Interested in a private company training? Request it here.
Not ready to book yet? Request an offer here.
Security matters. Modern organizations face a wide range of security threats targeting identities, devices, applications, and data. This module introduces the current threat landscape and explains the core security concepts and strategies used to protect cloud-based environments, including Zero Trust and layered defense.
Identities are a primary attack target in cloud environments and must be protected accordingly. This module focuses on securing cloud identities using Microsoft Entra ID by implementing strong authentication, detecting identity-based attacks, and enforcing access policies.
Microsoft Defender for Identity helps protect on-premises Active Directory environments by detecting identity-based threats and suspicious activities. This module explains how Defender for Identity identifies reconnaissance, credential theft, and lateral movement attacks within traditional AD environments.
Email and collaboration tools are common attack vectors for phishing, malware, and social engineering. This module covers how Microsoft Defender for Office 365 protects users and collaboration platforms by detecting malicious content and enforcing security policies.
Endpoints are a frequent target for attackers exploiting vulnerabilities and misconfigurations. Microsoft Defender for Endpoint provides visibility into device security posture, detects malicious behavior, and supports investigation and automated response.
Organizations rely on a growing number of cloud applications, increasing the risk of data exposure and shadow IT. Microsoft Defender for Cloud Apps helps monitor cloud app usage, control access, and protect sensitive data across SaaS applications.
Microsoft Defender XDR correlates signals from multiple security services to provide end-to-end visibility into attacks. This module focuses on investigating incidents, understanding attack timelines, performing threat hunting, and responding to advanced threats across identities, devices, and applications.
Investigating incidents and analyzing security data can be complex and time-consuming. Microsoft Security Copilot assists security teams by providing AI-driven insights, generating queries, summarizing incidents, and supporting threat hunting and reporting.
Protecting sensitive data and meeting compliance requirements are essential responsibilities in modern organizations. This module covers how Microsoft Purview helps classify, protect, and govern data by applying policies that control access, usage, retention, and data loss.
This course teaches security and IT professionals how to detect, investigate, and respond to security threats in modern cloud and hybrid environments. Participants will learn how to protect identities, devices, applications, and data against common and advanced attack techniques. The course focuses on understanding attack behavior, analyzing security signals, investigating incidents, and taking appropriate response actions to limit impact and prevent recurrence. Through hands-on labs and realistic scenarios, participants will develop practical skills in threat detection, incident investigation, and proactive threat hunting, while also learning how to apply security best practices to improve the overall security posture of their organization.
If you are interested in Microsoft Azure security as well, we recommend you to follow our 5-day course Mastering Microsoft Cloud Cybersecurity.
This course is intended for IT professionals and security specialists who are responsible for securing, monitoring, and governing Microsoft 365 environments.