1: Mitigate threats using Microsoft Defender XDR
Introduction to threat protection with Microsoft Defender XDR
Mitigate incidents using Microsoft Defender XDR
Remediate risks with Defender for Office 365 in Microsoft Defender XDR
Microsoft Defender for Identity in Microsoft Defender XDR
Protect your identities with Entra ID Protection
Defender for Cloud Apps in Microsoft Defender XDR
2: Mitigate threats using Microsoft Copilot for Security
Fundamentals of Generative AI
Describe Microsoft Copilot for Security
Describe the core features of Microsoft Copilot for Security
Describe the embedded experiences of Microsoft Copilot for Security
3: Mitigate threats using Microsoft Purview
Microsoft Purview Compliance Solutions
Investigate and remediate compromised entities identified by Microsoft Purview data loss prevention (DLP) policies
Investigate and remediate insider risk threats identified by Microsoft Purview policies
Investigate threats using Content search in Microsoft Purview
Investigate threats using Microsoft Purview Audit (Standard)
Investigate threats using Microsoft Purview Audit (Premium)
4: Mitigate threats using Microsoft Defender for Endpoint
Protect against threats with Microsoft Defender for Endpoint
Deploy the Microsoft Defender for Endpoint environment
Implement Windows security enhancements
Perform device investigations
Perform actions on a device
Perform evidence and entities investigations
Configure and manage automation
Configure for alerts and detections
Utilize Threat and Vulnerability Management
5: Mitigate threats using Microsoft Defender for Cloud
Plan for cloud workload protections using Microsoft Defender for Cloud
Connect Azure assets to Microsoft Defender for Cloud
Connect non-Azure assets to Microsoft Defender for Cloud
Manage your cloud security posture management
Workload protections in Microsoft Defender for Cloud
Remediate security alerts using Microsoft Defender for Cloud
6: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
Construct KQL statements for Microsoft Sentinel
Analyze query results using KQL
Build multi-table statements using KQL
Work with string data in using KQL statements
7: Configure your Microsoft Sentinel environment
Introduction to Microsoft Sentinel
Create and manage Microsoft Sentinel workspaces
Query logs in Microsoft Sentinel
Use watchlists in Microsoft Sentinel
Utilize threat intelligence in Microsoft Sentinel
8: Connect logs to Microsoft Sentinel
Manage content in Microsoft Sentinel
Connect data to Microsoft Sentinel using data connectors
Connect Microsoft services to Microsoft Sentinel
Connect Microsoft Defender XDR to Microsoft Sentinel
Connect Windows hosts to Microsoft Sentinel
Connect Common Event Format logs to Microsoft Sentinel
Connect syslog data sources to Microsoft Sentinel
Connect threat indicators to Microsoft Sentinel
9: Create detections and perform investigations using Microsoft Sentinel
Threat detection with Microsoft Sentinel analytics
Automation in Microsoft Sentinel
Threat response with Microsoft Sentinel playbooks
Security incident management in Microsoft Sentinel
Entity behavioral analytics in Microsoft Sentinel
Data normalization in Microsoft Sentinel
Query, visualize, and monitor data in Microsoft Sentinel
10: Perform threat hunting in Microsoft Sentinel
Explain threat hunting concepts in Microsoft Sentinel
Threat hunting with Microsoft Sentinel
Use Search jobs in Microsoft Sentinel
Optional – Hunt for threats using notebooks in Microsoft Sentinel