Microsoft Defender for Endpoint course with hands on sims

Posted By: lucky_aut

Microsoft Defender for Endpoint course with hands on sims
Published 6/2025
Duration: 7h 44m | .MP4 1920x1080 30 fps(r) | AAC, 44100 Hz, 2ch | 3.84 GB
Genre: eLearning | Language: English

Learn how to expertly administer Microsoft Defender for Endpoint with hands on experience!

What you'll learn
- Learn the concepts and perform hands on activities needed to master Microsoft Defender for Endpoint
- Gain a tremendous amount of knowledge involving Microsoft Defender for Endpoint
- Learn using hands on simulations on how Microsoft Defender for Endpoint is administered!
- Learn how to set up your own test lab for practicing the concepts!

Requirements
- Willingness to put in the time and practice the steps shown in the course

Description
We really hope you'll agree, this training is way more than the average course on Udemy!

Have access to the following:

Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Introduction

Welcome to the course!

Understanding the Microsoft 365 and Azure Environment

A Solid Foundation of Active Directory Domains

A Solid Foundation of RAS, DMZ, and Virtualization

A Solid Foundation of the Microsoft Cloud Services

IMPORTANT Using Assignments in the course

Questions for John Christopher

Certificate of Completion

Setting up for hands on

DONT SKIP: Before beginning your account setup

Creating a trial Microsoft 365/Azure Account

Using a Hyper-V virtual machine or an Azure virtual machine

Setting up an Azure virtual machine for hands on

HYPER-V: Getting Hyper-V Installed on Windows

HYPER-V: Creating a Virtual Switch in Hyper-V

HYPER-V: Downloading the Windows 11 ISO

HYPER-V: Installing a Windows 11 virtual machine

Device management support with Microsoft Entra

Overview of device management of Microsoft device managements concepts

Registering devices vs joining devices with Microsoft Entra

Configuring Microsoft Entra for device management

Joining our virtual machine to Microsoft Entra

Introduction to Endpoint Security & Microsoft Defender for Endpoint

What is Endpoint Security?

High level overview of Microsoft Defender for Endpoint

Licensing and Plan Comparison (P1 vs P2)

Microsoft 365 Defender Portal Tour

How Defender for Endpoint relates to Microsoft Intune

Introduction to Microsoft Intune for device management

Setting Up Defender for Endpoint

Prerequisites and Supported Operating Systems

Creating a Microsoft Defender Admin role for permissions

Onboarding a Windows device to Defender for Endpoint

Mass automatic onboarding with Microsoft Intune

Verifying Windows devices have been onboarded

Implementing device discovery

Defender for Endpoint Vulnerability Management

What are Common Vulnerabilities and Exposures (CVEs)?

Inspecting vulnerabilities on a specific device

Using the vulnerability management dashboard for high level overview

Improving security with the help of vulnerability recommendations

Utilizing remediation within vulnerability management

Creating and managing Device Groups for Defender for Endpoint

Configuration and Policy Management

Hardening endpoint security by using Endpoint Security Policies

Attack Surface Reduction (ASR) Rules

What is Next-Gen Protection with Microsoft Defender for Endpoint?

Understanding the local anti-virus settings on Windows 11

Implementing Next-Gen Protection for devices

Understanding the local Defender Firewall settings on Windows 11

Implementing Firewall Rule Policies using Defender for Endpoint

Using Security Baselines in securing our devices

Utilizing Microsoft Purview Endpoint DLP (Data Loss Prevention)

Understanding the concepts of DLP (Data Loss Prevention)

Considering device requirements before using Endpoint DLP

Settings for configuring Endpoint DLP

Configuring DLP policies with advanced rules

Enabling just-in-time (JIT) protection

How to monitor for endpoint activities

Incident Response and Investigation

What is Automated Investigation and Remediation (AIR)?

Implementing Automated Investigation and Remediation (AIR) within device groups

Triggering incidents using a client device for testing

Investigating incidents generated by Defender managed devices

Viewing alerts generated by Defender managed devices

Managing and classifying detected alerts

Kusto Query Language (KQL)

What is Kusto Query Language (KQL)?

Using the Microsoft KQL Demo environment, downloading resource materials and AI

Basic KQL syntax for searching for information

Summarizing KQL results and filtering based on time ranges

Controlling KQL data displayed based on columns, amounts and characters

Using KQL variables and combining output data

Running Threat Hunting Queries with Advanced Hunting (KQL)

Utilizing Microsoft's Sentinel and Defender repository of premade KQL Queries

Who this course is for:
- IT people interested in learning a tremendous amount about Microsoft Defender for Endpoint
More Info

Please check out others courses in your favourite language and bookmark them
English - German - Spanish - French - Italian
Portuguese