Mitigate threats using Microsoft Defender XDR
• Introduction to Microsoft Defender XDR threat protection
• Mitigate incidents using Microsoft Defender
• Manage Microsoft Entra Identity Protection
• Safeguard your environment with Microsoft Defender for Identity
• Remediate risks with Microsoft Defender for Office 365
• Secure your cloud apps and services with Microsoft Defender for Cloud Apps
Mitigate threats using Microsoft Copilot for Security
• Fundamentals of Generative AI
• Describe Microsoft Copilot for Security
• Describe the core features of Microsoft Copilot for Security
• Describe the embedded experiences of Microsoft Copilot for Security
• Explore use cases of Microsoft Copilot for Security
Mitigate threats using Microsoft Purview
• Respond to data loss prevention alerts using Microsoft 365
• Manage insider risk in Microsoft Purview
• Search and investigate with Microsoft Purview Audit
• Investigate threats with Content search in Microsoft Purview
Mitigate threats using Microsoft Defender for Endpoint
• Protect against threats with Microsoft Defender for Endpoint
• Deploy the Microsoft Defender for Endpoint environment
• Implement Windows security enhancements with Microsoft Defender for Endpoint
• Perform device investigations in Microsoft Defender for Endpoint
• Perform actions on a device using Microsoft Defender for Endpoint
• Perform evidence and entities investigations using Microsoft Defender for Endpoint
• Configure and manage automation using Microsoft Defender for Endpoint
• Configure for alerts and detections in Microsoft Defender for Endpoint
Mitigate threats using Microsoft Defender for Cloud
• Plan for cloud workload protections using Microsoft Defender for Cloud
• Connect Azure assets to Microsoft Defender for Cloud
• Connect non-Azure resources to Microsoft Defender for Cloud
• Manage your cloud security posture management
• Explain cloud workload protections in Microsoft Defender for Cloud
• Remediate security alerts using Microsoft Defender for Cloud
Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
• Construct KQL statements for Microsoft Sentinel
• Analyze query results using KQL
• Build multi-table statements using KQL
• Work with data in Microsoft Sentinel using Kusto Query Language
Configure your Microsoft Sentinel environment
• Introduction to Microsoft Sentinel
• Create and manage Microsoft Sentinel workspaces
• Query logs in Microsoft Sentinel
• Use watchlists in Microsoft Sentinel
• Utilize threat intelligence in Microsoft Sentinel
Connect logs to Microsoft Sentinel
• Connect data to Microsoft Sentinel using data connectors
• Connect Microsoft services to Microsoft Sentinel
• Connect Microsoft Defender XDR to Microsoft Sentinel
• Connect Windows hosts to Microsoft Sentinel
• Connect Common Event Format logs to Microsoft Sentinel
• Connect syslog data sources to Microsoft Sentinel
• Connect threat indicators to Microsoft Sentinel
Create detections and perform investigations using Microsoft Sentinel
• Threat detection with Microsoft Sentinel analytics
• Automation in Microsoft Sentinel
• Threat response with Microsoft Sentinel playbooks
• Security incident management in Microsoft Sentinel
• Identify threats with Behavioral Analytics
• Data normalization in Microsoft Sentinel
• Query, visualize, and monitor data in Microsoft Sentinel
• Manage content in Microsoft Sentinel
Perform threat hunting in Microsoft Sentinel
• Explain threat hunting concepts in Microsoft Sentinel
• Threat hunting with Microsoft Sentinel
• Use Search jobs in Microsoft Sentinel
• Hunt for threats using notebooks in Microsoft Sentinel