Explore security metrics in Microsoft 365

Go to class
Write Review

Free Online Course: Explore security metrics in Microsoft 365 provided by Microsoft Learn is a comprehensive online course, which lasts for 3-4 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Examine threat vectors and data breaches
    • By the end of this module, you will be able to:

      • Describe techniques hackers use to compromise user accounts through email
      • Describe techniques hackers use to gain control over resources
      • Describe techniques hackers use to compromise data
      • Mitigate an account breach
      • Prevent an elevation of privilege attack
      • Prevent data exfiltration, data deletion, and data spillage
    • Module 2: Explore the Zero Trust security model
    • By the end of this module, you will be able to:

      • Describe the Zero Trust approach to security in Microsoft 365
      • Describe the principles and components of the Zero Trust security model
      • Describe the five steps to implementing a Zero Trust security model in your organization
      • Explain Microsoft's story and strategy around Zero Trust networking
    • Module 3: Explore security solutions in Microsoft 365
    • By the end of this module, you will be able to:

      • Identify the features of Microsoft Defender for Office 365 that enhance email security in a Microsoft 365 deployment
      • Explain how Microsoft Defender for Identity identifies, detects, and investigates advanced threats, compromised identities, and malicious insider actions directed at your organization
      • Explain how Microsoft Defender for Endpoint helps enterprise networks prevent, detect, investigate, and respond to advanced threats
      • Describe how Microsoft 365 Threat Intelligence can be beneficial to your organization’s security officers and administrators
      • Describe how Microsoft Cloud App Security enhances visibility and control over your Microsoft 365 tenant through three core areas
    • Module 4: Examine Microsoft Secure Score
    • By the end of this module, you will be able to:

      • Describe the benefits of Secure Score and what kind of services can be analyzed
      • Describe how to collect data using the Secure Score API
      • Describe how to use the tool to identify gaps between your current state and where you would like to be regarding security
      • Identify actions that will increase your security by mitigating risks
      • Explain where to look to determine the threats each action will mitigate and the impact it has on users
    • Module 5: Examine Privileged Identity Management
    • By the end of this module, you will be able to:

      • Describe how Privileged Identity Management enables you to manage, control, and monitor access to important resources in your organization
      • Configure Privileged Identity Management for use in your organization
      • Describe how Privileged Identity Management audit history enables you to see all the user assignments and activations within a given time period for all privileged roles
      • Explain how Microsoft Identity Manager helps organizations manage the users, credentials, policies, and access within their organizations and hybrid environments
      • Explain how Privileged Access Management provides granular access control over privileged admin tasks in Microsoft 365
    • Module 6: Examine Azure Identity Protection
    • By the end of this module, you will be able to:

      • Describe Azure Identity Protection (AIP) and what kind of identities can be protected
      • Enable the three default protection policies in AIP
      • Identify the vulnerabilities and risk events detected by AIP
      • Plan your investigation in protecting cloud-based identities
      • Plan how to protect your Azure Active Directory environment from security breaches

Syllabus
    • Module 1: Examine threat vectors and data breaches
      • Introduction
      • Explore today's work and threat landscape
      • Examine how phishing retrieves sensitive information
      • Examine how spoofing deceives users and compromises data security
      • Compare spam and malware
      • Examine how an account breach compromises a user account
      • Examine elevation of privilege attacks
      • Examine how data exfiltration moves data out of your tenant
      • Examine how attackers delete data from your tenant
      • Examine how data spillage exposes data outside your tenant
      • Examine other types of attacks
      • Knowledge check
      • Summary
    • Module 2: Explore the Zero Trust security model
      • Introduction
      • Examine the principles and components of the Zero Trust model
      • Plan for a Zero Trust security model in your organization
      • Examine Microsoft's strategy for Zero Trust networking
      • Adopt a Zero Trust approach
      • Knowledge check
      • Summary
    • Module 3: Explore security solutions in Microsoft 365
      • Introduction
      • Enhance your email security using Microsoft Defender for Office 365
      • Protect your organization's identities using Microsoft Defender for Identity
      • Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint
      • Protect against cyber attacks using Microsoft 365 Threat Intelligence
      • Provide insight into suspicious activity using Microsoft Cloud App Security
      • Knowledge check
      • Summary
    • Module 4: Examine Microsoft Secure Score
      • Introduction
      • Explore Microsoft Secure Score
      • Examine the Secure Score Dashboard
      • Collect Secure Score data using the Secure Score API
      • Improve your security posture
      • Knowledge check
      • Summary
    • Module 5: Examine Privileged Identity Management
      • Introduction
      • Explore Privileged Identity Management in Azure AD
      • Configure Privileged Identity Management
      • Audit Privileged Identity Management
      • Explore Microsoft Identity Manager
      • Control privileged admin tasks using Privileged Access Management
      • Knowledge check
      • Summary
    • Module 6: Examine Azure Identity Protection
      • Introduction
      • Explore Azure Identity Protection
      • Enable the default protection policies in AIP
      • Explore the vulnerabilities and risk events detected by AIP
      • Plan your identity investigation
      • Knowledge check
      • Summary