Upon completion of this module, the learner will be able to:
- Investigate files in Microsoft Defender for Endpoint
- Investigate domains and IP addresses in Microsoft Defender for Endpoint
- Investigate user accounts in Microsoft Defender for Endpoint
Upon completion of this module, the learner will be able to:
- Describe Vulnerability Management in Microsoft Defender for Endpoint
- Identify vulnerabilities on your devices with Microsoft Defender for Endpoint
- Track emerging threats in Microsoft Defender for Endpoint
Plan for cloud workload protections using Microsoft Defender for Cloud
Upon completion of this module, the learner will be able to:
- Describe Microsoft Defender for Cloud features
- Microsoft Defender for Cloud workload protections
- Enable Microsoft Defender for Cloud
Connect Azure assets to Microsoft Defender for Cloud
Upon completion of this module, the learner will be able to:
- Explore Azure assets
- Configure auto-provisioning in Microsoft Defender for Cloud
- Describe manual provisioning in Microsoft Defender for Cloud
Connect non-Azure resources to Microsoft Defender for Cloud
Upon completion of this module, the learner will be able to:
- Connect non-Azure machines to Microsoft Defender for Cloud
- Connect AWS accounts to Microsoft Defender for Cloud
- Connect GCP accounts to Microsoft Defender for Cloud
Manage your cloud security posture management
In this module, you’ll learn how Microsoft Defender for Cloud provides security posture management. Upon completion you’ll be able to:
- Describe Microsoft Defender for Cloud features.
- Explain the Microsoft Defender for Cloud security posture management protections for your resources.
Explain cloud workload protections in Microsoft Defender for Cloud
Upon completion of this module, the learner will be able to:
- Explain which workloads are protected by Microsoft Defender for Cloud
- Describe the benefits of the protections offered by Microsoft Defender for Cloud
- Explain how Microsoft Defender for Cloud protections function
Remediate security alerts using Microsoft Defender for Cloud
Upon completion of this module, the learner will be able to:
- Describe alerts in Microsoft Defender for Cloud
- Remediate alerts in Microsoft Defender for Cloud
- Automate responses in Microsoft Defender for Cloud
Construct KQL statements for Microsoft Sentinel
Upon completion of this module, the learner will be able to:
- Construct KQL statements
- Search log files for security events using KQL
- Filter searches based on event time, severity, domain, and other relevant data using KQL
Upon completion of this module, the learner will be able to:
- Create queries using unions to view results across multiple tables using KQL
- Merge two tables with the join operator using KQL
Work with data in Microsoft Sentinel using Kusto Query Language
Upon completion of this module, the learner will be able to:
- Extract data from unstructured string fields using KQL
- Extract data from structured string data using KQL
- Create Functions using KQL
Introduction to Microsoft Sentinel
By the end of this module, you will be able to:
- Identify the various components and functionality of Microsoft Sentinel.
- Identify use cases where Microsoft Sentinel would be a good solution.
Upon completion of this module, the learner will be able to:
- Explain User and Entity Behavior Analytics in Azure Sentinel
- Explore entities in Microsoft Sentinel
Data normalization in Microsoft Sentinel
After completing this module, you will be able to:
- Use ASIM Parsers
- Create ASIM Parser
- Create parameterized KQL functions
Upon completion of this module, the learner will be able to:
- Describe threat hunting concepts for use with Microsoft Sentinel
- Define a threat hunting hypothesis for use in Microsoft Sentinel
Threat hunting with Microsoft Sentinel
In this module, you will:
- Use queries to hunt for threats.
- Save key findings with bookmarks.
- Observe threats over time with livestream.
Use Search jobs in Microsoft Sentinel
After completing this module, you’ll be able to:
- Use Search Jobs in Microsoft Sentinel
- Restore archive logs in Microsoft Sentinel
Hunt for threats using notebooks in Microsoft Sentinel
Upon completion of this module, the learner will be able to:
- Explore API libraries for advanced threat hunting in Microsoft Sentinel
- Describe notebooks in Microsoft Sentinel
- Create and use notebooks in Microsoft Sentinel