Skip to content
Play overlay
Preview this course

Threat Detection in an Enterprise

Learn about Microsoft Threat Detection concepts, tools and services (with Hands-on Lab) and Threat Detection concepts


Cristian-Gabriel Calinescu

Summary

Price
£15 inc VAT
Study method
Online, On Demand What's this?
Duration
6.7 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free

3 students purchased this course

Add to basket or enquire

Overview

What you'll learn
  • Describe signature-based and behavioral / heuristic detection methods

  • List the capabilities of on-premise threat detection and mitigation tools

  • Name the capabilities of hybrid and cloud threat detection and mitigation tools

  • Recognize the importance of Enterprise threat detection monitoring

Curriculum

7
sections
41
lectures
6h 41m
total
    • 5: An Overview of the Modern Cyber Threat Landscape 46:24
    • 6: An Overview of the Modern Cyber Threat Landscape 01:00
    • 7: Integrating Pre-Breach and Post-Breach Approaches to Mitigate Cyber Threats 11:04
    • 8: Comparing Signature-Based and Behavioral Heuristics Detection Methods 08:50
    • 9: Combating Threat Persistence 14:04
    • 10: Section 2 Review Questions 05:00
    • 11: Windows Event Forwarding and Intrusion Detection 15:05
    • 12: Windows Event Forwarding and Intrusion Detection Documentation 01:00
    • 13: Microsoft Advanced Threat Analytics 18:47
    • 14: Microsoft Advanced Threat Analytics Documentation 01:00
    • 15: Microsoft Defender for Endpoind (Microsoft Defender Advanced Threat Protection) 14:53
    • 16: Microsoft Defender for Endpoind Documentation 01:00
    • 17: Microsoft Enterprise Threat Detection 10:02
    • 18: MIcrosoft Security Risk Detection 05:26
    • 19: Antimalware Scan Interface (AMSI) 03:12
    • 20: Logging and Auditing 10:27
    • 21: Logging and Auditing Documentation 01:00
    • 22: Threat Detection Tools 07:32
    • 23: Threat Detection Tools Documentation 01:00
    • 24: Section 3 Review Questions 05:00
    • 25: Microsoft Cloud App Security and O365 Cloud App Security 14:13
    • 26: Microsoft Cloud App Security Documentation 01:00
    • 27: Microsoft Defender for Office 365 (former Office 365 Advanced Threat Protection) 10:55
    • 28: Office 365 Threat Inteligence 07:01
    • 29: Microsoft Defender for Identity (former Azure Advanced Threat Detection) 27:55
    • 30: Azure Logging and Auditing 05:23
    • 31: Microsoft Enterprise Mobility + Security (EMS) 07:17
    • 32: Microsoft 365 05:43
    • 33: Microsoft 365 Documentation 01:00
    • 34: Section 4 Review Questions 04:00
    • 35: Layered Machine Learning defenses in Windows Defender Antivirus 15:34
    • 36: Detecting Persistent Threats using Microsoft Defender ATP 27:21
    • 37: Enterprise Threat Detection behavioral monitoring 08:28
    • 38: Microsoft cpmprehensive approach to cyber threat detection 16:10
    • 39: Section 5 Review Questions 06:00
    • 40: Final Exam Review Questions 13:00
    • 41: Hands-On LAB 17:00 PDF

Course media

Description

In this course, we will examine the concepts of Threat Detection in an Enterprise using the Microsoft tools and security services for On-Premises, Hybrid and Cloud environments.

You will go through several threats and attack techniques and the tools to detect them and mitigate them as well.

After completing this course, you will be able to:

  • Describe signature-based and behavioral / heuristic detection methods

  • List the capabilities of on-premise threat detection and mitigation tools

  • Name the capabilities of hybrid and cloud threat detection and mitigation tools

  • Recognize the importance of Enterprise threat detection monitoring

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:

  • Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)

  • Review questions at the end of each section (quizz) to test your knowledge on the topics learned in the section

  • Hands-on Lab at the end of the course in which you will practice at your own pace. You will have a step by step instruction file available to complete the Lab tasks like: installing detection tools, performing several types of cyber attacks, detecting the attacks and much more.

  • Final Exam at the end of the course - 42 questions to test your knowledge on the topics and concepts learned in the course

  • Links to official Microsoft resources/blogs/videos for further documentation.

This course is the second course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more.

Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.

Who is this course for?

  • Security Administrators, Security Analysts, System Administrator
  • Any IT enthusiast who wnts to get started in cyber security and be confortable with the Microsoft Security services

Requirements

  • Basic experience with the current cybersecurity ecosystem

  • Basic analysis capabilities of hacks on computers and networks

  • Basic understanding of Risk Management

Career path

Cybersecurity Analyst

Cybersecurity Engineer

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.