MD-102: Protecting Devices with Microsoft Defender for Endpoint

Microsoft Endpoint    |    Intermediate
  • 3 videos | 1h 2m 40s
  • Includes Assessment
  • Earns a Badge
In this course, you will explore the process of onboarding devices into Microsoft 365 Defender for Endpoint (MDE), an enterprise-level, scalable endpoint security platform that provides protection against advanced network threats, attack surface reduction, and threat investigations. Then you will investigate endpoint detection, response, and automated investigation and remediations in Microsoft 365 Defender for Endpoint, in order to strengthen your organization's security posture. Finally, you will learn how to use the Microsoft Defender Vulnerability Management dashboard to identify, examine, and respond to device issues. This course is part of a series that prepares the learner for the MD-102: Endpoint Administrator exam.

WHAT YOU WILL LEARN

  • Supply an overview of the process of onboarding devices into microsoft 365 defender for endpoint
    offer an overview of the process of onboarding devices into microsoft 365 defender for endpoint
    provide an overview of the process of onboarding devices into microsoft 365 defender for endpoint
    Recollect key concepts of endpoint detection, response, and automated investigation and remediations in microsoft 365 defender for endpoint
    reflect key concepts of endpoint detection, response, and automated investigation and remediations in microsoft 365 defender for endpoint
  • recall key concepts of endpoint detection, response, and automated investigation and remediations in microsoft 365 defender for endpoint
    Utilize the microsoft defender vulnerability management dashboard to identify, examine, and respond to device issues
    use the microsoft defender vulnerability management dashboard to identify, examine, and respond to device issues
    apply the microsoft defender vulnerability management dashboard to identify, examine, and respond to device issues

IN THIS COURSE

  • Locked
    1.  Onboard Devices into Defender for Endpoint
    22m 47s
    After completing this video, you will be able to provide an overview of the process of onboarding devices into Microsoft 365 Defender for Endpoint. FREE ACCESS
  • Locked
    2.  Use Automated Response in Defender for Endpoint
    21m 11s
    Upon completion of this video, you will be able to recall key concepts of endpoint detection, response, and automated investigation and remediations in Microsoft 365 Defender for Endpoint. FREE ACCESS
  • Locked
    3.  Use the Microsoft Defender Vulnerability Management Dashboard
    18m 43s
    In this video, find out how to use the Microsoft Defender Vulnerability Management dashboard to identify, examine, and respond to device issues. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.8 of 29 users Rating 4.8 of 29 users (29)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)