to learn about the latest security trends and meet other security professionals.
Browse courses on Networking
Show steps
  • Research security conferences
  • Register for a conference
  • Attend the conference
  • Network with other security professionals
  • Learn about the latest security trends
Create a blog or video series about security
Write a blog or create a video series about your security journey to increase your knowledge and share it with others.
Browse courses on Blog
Show steps
  • Choose a topic
  • Research your topic
  • Write your blog post or create your video
  • Publish your content
  • Promote your content
Build a sandbox
A sandbox can be used to test applications in a controlled environment. Build a サンドボックス to test some applications to verify if there are any security holes.
Show steps
  • Set up a virtual machine
  • Install the necessary software
  • Configure the sandbox
  • Test applications in the sandbox

Career center

Learners who complete Protecting Devices and Applications in Microsoft 365 will develop knowledge and skills that may be useful to these careers:
IT Auditor
IT Auditors review an organization's computer networks and systems to assess their security. They identify vulnerabilities and threats, and they make recommendations for improvements. This course may be useful for IT Auditors because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Information Security Analyst
Information Security Analysts design and implement security measures to protect an organization's computer networks and systems. They monitor and analyze security systems for vulnerabilities and threats, and they develop and implement security policies and procedures to prevent unauthorized access to data and systems. This course may be useful for Information Security Analysts because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Risk Analyst
Risk Analysts assess the risks associated with an organization's computer networks and systems. They identify vulnerabilities and threats, and they make recommendations for improvements. This course may be useful for Risk Analysts because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems. They work with other IT professionals to develop and implement security policies and procedures, and they oversee the implementation of security technologies. This course may be useful for Security Engineers because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Security Analyst
Security Analysts monitor and analyze security systems for vulnerabilities and threats. They develop and implement security policies and procedures to prevent unauthorized access to data and systems. This course may be useful for Security Analysts because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems. They monitor and analyze network traffic for suspicious activity, and they develop and implement security policies and procedures to prevent unauthorized access to data and systems. This course may be useful for Network Security Engineers because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their computer networks and systems from security threats. They assess an organization's security needs, and they develop and implement security plans and procedures. This course may be useful for Security Consultants because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems. They monitor and analyze security systems for vulnerabilities and threats, and they develop and implement security policies and procedures to prevent unauthorized access to data and systems. This course may be useful for Cybersecurity Engineers because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Penetration Tester
Penetration Testers assess the security of computer networks and systems by simulating attacks. They identify vulnerabilities and threats, and they make recommendations for improvements. This course may be useful for Penetration Testers because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Information Security Manager
Information Security Managers are responsible for the day-to-day security of an organization's computer networks and systems. They implement security policies and procedures, and they oversee the implementation of security technologies. This course may be useful for Information Security Managers because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Security Architect
Security Architects design and implement security measures to protect an organization's computer networks and systems. They work with other IT professionals to develop and implement security policies and procedures, and they oversee the implementation of security technologies. This course may be useful for Security Architects because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Chief Technology Officer (CTO)
Chief Technology Officers (CTOs) are responsible for the overall technology strategy of an organization. They oversee the development and implementation of new technologies, and they ensure that the organization's technology infrastructure is secure and reliable. This course may be useful for CTOs because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Chief Information Officer (CIO)
Chief Information Officers (CIOs) are responsible for the overall information technology strategy of an organization. They oversee the development and implementation of new technologies, and they ensure that the organization's information technology infrastructure is secure and reliable. This course may be useful for CIOs because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's computer networks and systems. They develop and implement security policies and procedures, and they oversee the implementation of security technologies. This course may be useful for CISOs because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.
IT Security Specialist
IT Security Specialists design, implement, and maintain security measures to protect an organization's computer networks and systems. They work with other IT professionals to develop and implement security policies and procedures, and they oversee the implementation of security technologies. This course may be useful for IT Security Specialists because it teaches how to protect devices and applications from advanced threats using Microsoft applications and utilities.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Protecting Devices and Applications in Microsoft 365.
Delves into advanced security concepts and techniques for Windows servers. It covers topics such as kernel security, memory protection, and cryptographic technologies, providing valuable insights for individuals seeking a deeper understanding of Windows security.
Focuses specifically on securing Windows 10 devices and systems. It provides practical guidance on implementing security measures such as device encryption, firewall configuration, and malware protection, offering valuable insights for this course.
Provides a comprehensive overview of cybersecurity principles and practices, covering topics such as risk management, incident response, and cloud security. While not specifically focused on Microsoft technologies, it offers a holistic view of cybersecurity concepts and challenges.
Provides a comprehensive overview of cloud security, covering topics such as cloud architecture, security controls, and compliance. While not specifically focused on Microsoft Azure, it offers valuable insights into the security considerations and best practices for cloud computing environments.
This textbook provides a comprehensive overview of cryptography and network security principles and practices. While not specifically focused on Microsoft technologies, it offers a strong foundation for understanding the underlying concepts and algorithms used in modern security systems.
This comprehensive book provides a deep dive into the internal workings of Microsoft Windows operating systems. While not directly related to the course topics, it offers valuable background knowledge for understanding the security mechanisms and features of Windows.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Protecting Devices and Applications in Microsoft 365.
Windows Endpoint Administration: Manage Applications
Most relevant
Windows Endpoint Administration: Manage, Maintain, and...
Most relevant
Managing iOS and Android Mobile Devices with Microsoft...
Most relevant
Ethical Hacking: Hacking Mobile Platforms
Most relevant
Protect Windows Devices with Microsoft Intune
Most relevant
Introduction to Microsoft Intune
Most relevant
Windows Server 2022: Secure On-premises and Hybrid...
Most relevant
Managing Windows 10/11 Devices and Data
Most relevant
Configuring Windows 10/11 Connectivity and Storage
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser