Cloud Security Overview
Security matters. Every company is faced with several kinds of attacks and must implement different tools to protect themselves.
- Threat Landscape
- Common Threats and Attack Types
- The Defender's Dilemma
- Identity and Access Management
- Threat Protection
- Security Management
- Information Protection
Securing Your Identities with Microsoft Defender for Identity
The first thing you should protect are your identities. Especially in a cloud infrastructure, this should be your number one priority.
Azure Active Directory provides a lot of security related features to control access to your environment.
If you have on-prem identities, Microsoft Defender for Identity can provide similar protection for Active Directory accounts.
- Multi-Factor Authentication
- Privileged Identity Management
- Identity Protection
- Conditional Access
- Microsoft Defender for Identity
- LAB: Securing Your Identities
Microsoft Defender for Office 365
Safeguard your organization against malicious threats from email messages, links and collaboration tools. Implement policies to detect malware, spam and phishing mails.
Define what action to take when malicious content is detected.
- Protect Against Malware, Spam, Phishing, Spoofing
- Email Authentication: SPF, DKIM and DMARC
- Attack Simulator
- Safe Attachments and Safe Links
- Threat Protection for Collaboration: SharePoint, OneDrive and Teams
- Secure Score
- LAB: Microsoft Defender for Office 365
Microsoft Defender for Endpoint
Devices can get compromised because of missing updates or vulnerabilities in applications. Microsoft Defender for Endpoint provides you with an inventory and gives you
recommendations to make your environment more secure. This service also detects suspicious activities and alerts you about possible attacks.
- Protect Your Devices
- Onboarding Devices
- Endpoint Detection and Response
- Threat and Vulnerability Management
- Secure Score for Devices
- LAB: Microsoft Defender for Endpoint
Cloud App Security
In this cloud-based world, it can become difficult to find the right balance between flexibility for your users and protecting your critical data.
Cloud App Security acts as a gatekeeper to broker access between your users and the cloud apps they use. At the same time, it can safeguard your sensitive information.
- Cloud Discovery
- Control Access to Apps
- Data Retention and Compliance
- Investigate Risky Users
- LAB: Cloud App Security
Detect and Stop attacks with Microsoft 365 Defender
So many different tools that collect so much information. You may be flooded with information. Microsoft 365 Defender brings it all together. It gives you better insights
in attacks by showing you the devices, identities and apps that were involved. You can hunt for threats and be proactive, making sure the attacker doesn't stand a chance.
- Protect Your Environment
- Onboard Security Services
- Attack Investigation
- Threat Hunting
- LAB: Microsoft 365 Defender
Securing your on-prem or cloud infrastructure can be complex and challenging in today's world where users are working from any location on different devices.
To support organizations in protecting themselves from several kinds of attacks, Microsoft offers a broad range of cloud security services.
This 2-day training will make you familiar with services, like Microsoft Defender for Endpoint, Microsoft Defender for Office 365,
Microsoft Defender for Identity and Microsoft Cloud App Security, that can help you to protect and secure your identities,
your devices, your apps and your information in Microsoft 365.
This course is intended for IT professional specialists responsible for securing the IT environment.