• Online, Self-Paced
Course Description

In this challenge, you will plan and implement threat protection by using Microsoft Defender. First, you will set up Microsoft Defender for Endpoint. Next, you will configure Microsoft Defender for Office 365® policies. Finally, you will implement Microsoft Defender for Identity. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Learning Objectives

In this challenge, you will plan and implement threat protection by using Microsoft Defender. First, you will set up Microsoft Defender for Endpoint. Next, you will configure Microsoft Defender for Office 365® policies. Finally, you will implement Microsoft Defender for Identity. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.