17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[ CourseWikia.com ] Microsoft Defender For Office 365
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Learn how to defend against threats to Office 365 products that can enter through dangerous web links and email attachments. Professor Robert McMillen introduces new security features from Microsoft to protect organizations using Office365 and online products using Defender for Office 365. Discover how to create and manage threat policies that can protect your organization and how to create reports and automate responses to any threat that your organization is presented with.
If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com
Get More Tutorials and Support Us -->> https://DevCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01 - Introduction/01 - Secure your organization with Microsoft Defender.mp4
3.4 MB
~Get Your Files Here !/01 - Introduction/01 - Secure your organization with Microsoft Defender.srt
1.1 KB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
3.1 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt
3.6 KB
~Get Your Files Here !/01 - Introduction/03 - Course lab setup.mp4
4.1 MB
~Get Your Files Here !/01 - Introduction/03 - Course lab setup.srt
4.4 KB
~Get Your Files Here !/01 - Introduction/04 - Licensing.mp4
15.8 MB
~Get Your Files Here !/01 - Introduction/04 - Licensing.srt
12.8 KB
~Get Your Files Here !/01 - Introduction/05 - Accessing the Defender Portal.mp4
12.2 MB
~Get Your Files Here !/01 - Introduction/05 - Accessing the Defender Portal.srt
10.1 KB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/01 - Preset security policies and rules.mp4
8.6 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/02 - Exchange Online Policies (EOP) anti-spam policies.mp4
19.1 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/02 - Exchange Online Policies (EOP) anti-spam policies.srt
17.5 KB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/03 - Configuration analyzer.mp4
9.4 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/03 - Configuration analyzer.srt
6.6 KB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/04 - Allow and Block lists.mp4
12.4 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/04 - Allow and Block lists.srt
12.5 KB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/05 - Scenario What would you do.mp4
4.6 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/05 - Scenario What would you do.srt
5.7 KB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/01 - Anti-phishing.mp4
12.6 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/01 - Anti-phishing.srt
11.9 KB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/02 - Safe Attachments.mp4
8.4 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/02 - Safe Attachments.srt
8.2 KB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/03 - Safe Links.mp4
4.2 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/03 - Safe Links.srt
4.3 KB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/04 - Anti-spam.mp4
12.5 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/04 - Anti-spam.srt
12.6 KB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/05 - Anti-malware.mp4
9 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/05 - Anti-malware.srt
8.3 KB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/06 - Alert policies.mp4
10.8 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/06 - Alert policies.srt
8.5 KB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/07 - Scenario What would you do.mp4
4.2 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/07 - Scenario What would you do.srt
4 KB
~Get Your Files Here !/04 - 3. Cloud App Policies/01 - Overview of Cloud App Protection in Defender for Office 365.mp4
3.7 MB
~Get Your Files Here !/04 - 3. Cloud App Policies/01 - Overview of Cloud App Protection in Defender for Office 365.srt
3.4 KB
~Get Your Files Here !/04 - 3. Cloud App Policies/02 - Cloud App Catalog.mp4
11.3 MB
~Get Your Files Here !/04 - 3. Cloud App Policies/02 - Cloud App Catalog.srt
7.7 KB
~Get Your Files Here !/04 - 3. Cloud App Policies/03 - Create Cloud App policies.mp4
17.3 MB
~Get Your Files Here !/04 - 3. Cloud App Policies/03 - Create Cloud App policies.srt
12.7 KB
~Get Your Files Here !/04 - 3. Cloud App Policies/04 - Scenario What would you do.mp4
5.4 MB
~Get Your Files Here !/04 - 3. Cloud App Policies/04 - Scenario What would you do.srt
6.5 KB
~Get Your Files Here !/05 - 4. Reports/01 - Utilize message trace to track an email.mp4
11.1 MB
~Get Your Files Here !/05 - 4. Reports/01 - Utilize message trace to track an email.srt
9.5 KB
~Get Your Files Here !/05 - 4. Reports/02 - Analyze the health of the system.mp4
10.9 MB
~Get Your Files Here !/05 - 4. Reports/02 - Analyze the health of the system.srt
7.6 KB
~Get Your Files Here !/05 - 4. Reports/03 - Configure permissions and roles.mp4
9.6 MB
~Get Your Files Here !/05 - 4. Reports/03 - Configure permissions and roles.srt
7.5 KB
~Get Your Files Here !/05 - 4. Reports/04 - Incidents and alerts.mp4
8.5 MB
~Get Your Files Here !/05 - 4. Reports/04 - Incidents and alerts.srt
7.5 KB
~Get Your Files Here !/05 - 4. Reports/05 - Scenario What would you do.mp4
3.9 MB
~Get Your Files Here !/05 - 4. Reports/05 - Scenario What would you do.srt
4.6 KB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/01 - Guided threat hunting.mp4
14.2 MB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/01 - Guided threat hunting.srt
10.3 KB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/02 - Schema alerts.mp4
7.3 MB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/02 - Schema alerts.srt
5.2 KB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/03 - Learning Kusto Query Language (KQL).mp4
13 MB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/03 - Learning Kusto Query Language (KQL).srt
12.1 KB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/04 - Scenario What would you do.mp4
4.6 MB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/04 - Scenario What would you do.srt
5 KB
~Get Your Files Here !/07 - Conclusion/01 - Next steps.mp4
1.5 MB
~Get Your Files Here !/07 - Conclusion/01 - Next steps.srt