Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on 877-SOLARTECH
  • My Account

INF249X Threat Detection: Planning for a Secure Enterprise


INF249X Threat Detection: Planning for a Secure Enterprise


Product Description

INF249X Threat Detection: Planning for a Secure Enterprise

About this course 


This course is part of the Microsoft Professional Program in Cybersecurity. 

By 2021, worldwide cybercrime damage is expected to reach $6 trillion—double what it cost businesses in 2015. Unapproved apps, unmanaged devices, poor password protection, and other security issues are leaving far too many organizations vulnerable to attack. And as organizations embrace digital transformation, it becomes increasingly urgent for the organization to increase control over their IT infrastructure and reduce security risks.

This course is an overview of threat detection as part of a defense in-depth strategy. You will learn how to protect, detect, and respond to cybercrime as you explore the capabilities of threat detection and mitigation tools.

What you'll learn 


After completing this course, students will be able to:

  • Describe signature-based and behavioral / heuristic detection methods
  • List the capabilities of on-premise threat detection and mitigation tools
  • Name the capabilities of hybrid and cloud threat detection and mitigation tools
  • Recognize the importance of Enterprise threat detection monitoring 



  • The current cybersecurity ecosystem
  • Analysis of hacks on computers and networks
  • Basic Risk Management 

Course Syllabus


Module 1 Introduction to threat detection as part of the defense in-depth strategy

  • An overview of the modern cyber threat landscape
  • Integrating pre-breach and post-breach approaches to mitigate cyber threats
  • Comparing signature-based and behavioral/heuristic detection methods
  • Combating threat persistence

Module 2 Detecting threats in on-premises environments

  • Windows Defender Advanced Threat Protection
  • Microsoft Advanced Threat Analytics
  • Microsoft Enterprise Threat Detection
  • Microsoft Security Risk Detection
  • Antimalware Scan Interface
  • Logging and Auditing
  • Threat detection tools

Module 3 Detecting threats in hybrid and cloud environments

  • Office 365 Advanced Threat Protection
  • Office 365 Cloud App Security and Microsoft Cloud App Security
  • Azure Advanced Threat Detection
  • Azure Active Directory Identity Protection
  • Azure Active Directory Identity Threat Detection
  • Microsoft Operations Management Suite (OMS)
  • Azure Security Center
  • Advanced Threat Detection Features - Other Azure Services
  • Third-party ATD capabilities through Azure Marketplace
  • Azure Logging and Auditing
  • Microsoft 365

Module 4 Analyzing threat detection solutions in action

  • Detecting persistent threats by using Windows Defender Advanced Threat Protection and Advanced Threat Analytics
  • Enterprise Threat Detection behavioral monitoring 

Microsoft Verified Certificate

For a small fee ($99), once you complete this course, you will receive a Microsoft authenticated Certificate of Completion. This will allow you to showcase your achievement and document your expertise. You will have permission to add the certificate to your resume or post it directly to LinkedIn. If your company has access to Microsoft Software Assurance Training vouchers, you can redeem one voucher for one certificate.

Product Reviews