Special Notices
Please note: Due to the dynamic nature of updates to Office 365 functionality by Microsoft, elements of the syllabus of this course can be subject to change without notice.
Please note: for Attend from Anywhere customers an additional screen is required. The additional screen must have a minimum screen size of 19 inch and minimum resolution of 1280x1024, with the vertical resolution (1024) being the most critical.
This course is one of the unique technical Office 365 QA authored Mastering courses.
Other technical courses within the QA authored curriculum for Office 365 include:
- Exchange Online and Exchange Hybrid
- Sharepoint Online
- Office 365 Teams
- Sharepoint and Office 365 Modern Development
- Microsoft Power Automate and Microsoft PowerApps
- Mastering Power Automate – 3 days
- Mastering Power Apps – 3 days
- Modern Desktop and Mobile Device Administration with Microsoft Intune
- Office 365 Security and Compliance
- Defensive Security of Microsoft 365 - Hands on
Overview
We power your Microsoft 365 security capabilities through our immersive 2-day course featuring hands on labs. Learn Offensive and defensive skills to secure Microsoft 365 environments, ensuring you are equipped and ready to handle security issues from a typical cyber kill chain. Your future. Our passion. Let’s go!
This course covers Microsoft 365 security features pertaining to various Microsoft 365 subscriptions: Business, E3, E5
The event contains 3 modules:
- Infrastructure protection — Protecting Domain Infrastructure using Microsoft 365 components.
- Don't pay a Ransom — Protect and recover your data from ransomware attacks.
- Data leakage prevention — protecting corporate data from unintentional or intentional sharing
Target Audience
- Security Professionals
- Microsoft 365 IT Professionals
- Anyone who has an interest in how to make their Microsoft-based organization more secure with Microsoft 365
Practical Labs- During the course students will create a trial free Microsoft 365 environment, which they will populate with data then implement the security features
Prerequisites
Working knowledge of Microsoft 365 technologies.
Delegates will learn how to
Delegates will learn and deploy both offensive/defensive methods to secure Microsoft 365 deployments. This course covers Microsoft 365 security features pertaining to various Microsoft 365 subscriptions; Business, E3, E5.
The event contains 3 modules:
- Infrastructure protection — Protecting Domain Infrastructure using Microsoft 365 components.
- Don't pay a Ransom — Protect and recover your data from ransomware attacks.
- Data leakage prevention — Protecting corporate data from unintentional or intentional sharing
Outline
Module 1 – Infrastructure Protection
- Introduction to Microsoft 365
- Demo: From Phishing to Domain Admins
- Demo: Getting Root in Linux
- Preventing Overpass-the-Hash attack
- Configuring Windows Defender Credentials Guard
- Performing and Preventing Pass-the-Ticket attack
- Detecting Active Directory attacks with User Behavior Analytics
- Comparing Microsoft ATA and Azure ATP
- Configuring Azure ATP
- Advanced Endpoint Protection from the Cloud
- Configuring Windows Defender ATP
Lab 1.1. Exploring Azure ATP
Lab 1.2. Configuring Windows Defender ATP
(Optional) Lab 1.3. Cybersecurity challenge
Module 2 - Don't pay Ransom
- Demo: Ransomware attack
- Stop phishing using Office 365 ATP
- Mastering whitelisting with AppLocker
- Whitelisting on steroids
- Attack Surface Reduction rules
- Docs protection with Controlled Folder Access
- Windows Defender Application Guard - Rock-solid Browser
- OneDrive for Business. Complete Recovery
- Tuning Windows Defender Antivirus
Lab 2.1. Configuring and testing Office 365 Advanced Threat Protection with sample ransomware
Lab 2.2. Configuring Windows Defender Controlled Folder Access
Module 3 - Data leakage prevention
- Endpoint Attacks with Physical Access
- Device Protection. Configuring Bitlocker
- Attacks on Mobile Devices
- Mobile devices protection using Microsoft Intune
- Protect data in the Cloud with Conditional Access & Cloud App Security
- User’s documents protection with Azure Information Protection
Lab 3.1 Configuring Azure AD Conditional Access
Lab 3.2 Exploring Cloud App Security
![]() |
= |
Microsoft Official Course (MOC) |
|
![]() |
= |
QA Authored |