Defend against cyberthreats with Microsoft Defender XDR (SC-5004) - Training Courses | Afi U.
afiU logo
Guaranteed to Run sessions View all courses
Training and Coaching

Cultivate a learning organization and develop talent.

Customer Experience

Optimize your processes for operational excellence.

Employee Experience

Engage, empower, and enhance employee well-being.

Artificial Intelligence

Master AI and automate your processes.

Leadership

Develop key skills to inspire and mobilize.

Digital Tools

Boost collaboration and productivity within your teams

Strategy and Performance

Align your goals for sustainable growth.

Digital Transformation

Leverage technology to innovate and accelerate your growth.

New

Defend against cyberthreats with Microsoft Defender XDR (SC-5004)

Private session

This training is available in a private or personalized format. It can be provided in one of our training centres or at your offices. Call one of our consultants of submit a request online.

Call now at 1 877 624.2344

  • Duration: 1 day
  • Regular price: On request

Course outline

Duration : 1 Day

© AFI Expertise inc.

Deploy Microsoft Defender for Endpoint to manage devices, investigate endpoints, handle incidents with Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect specific threats.

Audience

  • Security Professionals
  • SOC Analysts (Security Operations Center)
  • System and Network Administrators
  • Cybersecurity Engineers
  • IT Professionals
  • Security Consultants

Prerequisites

  • Experience using the Microsoft Defender portal
  • Basic understanding of Microsoft Defender for Endpoint
  • Basic understanding of Microsoft Sentinel
  • Experience using Kusto Query Language (KQL) in Microsoft Sentinel

Objectives

  • Understanding Microsoft Defender XDR
  • Threat Detection and Investigation
  • Configuring and Managing Defender Solutions
  • Incident Response Techniques
  • Integration with Security Operations
  • Using Advanced Threat Protection Features
  • Implementing Best Practices

Teaching method

  • Instructor-Led Training (ILT)
  • Hands-On Labs
  • Interactive Demonstrations
  • Scenario-Based Learning
  • Group Activities
  • Q&A Sessions
  • Supplementary Resources

Contents

  • Mitigate incidents using Microsoft Defender
  • Deploy the Microsoft Defender for Endpoint environment
  • Configure for alerts and detections in Microsoft Defender for Endpoint
  • Configure and manage automation using Microsoft Defender for Endpoint
  • Perform device investigations in Microsoft Defender for Endpoint
  • Defend against Cyberthreats with Microsoft Defender XDR lab exercises