________________________________________________________________
 Would you like to take this course online or in person?
 Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78 / +34 605 98 51 30, WhatsApp: +34 685 60 05 91 , or contact our offices
 ________________________________________________________________
           
      
    
      
      
      
          
          
          
          
  
     Course SC-5004: Defend against cyberthreats with Microsoft Defender XDR
 Demonstrates the ability to use Microsoft Defender XDR to detect and respond to cyber threats.
 In this course, students will learn how to deploy a Microsoft Defender for Endpoint environment to manage devices, conduct endpoint investigations, manage incidents in Defender XDR , and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.
 Intermediate - Security Operations Analyst - Microsoft Defender - Microsoft Defender for Endpoints - Microsoft Defender XDR 
 SC-5004 Training Objectives
- 
 Configure your Microsoft Defender XDR environment: You will learn how to deploy and configure Microsoft Defender for Endpoint, including device onboarding and security policy configuration.
 
-  
Manage Incidents : You will use Microsoft Defender XDR to manage security incidents, including threat mitigation and incident response.
 
- 
 Advanced Investigations: You will perform detailed investigations on endpoints using Microsoft Defender for Endpoint, leveraging available forensic information.
 
- 
 Advanced Threat Hunting: You’ll use the Kusto Query Language (KQL) to perform advanced searches and detect unique threats.
 
 Course content SC-5004
 Module 1: Mitigate incidents using Microsoft Defender
-  Introduction
 
-  Use the Microsoft Defender portal
 
-  Manage incidents
 
-  Investigate incidents
 
-  Manage and investigate alerts
 
-  Manage automated investigations
 
-  Use the action center
 
-  Explore advanced hunting
 
-  Investigate Microsoft login logs
 
-  Understanding Microsoft's Secure Score
 
-  Analyze the threat analysis
 
 - Analyze reports
 
-  Configure the Microsoft Defender portal
 
 Module 2: Deploy the Microsoft Defender for Endpoint environment
-  Introduction
 
-  Create your environment
 
-  Understanding operating system compatibility and features
 
-  On-board devices
 
-  Manage access
 
-  Create and manage roles for role-based access control
 
-  Configure device groups
 
-  Configure advanced environment features
 
 Module 3: Configure alerts and detections in Microsoft Defender for Endpoint
-  Introduction
 
-  Configure advanced features
 
-  Configure alert notifications
 
-  Manage alert suppression
 
-  Manage indicators
 
 Module 4: Configure and manage automation with Microsoft Defender for Endpoint
-  Introduction
 
-  Configure advanced features
 
-  Manage automation upload and folder settings
 
-  Configure automated investigation and remediation capabilities
 
-  Block at-risk devices
 
 Module 5: Performing Device Investigations in Microsoft Defender for Endpoint
-  Introduction
 
-  Use the device inventory list
 
-  Investigate the device
 
-  Use behavior blocking
 
-  Detect devices with device discovery
 
 Module 6: Defend against cyberthreats with Microsoft Defender XDR lab exercises
-  Introduction
 
-  Configure the Microsoft Defender XDR environment
 
-  Deploy Microsoft Defender for Endpoint
 
-  Mitigate attacks with Microsoft Defender for Endpoints
 
 Prerequisites
 It is recommended to have:
-  Experience using the Microsoft Defender portal
 
-  Basic knowledge of Microsoft Defender for Endpoint
 
-  Basic knowledge of Microsoft Sentinel
 
-  Experience using Kusto Query Language (KQL) in Microsoft Sentinel
 
 Language
-  Course: English / Spanish
 
 Microsoft Applied Skills - Applied Skills
 
 This course is part of the Microsoft Applied Skills Credentials.
 Earn this Microsoft Applied Skills credential. In this course, you'll learn how to use Microsoft Purview to improve data security in Microsoft 365.
  Applied Skills: Explore all credentials in one guide