Protecting Endpoints with Microsoft Defender Advanced Threat Protection

Protecting Endpoints with Microsoft Defender Advanced Threat Protection

.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 13m | 297 MB

Instructor: Rishalin Pillay
The cyber threat landscape has evolved whereby attackers are using sophistication to attack endpoints. Protecting these endpoints is crucial to any organization. This course will teach you how to deploy, maintain, and monitor Microsoft Defender ATP.

When attackers target organizations, they often end up targeting endpoints since these form an easy entry point into an organization. Attackers make use of sophisticated techniques that range from malware, credential theft techniques, and much more. In this course, Protecting Endpoints with Microsoft Defender Advanced Threat Protection, you'll gain the ability to protect these endpoints by ensuring that you can perform endpoint detection and response, which is crucial to any organization. First, you'll explore the components of Microsoft Defender ATP, how to properly plan and implement the solution based on different architectures, and how to manage and monitor the solution in response to various real world threats that span the cyber attack landscape. Next, you'll discover major topics like integration of Microsoft Defender ATP into the Microsoft ATP Ecosystem. Finally, you'll explore endpoint detection and response, automated investigations, advanced hunting, and threat and vulnerability management. When you are completed with this course, you will have the skills and knowledge needed to protect your organization from advanced attacks using Microsoft Defender ATP. Before you begin with this course, you should have a good understanding of common techniques used within endpoint detection and response, incident investigation, and remediation.


[Fast Download] Protecting Endpoints with Microsoft Defender Advanced Threat Protection

Related eBooks:
America's Most Haunted
Blockchain: Empowering Secure Data Sharing
Fear the Reaper
What Every Body Is Saying
HCI for Cybersecurity, Privacy and Trust
Handbook of Research on Globalized Agricultural Trade and New Challenges for Food Security
Firefighter Exam For Dummies
The Mobile Application Hacker's Handbook
The Transparent Traveler: The Performance and Culture of Airport Security
Metasploit Penetration Testing Cookbook
Foundations of Information Security: A Straightforward Introduction
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.