Configuring and Managing Microsoft Defender for Endpoint [WDE]
placeCQure Virtual English 26 jan. 2026 tot 28 jan. 2026 |
placeCQure Virtual English 8 apr. 2026 tot 10 apr. 2026 |
Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.
OVERVIEW
This practical workshop was designed with security professionals in mind, who want to deepen their knowledge and skills in usage of Microsoft monitoring tools and framework. This class was designed by real-life cybersecurity practitioners and thus it is filled with practical exercises, realistic case studies and knowledge that can be put to use right after the class concludes. All exercises are based on O365 and Azure Cloud and performed in a realistic environment prepared by CQURE Experts.
During the first day the group will cover key Microsoft 365 Defender for Endpoint concepts, including overview of the EDR and its best deployment strategies, as well as automation with ServiceNow…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.
OVERVIEW
This practical workshop was designed with security professionals in mind, who want to deepen their knowledge and skills in usage of Microsoft monitoring tools and framework. This class was designed by real-life cybersecurity practitioners and thus it is filled with practical exercises, realistic case studies and knowledge that can be put to use right after the class concludes. All exercises are based on O365 and Azure Cloud and performed in a realistic environment prepared by CQURE Experts.
During the first day the group will cover key Microsoft 365 Defender for Endpoint concepts, including overview of the EDR and its best deployment strategies, as well as automation with ServiceNow and 3rd parties.
The next day covers everything you need to know on the Microsoft 365 Defender Stack, including practical features of Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, Microsoft Defender for Cloud, Microsoft Defender for Server.
The final day of the training is a deep dive into advanced threat hunting. We will also cover the hacker’s perspective and how adversaries may try to hide malware and avoid detection by the EDR. We will run numerous attack scenarios and explore the ways on how they can be detected and remediated for the security of our systems.
AUDIENCE
SOC analysts, Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
To attend this training, you should have a good hands-on experience in administering Windows infrastructure and basic around public cloud concept (Office 365, Azure).
CERTIFICATION
Certification:
What is wonderful about our certification is that it is lifetime valid with no renewal fees – the technology changes, but fundamentals and attitude remain mostly the same. Our Virtual Certificates, which entitle you to collect CPE Points, are issued via Accredible.
CONTENT
MODULE 1: Microsoft 365 Defender for Endpoint - EDR
- Intro 101 to Microsoft Defender ecosystem
- EDR deployment strategies
- EDR installation and configuration
- Fine tuning and hardening of EDR configuration
- Managing and Maintaining Security Posture
- Troubleshooting Common Issues
- Automation with ServiceNow and 3rd party
MODULE 2: Integration with Defender Family
- Microsoft 365 Defender Stack Overview
- Microsoft Defender for Identity
- Microsoft Defender for Cloud Apps
- Microsoft Defender for Cloud
- Microsoft Defender for Server
- EDR integration with Microsoft Azure Sentinel
MODULE 3: Security Operations with Microsoft EDR (Defender for Endpoints) Advanced Threat Hunting with Defender
- EDR integration with Microsoft Azure Sentinel
- Security Operations best practices with Microsoft EDR and Sentinel
- How to manage Incidents inside EDR and Sentinel
- Kusto language 101 - basic and advanced queries
- Advanced Hunting
- Hacker ways to hide malware and bypass EDR
- External Attack Surface Management and integration with
Sentinel
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
