Microsoft Cybersecurity Pro Track: Security in Office 365

Learn about the types of threats and the security solutions in Office 365 to detect, protect and remediate these risks

Platform: Udemy
Status: Available
Duration: 6 Hours

Price: $59.99 $0.00

Note: Udemy FREE coupon codes are valid for maximum 3 days only. Look for "Get Coupon" orange button at the end of Description.

What you'll learn

  • Threats and data breaches targeting your data
  • Microsoft Defender for Office 365 (former named Office 365 Advanced Threat Protection)
  • Office 365 Threat Intelligence
  • Auditing, alerting and reporting in Office 365
  • Advanced Security Management in Office 365 (Cloud Application Security)
  • Basic understanding of Office 365
  • Basic understanding of authorization and authentication concepts
  • Basic understanding of computer networks
  • Basic conceptual understanding of Microsoft Azure
The threat landscape across the globe has changed dramatically over the past several years with hackers using more sophisticated methods to compromise users and networks alike. At the same time, more and more organizations are enjoying the benefits of cloud computing. But as companies move to the cloud, they are understandably concerned how Office 365 will protect their users and data from being compromised by cybercriminals.

In this course, we will examine the types of threats organizations must deal with daily and provide an overview of the solutions within Office 365 that help organizations detect, protect, and remediate these risks. These solutions include Microsoft Defender for Office 365 and Threat Intelligence, which provide protection against advanced targeted threats in email and Office documents and actionable insights into the global threat landscape, respectively. Solutions also include advanced auditing and alerts and features like Cloud Application Security, which enable security administrators to monitor and remediate risky behaviors and vulnerabilities in their tenant. And we will introduce you to the Secure Score tool, which can help organizations understand their security profile and what they can do to identify risks and vulnerabilities within their tenant.

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:

Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)

Review questions (Final Exam) at the end of the course (quizz) to test your knowledge on the topics learned in the course

Hands-on Lab at the end of the course in which you will practice at your own pace. You will have a step by step instruction file available to complete the Lab tasks like: creating Safe Links and Safe Attachments policies, using the Secure Score and much more.

Final Exam at the end of the course - 20 questions to test your knowledge on the topics and concepts learned in the course

Links to official Microsoft resources/blogs/videos for further documentation.

This course is the fifth course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more.

Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.

Who this course is for:

  • Security Administrators, Security Analysts, System Administrator
  • Any IT enthusiast who wnts to get started in cyber security and be confortable with the Microsoft Security services and capabilities