LP1 - Overview of Microsoft 365 Defender
	 
	Cyber security attacks
	 
- 		Zero Trust model
- 		MITRE ATT&CK framework
- 		Example attack chain
	 
	Microsoft 365 Defender services
	 
- 		Services overview
- 		License requirements
- 		Administration
- 		Microsoft Secure Score
	 
	Labs
	Review
	 
	LP2 - Configuring Defender for Office 365
	 
	Threats and protection
	 
- 		Protection against known threats
- 		Email authentication to prevent spoofing
- 		Protection against unknown threats
	 
	Defender for Office 365 policies
	 
- 		Policies and recommended settings
- 		Managing the quarantine
- 		Advanced delivery policies
	 
	Attack simulation training
	 
- 		Types of simulation
- 		Create and run a simulation
	 
	Labs
	Review
	 
	LP3 - Deploying and configuring Defender for Endpoint
	 
	Exploring the service
	 
- 		Capabilities
- 		Defender Vulnerability Management
	 
	Deployment
	 
- 		General settings
- 		Permissions
- 		Onboarding
	 
	Evaluation lab
	 
	Protecting endpoints
	 
- 		Next-generation protection
- 		Attack surface reduction
	 
	Labs
	Review
	 
	LP4 - Deploying Defender for Identity 
	 
	Deploying the sensor
	 
- 		Creating the service accounts
- 		Installing the sensor
- 		Entity tags
	 
	Identity security posture
	 
- 		Assessments
- 		Securing accounts
- 		Securing authentication protocols
	 
	Lab
	Review
	 
	LP5 - Configuring Defender for Cloud Apps
	 
	Connecting to apps and logs
	 
- 		Connecting to Office 365
- 		Cloud Discovery
- 		Admin roles
	 
	Threat detection policies
	 
- 		Importing user groups
- 		Creating policies
	 
	Labs
	Review
	 
	LP6 - Investigating and responding to threats
	 
	Responding to incidents
	 
- 		Managing incidents
- 		Remediate
- 		Automated investigation and response
	 
	Advanced hunting
	 
- 		Creating queries
- 		Kusto query language (KQL)
	 
	Labs
	Review