fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR
  • #course
  • #livevirtualclass
  • cloud security
  • incident response
  • Secure Administration
  • threat hunting

Configuring and Managing Microsoft Defender for Endpoint

Live Virtual Class - Super Intensive Remote Training with Labs!
February 24, 2025, 9:00 am
Days
Hours
Min.
Sec.

During this 3-day course in 21 hours of super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Configuring and Managing Microsoft Defender for Endpoint. Moreover, you will be able to:

    • Get the highest quality and unique learning experience – the class is limited to 10 participants by default.
    • Get the opportunity to interact with our world-renowned Experts.
    • Go through CQURE’s custom lab exercises and practice them after the course.
    • Receive a lifelong certification after completing the course!

 

(9:00am – 4:00pm CET/CEST Monday to Wednesday)

2575

Why this course?

This is a 3-day deep dive course on configuring and managing Microsoft Defender for endpoint, a must-go for enterprise administrators, security officers and architects. It is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!

This is a 3-day deep dive course on configuring and managing Microsoft Defender for endpoint, a must-go for enterprise administrators, security officers and architects. It is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!

Pricing plan

We offer you pricing plan designed and adjusted to your specific needs and budget. Buy now or book your spot and pay later.

Course timeline

  • 1. Before the course

    You will receive a Student Guide with instruction on how to prepare for the training, information regarding all the technical requirements and your own individual login credentials to the virtual environment.

  • 2. During the course

    You will be able to exercise and review all learned content on an ongoing basis.

  • 3. After the course

    You will receive a Certificate of Completion, all the materials which have been created and presented by the trainer as well as an access to our community on the Discord server.

Course benefits

How our lessons look like

  • Loads of Knowledge
  • Implementation workshop
  • Course materials
  • Unique exercises
  • Social & Network
  • Certification

Loads of Knowledge

This practical workshop was designed with security professionals in mind, who want to deepen their knowledge and skills in usage of Microsoft monitoring tools and framework. This class was designed by real-life cybersecurity practitioners and thus it is filled with practical exercises, realistic case studies and knowledge that can be put to use right after the class concludes. All exercises are based on O365 and Azure Cloud and performed in a realistic environment prepared by CQURE Experts.

Implementation workshop

Covering all aspects of configuring and managing Microsoft Defender for endpoint that everyone talks about, this workshop will teach you how to implement securing technologies one by one. During this course you will learn how to design and implement secure infrastructures based on the reasonable balance between security and comfort with a deep understanding of a cyber attacker’s capabilities. The course is limited to 10 participants, so reserve your spot today!

Course materials

During the course you will be provided with a bunch of materials such as lab exercises, presentations, intriguing articles and useful tools to make your tasks a little bit easier!

Unique exercises

All exercises are based on O365 and Azure Cloud. During the course our finest specialists will use their unique tools, practical exercises and presentations slides with notes.

Social & Network

You will be granted access to our closed Discord community server where you will be able to share your thoughts with other IT specialists.

Certification

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

Course syllabus

This Live Virtual Class consists of 3 Modules in terms of Configuring and managing Microsoft Defender for endpoint. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.

  • Module 1: Microsoft 365 Defender for Endpoint – EDR

    • 1. Intro 101 to Microsoft Defender ecosystem
    • 2. EDR deployment strategies
    • 3. EDR installation and configuration
    • 4. Fine tuning and hardening of EDR configuration
    • 5. Managing and Maintaining Security Posture
    • 6. Troubleshooting Common Issues
    • 7. Automation with ServiceNow and 3rd party
  • Module 2: Integration with Defender Family

    • 1. Microsoft 365 Defender Stack Overview
    • 2. Microsoft Defender for Identity
    • 3. Microsoft Defender for Cloud Apps
    • 4. Microsoft Defender for Cloud
    • 5. Microsoft Defender for Server
    • 6. EDR integration with Microsoft Azure Sentinel
  • Module 3: Security Operations with Microsoft EDR (Defender for Endpoints) Advanced Threat Hunting with Defender

    • 1.EDR integration with Microsoft Azure Sentinel
    • 2. Security Operations best practices with Microsoft EDR and Sentinel
    • 3. How to manage Incidents inside EDR and Sentinel
    • 4. Kusto language 101 – basic and advanced queries
    • 5. Advanced Hunting
    • 6. Hacker ways to hide malware and bypass EDR
    • 7. External Attack Surface Management and integration with Sentinel

Who is it for?

Audience

SOC analysts, Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security. To attend this training, you should have a good hands-on experience in administering Windows infrastructure and basic around public cloud concept (Office 365, Azure).

Platform and Technical Requirements

To participate in the course you need a Stable internet connection. For best learning experience we also need you to have a webcam, headphones and a microphone. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.

Exercises

All exercises are based on O365 and Azure Cloud. During the course our finest specialists will use their unique tools, practical exercises and presentations slides with notes.

How to persuade your manager that this course is meaningful?

Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.

Protects the Company

You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.

Improves Employees skills

Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.

Boosts customer confidence

Completed course with personal certification may be the perfect advantage when it comes to business.

Helps comply with regulations

Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.

Saves money in the long run

Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.

Prepares for emerging threats

After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.

Register now and learn from the best!

During this 3-day course in 21 hours of super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Configuring and Managing Microsoft Defender for Endpoint. Moreover, you will be able to:

  • get the highest quality and unique learning experience – the class is limited to 10 participants by default
  • get the opportunity to interact with our world-renowned Experts
  • go through CQURE’s custom lab exercises and practice them after the course

Your Experts

This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

Piotr

Pawlik

Cybersecurity Expert, MCITP, MCTS

System Engineer and Unified Communications Expert. His areas of expertise includes Microsoft Private Cloud, Microsoft Public Cloud (Office 365 and Azure), Microsoft Exchange Server 2010/2013, Lync Server 2010/2013, Office Communications Servers and Windows Server family.

Uros

Babic

Cybersecurity Expert, MVP, MCT, Security Architect

Uros has over 20 years of experience in the industry. As a Security Architect, he specializes in implementing, migrating, and optimizing cloud security across on-premises and multi-cloud environments using Azure and O365 services. Microsoft MVP in Sentinel/XDR and Cloud Security.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form